Browse WI- - ZRT
-
- Wi-Fi - Wi-Fi is the popular term for a high-frequency wireless local area ...
- Wi-Fi (wireless fidelity) - Wi-Fi is the popular term f...
- Wi-Fi Protected Access - Wi-Fi Protected Access (WPA) is t...
- Wi-Fi Protected Access (WPA) - Wi-Fi Protected Acces...
- wide area file services - Wide-area file services (WAFS) ...
- wide-area file services - Wide-area file services (WAFS) ...
- wide-area file services (WAFS) - Wide-area file se...
- Wiegand - Wiegand is the trade name for a technology used in card readers...
- WiFi - Wi-Fi is the popular term for a high-frequency wireless local area ne...
- wildcard certificate - A wildcard certificate is a digital c...
- Wingate - Wingate is a product that allows people on a small home network...
- winnowing - Chaffing and winnowing are dual components of a privacy-enh...
- WinNuke - A "blue bomb" (also known as "WinNuke") is a technique for caus...
- Wired Equivalent Privacy - Wired Equivalent Privacy (WEP...
- Wired Equivalent Privacy (WEP) - Wired Equivalent ...
- wireless fidelity - Wi-Fi is the popular term for a high-freque...
- Wireless Transport Layer Security - Wireless Tr...
- Wireless Transport Layer Security (WTLS)
- wiretap Trojan - A wiretap Trojan is a program that surreptitiousl...
- wolf - In biometric verification, a goat is a system end-user who is refused...
- worm - In a computer, a worm is a self-replicating virus that does not alter...
- WPA - Wi-Fi Protected Access (WPA) is the latest security standard for users ...
- WS Trust - Web Services Trust Language (WS-Trust) is a specification tha...
- WS-Trust - Web Services Trust Language (WS-Trust) is a specification tha...
- WTLS - Wireless Transport Layer Security (WTLS) is the security level for Wi...
- X-ray body scanning - Backscatter body scanning is an X-ray-b...
- XPath injection - XPath injection is an attack targeting Web site...
- XTACACS - TACACS (Terminal Access Controller Access Control System) is an...
- zero day - A zero-day exploit is one that takes advantage of a security ...
- zero-day exploit - A zero-day exploit is one that takes advantag...
- Zimmermann Real Time Transport Protocol
- Zimmermann Real-Time Transport Protocol
- zombie - A zombie (also known as a bot) is a computer that a remote attack...
- zombie (bot) - A zombie (also known as a bot) is a computer that a r...
- zombie army - A zombie army (also known as a botnet) is a number of I...
- zoo - A zoo is a collection of viruses and worms that exist only in virus and...
- zphone - ZRTP is an extension of the Real-Time Transport Protocol (RTP) th...
- ZRTP - ZRTP is an extension of the Real-Time Transport Protocol (RTP) that d...
- ZRTP (Zimmermann Real-Time Transport Protocol)