Learn by definition at your own pace. For your convenience, we've gathered subject-related terms into one handy glossary page that we like to call Words-to-Go. We invite you to print the glossary out or click on each term for its complete definition.
- Print out our handy glossary of essential network-attached storage (NAS) terminology for a fast reference. Online, each term links to our full definition, which also includes resources for further ... (WhatIs.com)
- These reference glossaries contain terms related to specific subjects including security, storage, programming, IT governance, data transmission, lifecycle management and technology used in vertica...
- This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...
Microsoft Azure Key Vault is a cloud-hosted management service that allows users to encrypt keys and small secrets like passwords or answers to security questions that are used in their cloud applications and services.
Cloud infrastructure refers to the hardware and software components -- such as servers, storage and virtualization software -- that are needed to support the computing requirements of a cloud computing model.
AWS Lambda (Amazon Web Services Lambda) is a responsive cloud service that analyzes actions within an application and responds by deploying the appropriate user-defined codes, which are called functions.
AWS On-Demand Instances (Amazon Web Services On-Demand Instances) are virtual servers that run in AWS Elastic Compute Cloud (EC2) or AWS Relational Database Service (RDS) and are purchased at a fixed rate per hour.
The CSSLP (certified secure software lifecycle professional) is an (ISC)2 certification for security professionals who wish to strengthen their knowledge about application security throughout the software development lifecycle.
A watering hole attack targets a specific group of users by infecting websites group members like to visit. The name watering hole attack is inspired by predators in the natural world who lurk near watering holes, looking for opportunities to attack desired prey.