-
-
- demilitarized zone
- In computer networks, a DMZ (demilitarize...
- deniable encryption
- Deniable encryption is a type of crypto...
- deperimeterisation
- In network security, deperimeterization i...
- deperimeterization
- In network security, deperimeterization i...
- depository
- A depository is a file or set of files in which data is s...
- DES
- Data Encryption Standard (DES) is a widely-used method of data encrypti...
- desktop administration
- Desktop management is a comprehen...
- desktop firewall
- A personal firewall (sometimes called a deskt...
- desktop security
- Desktop management is a comprehensive approac...
- DHA
- A directory harvest attack (DHA) is an attempt to determine the valid e...
- dictionary attack
- A dictionary attack is a method of breaking...
- differential power analysis (DPA)2
- A differe...
- differential power analysis2
- A differential power ...
- Diffie Hellman key exchange
- Diffie-Hellman key exch...
- Diffie-Hellman key exchange
- Diffie-Hellman key exch...
- Diffie-Hellman key exchange (exponential key ex...
- digest authentication
- Digest authentication is a method o...
- Digital Discovery
- Electronic discovery (also called e-discove...
- Digital Evidence
- Electronic discovery (also called e-discovery...
- Digital Evidence Discovery
- Electronic discovery (als...
- Digital Signature Standard
- Digital Signature Standar...
- Digital Signature Standard (DSS)
- Digital Signa...
- Digital Silhouettes
- Digital Silhouettes is the trademarked ...
- digital watermark
- A forensic watermark, also called a digital...
- Directive 95/46/EC
- EU Data Protection Directive (also known ...
- directory climbing
- Directory traversal is a form of HTTP exp...
- directory harvest attack
- A directory harvest attack (D...
- directory harvest attack (DHA)
- A directory harve...
- directory traversal
- Directory traversal is a form of HTTP e...
- disaster recovery
- A disaster recovery plan (DRP) -- sometimes...
- disaster recovery plan
- A disaster recovery plan (DRP) --...
- disaster recovery plan (DRP)
- A disaster recovery p...
- disaster recovery planning
- A disaster recovery plan ...
- disposable email
- What is a disposable email?Disposable email i...
- distributed denial of service attack
- On th...
- distributed denial-of-service attack
- On th...
- distributed denial-of-service attack (DDoS)
- distributed DoS attack
- On the Internet, a distributed de...
- DLP
- Data loss prevention (DLP) is a strategy for making sure that end users...
- DMS
- The Defense Message System (DMS) is a secure X.400-based e-mail system ...
- DMZ
- In computer networks, a DMZ (demilitarized zone) is a computer host or ...
- DMZ (demilitarized zone)
- In computer networks, a DMZ (...
- DNS cache poisoning
- Cache poisoning, also called domain nam...
- DNS poisoning
- Cache poisoning, also called domain name system (DN...
- DNS Security Extensions
- DNS Security Extensions (DNSSEC...
- DNS Security Extensions (DNSSEC)
- DNS Security ...
- DNSSEC
- DNS Security Extensions (DNSSEC) are a set of Internet Engineerin...
- domain name system poisoning
- Cache poisoning, also...
- DomainKeys
- DomainKeys is an anti-spam software application in develo...
- dongle
- A dongle (pronounced DONG-uhl) is a mechanism for ensuring that o...
- DPA2
- A differential power analysis (DPA) attack is an exploit based on ana...
- DPM
- Data protection management (DPM) is the administration of backup proces...
- DRA
- A data recovery agent (DRA) is a Microsoft Windows user who has been gr...
- drive-by pharming
- Drive-by pharming is a vulnerability exploi...
- drive-by spamming
- Drive-by spamming is a variation of drive-b...
- DRP
- A disaster recovery plan (DRP) -- sometimes referred to as a business c...
- DSCI
- The Data Security Council of India (DSCI) is a not-for-profit organiz...
- DSO exploit
- A data source object (DSO) exploit is a form of spyware...
- DSO exploit (data source object exploit)
- DSS
- Digital Signature Standard (DSS) is the digital signature algorithm(DSA...
- due diligence
- Due diligence is the process of systematically rese...
- dumb
- A dumb network is one that provides the physical interconnection betw...
- dumb network
- A dumb network is one that provides the physical inte...
- dump site
- A topsite is a stringently protected underground FTP server...
- dynamic packet filter
- A dynamic packet filter is a firewa...
- e discovery
- Electronic discovery (also called e-discovery or edisco...
- e-discovery
- Electronic discovery (also called e-discovery or edisco...
- e-Mail Discoverability
- Electronic discovery (also called...
- e-mail extractor
- An e-mail extractor is a program that finds e...
- e-mail forgery
- E-mail spoofing is the forgery of an e-mail heade...
- eavesdropping
- Eavesdropping is the unauthorized real-time interce...
- ECB
- Electronic Code Book (ECB) is a mode of operation for a block cipher, w...
- ECC
- Elliptical curve cryptography (ECC) is a public key encryption techniqu...
- ECDL
- The European Computer Driving License (ECDL) is a certification for q...
- Echelon
- Echelon is an officially unacknowledged U.S.-led global spy net...
- EDD
- Electronic discovery (also called e-discovery or ediscovery) refers to ...
- ediscovery
- Electronic discovery (also called e-discovery or ediscove...
- EES
- The Escrowed Encryption Standard (EES) is a standard for encrypted comm...
- EFS
- The Encrypting File System (EFS) is a feature of the Windows 2000 opera...
- EIM
- Enterprise Identity Mapping (EIM) is an open architecture from IBM for ...
- electro-optical fingerprint recognition
- Electrohippies Collective
- The Electrohippies Collecti...
- Electronic Code Book
- Electronic Code Book (ECB) is a mode ...
- Electronic Code Book (ECB)
- Electronic Code Book (ECB...
- Electronic Content Discovery
- Electronic discovery ...
- Electronic Data Discovery
- Electronic discovery (also ...
- Electronic Data Management
- Electronic discovery (als...
- electronic discovery
- Electronic discovery (also called e-d...
- electronic discovery (e-discovery or ediscovery)
- Electronic Document Discovery
- Electronic discover...
- Electronic Evidence
- Electronic discovery (also called e-dis...
- Electronic Evidence Discovery
- Electronic discover...
- Electronic Information Discovery
- Electronic di...
- Electronic-discovery
- Electronic discovery (also called e-d...
- Elk Cloner
- Elk Cloner was the first computer virus known to have spr...
- elliptical curve cryptography
- Elliptical curve cr...
- elliptical curve cryptography (ECC)
- Ellipti...