Browse SEC - ZIP
-
- Security as a Service - Security-as-a-service (SaaS) is an ...
- Security as a Service (SaaS) - Security-as-a-service...
- security event (security incident) - A securit...
- security information management - Security inform...
- security information management (SIM) - Sec...
- Security Learning Guides - We've gathered a collection o...
- Security Quizzes - We've gathered a collection of our quizzes on...
- SFA - Single-factor authentication (SFA) is the traditional security process ...
- shrink wrap license - A shrink wrap license is an end user ag...
- SIM - Security information management (SIM) is the practice of collecting, mo...
- single factor authentication - Single-factor authent...
- single-factor authentication - Single-factor authent...
- single-factor authentication (SFA) - Single-fa...
- Software Security - Application security is the use of software...
- SSI injection - SSI injection is a form of attack that can be used ...
- static verification - Static verification is the set of proce...
- streaming application - A streaming application is a progra...
- TDL-4 - TDL-4 is sophisticated malware that facilitates the creation and ma...
- TDL-4 (TDSS or Alureon) - TDL-4 is sophisticated malware ...
- tdss - TDL-4 is sophisticated malware that facilitates the creation and main...
- the Indian Computer Emergency Response Team
- tokenization - Tokenization is the process of replacing sensitive da...
- two-way authentication - Mutual authentication, also calle...
- user-interface redressing - Clickjacking (also known as...
- variable manipulation - Variable manipulation is a method o...
- virtual appliance - A virtual appliance is a virtual machine im...
- virtual kill switch - A kill switch is a mechanism used to sh...
- virtual machine escape - What is virtual machine escape?Vi...
- virtual patching - Virtual patching is the quick development and...
- Voice over IP Security Alliance - VOIPSA (Voice o...
- VoIP security threats - As VoIP becomes increasingly preval...
- VOIPSA - VOIPSA (Voice over IP Security Alliance) is a cross-industry coal...
- VOIPSA (Voice over IP Security Alliance)
- volume testing - Load testing is the process of subjecting a compu...
- Vulnerability Discovery and Remediation
- WASC - The Web Application Security Consortium (WASC) is a worldwide organiz...
- Weave - Weave is a set of browser enhancements and associated services from...
- Web application security - Application security is the u...
- Web Application Security Consortium - The Web...
- Web Application Security Consortium (WASC)
- Web Services Trust Language - Web Services Trust Lang...
- Web Services Trust Language (WS-Trust)
- WGA - Windows Genuine Advantage (WGA) is a program that investigates Windows ...
- WikiScanner - WikiScanner is a free, Web-based database application t...
- wildcard certificate - A wildcard certificate is a digital c...
- Windows Genuine Advantage - Windows Genuine Advantage (...
- Windows Genuine Advantage (WGA) - Windows Genuine...
- wiretap Trojan - A wiretap Trojan is a program that surreptitiousl...
- WS Trust - Web Services Trust Language (WS-Trust) is a specification tha...
- WS-Trust - Web Services Trust Language (WS-Trust) is a specification tha...
- XML bomb - An XML (Extensible Markup Language) bomb is a small but dange...
- XSRF - Cross-site request forgery (XSRF or CSRF) is a method of attacking a ...
- XST - Cross-site tracing (XST) is a sophisticated form of cross-site scriptin...
- Zippo - Ransomware is a type of malware used for data kidnapping, an exploi...