Browse Definitions:

Browse File Extensions by Alphabet

WAM - WCU

  • WAM - WebAction Web Action ...
  • WAML - XPlore Web Application ...
  • WAP - Wireless Bitmap ( level ...
  • WAP - Ericsson WapIDE WAP ...
  • WAP - Wap application project ...
  • WAP - WAVPAC filtered.WAV file...
  • WAR - NetWar On- line Program ...
  • WAR - Archived Konqeror (KDE) ...
  • WAR - Java Web Archive (Sun ...
  • WAR - Unknown Apple II File
  • WAR - Archived Konqeror HTML ...
  • WAR - Java web archive
  • WARZ - Applet Runne
  • WAS - Script source code file ...
  • WAT - IBM Voice Type Language ...
  • WAT - Epson Personal Settings ...
  • WAT - WATFILE file
  • WAV - Waveform sound (...
  • WAVE - WAVE SoundArchive Cachwav
  • WAVE - WAVe PCM sound file
  • WAVE - Unknown Apple II File
  • WAVE64 - Sony Wave64 audio file
  • WAVER - KRISTAL Audio Engine ...
  • WAX - Internet shortcut file
  • WAX - Compiled script file (...
  • WAXML - AudioPlayer XML Music ...
  • WA~ - Outlook Address Book ...
  • WA~ - Microsoft Address Book ...
  • WB - Freelang Dictionary ...
  • WB - FIFA 2000 file
  • WB - VLBI and Tied Array ...
  • WB0 - Quattro Pro version 6 ...
  • WB1 - Notebook (QuattroPro for...
  • WB2 - Spreadsheet (QuattroPro ...
  • WB3 - Text file (QuattroPro ...
  • WB4 - WindowBlinds Default ...
  • WBA - WindowBlinds skin - ...
  • WBA - WindowBlinds Compressed ...
  • WBA - WinAce Zip File
  • WBA - Winace Zip archive
  • WBC - Image file (Webshots)
  • WBD - Webshots Graphic Format ...
  • WBD - Webster Whiteboard ...
  • WBD - WinBreadboard circuit ...
  • WBD - Winbot IRC bot database ...
  • WBD - Softlink Whiteboard file
  • WBD - eBeam Whiteboard
  • WBD - eBeam Whiteboard File ( ...
  • WBD - Webshots Picture File
  • WBD - WinBreadboard Circuit ...
  • WBE - WinBatch Encrypted ...
  • WBF - Batch file (Microsoft ...
  • WBI - Personal Training ...
  • WBK - Backup file (Microsoft ...
  • WBL - Upload file (Argo ...
  • WBM - Webmin module file
  • WBM - Likno Web Button Maker ...
  • WBM - Macromedia Fireworks File
  • WBM - Wireless Bitmap image ...
  • WBM - Welcome File ( Microsoft...
  • WBM - WinBatch File
  • WBMP - Macromedia Fireworks File
  • WBMP - Wireless Bitmap image ...
  • WBMP - Wireless Bitmap File ...
  • WBO - DataFlex Web Business ...
  • WBP - Webshots image format ...
  • WBR - WordBar File (Crick ...
  • WBRX - WriteOnline Write Online...
  • WBS - Webshots screensaver
  • WBS - WebExpress Website File
  • WBS - WinBot IRC bot script ...
  • WBSP - WhizBase Script ( Djikic...
  • WBT - Wordbar template (Crick ...
  • WBT - Batch file (WinBatch)
  • WBZ - WebShots image
  • WC - Windows Commander File ...
  • WC - Mikmak 203 file
  • WC$ - Modem Bitware Fax disk2 ...
  • WC2 - Working Time Tracker ( ...
  • WCA - WinCatalog Collection ( ...
  • WCAT - WinCatalog Collection ( ...
  • WCD - Macro token list file (...
  • WCF - Webex Saved Chat File
  • WCH - WordPerfect for Windows ...
  • WCH - WordPerfect
  • WCH - Corel Office ...
  • WCH - Corel Office ...
  • WCI - Microsoft Indexing ...
  • WCINV-MS-P2P - Windows Meeting Space ...
  • WCL - WellCAD log file
  • WCL - WinCon controller ...
  • WCL - wcl2 file
  • WCL - WinCatalog document file
  • WCM - Data transmission file (...
  • WCM - Macro (WordPerfect fdor ...
  • WCP - Product information ...
  • WCS - Website content source ...
  • WCS - Chip Mark II WCS
  • WCT - VisualBasic WCTFile
  • WCT - WorldCast Project ( ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close