-
-
- Email Discoverability
- Electronic discovery (also called e...
- eMail Evidence Discovery
- Electronic discovery (also ca...
- eMail Search and Discovery
- Electronic discovery (als...
- email spoofing
- E-mail spoofing is the forgery of an e-mail heade...
- emanation monitoring
- Tempest was the name of a classified ...
- EMR-shielding
- Tempest was the name of a classified (secret) U.S. ...
- encoding
- Encoding is the process of putting a sequence of characters (...
- encoding and decoding
- Encoding is the process of putting ...
- encoding/decoding
- Encoding is the process of putting a sequen...
- encrypt
- Encryption is the conversion of data into a form, called a ciph...
- Encrypting File System
- The Encrypting File System (EFS) ...
- Encrypting File System (EFS)
- The Encrypting File S...
- encryption
- Encryption is the conversion of data into a form, called ...
- encryption/decryption IC
- A data encryption/decryption ...
- endpoint fingerprinting
- Endpoint fingerprinting is a fe...
- endpoint security
- Endpoint security is an approach to network...
- endpoint security management
- Endpoint security man...
- ENISA
- The European Network and Information Security Agency (ENISA) is a E...
- ENISA (European Network and Information Securit...
- Enterprise Identity Mapping
- Enterprise Identity Map...
- Enterprise Identity Mapping (EIM)
- Enterprise ...
- enterprise mobility management (EMM)
- Enter...
- Enterprise Search and Discovery
- Electronic disc...
- enterprise security governance
- Enterprise securi...
- erasure coding
- Erasure coding (EC) is a method of data protectio...
- Escrowed Encryption Standard
- The Escrowed Encrypti...
- Escrowed Encryption Standard (EES)
- The Escro...
- ESP
- Event stream processing (ESP) is a software capacity designed to suppor...
- ethical hacker
- An ethical hacker is a computer and network exper...
- ethical hacking
- An ethical hacker is a computer and network exp...
- ethical worm
- An ethical worm is a program that automates network-b...
- EU Data Protection Directive
- EU Data Protection Di...
- EU Data Protection Directive (Directive 95/46/EC)
- European Computer Driving License
- The Europea...
- European Computer Driving License (ECDL)
- European Network and Information Security Agency
- event handler
- An event handler is a callback routine that operate...
- event handling
- Event handling is the receipt of an event at some...
- event stream processing
- Event stream processing (ESP) i...
- event stream processing (ESP)
- Event stream proces...
- evil twin
- In security, an evil twin is a home-made wireless access po...
- exploit
- In computing, an exploit is an attack on a computer system, esp...
- exponential key exchange
- Diffie-Hellman key exchange, ...
- extrusion prevention
- Extrusion prevention is the practice ...
- facial recognition
- Facial recognition (or face recognition) ...
- FACTA
- FACTA (Fair and Accurate Credit Transactions Act) is an amendment t...
- FACTA (Fair and Accurate Credit Transactions Act)
- Fair and Accurate Credit Transactions Act
- Fair Credit Reporting Act
- FCRA (Fair Credit Reporting...
- FairPlay
- FairPlay is a digital rights management (DRM) program from Ap...
- false acceptance
- False acceptance, also called a type II error...
- false acceptance (type II error)
- False accepta...
- false rejection
- False rejection, also called a type I error, is...
- false rejection (type I error)
- False rejection, ...
- false rejection rate
- False rejection, also called a type I...
- Family Educational Rights and Privacy Act of 1974
- FAR
- False acceptance, also called a type II error, is a mistake occasionall...
- Faraday cage
- A Faraday cage is a metallic enclosure that prevents ...
- FCRA
- FCRA (Fair Credit Reporting Act) is a United States Law that regulate...
- FCRA (Fair Credit Reporting Act)
- FCRA (Fair Cr...
- FDE
- What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryp...
- Federal Financial Institutions Examination Council
- Federal Information Processing Standardization 140
- federated identity management
- Federated Identity ...
- federated identity management (FIM)
- Federat...
- FERPA
- FERPA (Family Educational Rights and Privacy Act of 1974) is legisl...
- FERPA (Family Educational Rights and Privacy Ac...
- FFIEC compliance
- FFIEC compliance is conformance to a set of s...
- FFIEC compliance (Federal Financial Institution...
- FH-CDMA
- Frequency hopping is one of two basic modulation techniques use...
- FIM
- Federated Identity Management (FIM) is an arrangement that can be made ...
- Financial Services Authority
- The FSA (Financial Se...
- Financial Services Authority (FSA)
- The FSA (...
- finger image
- Fingerscanning, also called fingerprint scanning, is ...
- finger vein ID
- Finger vein ID is a biometric authentication syst...
- fingernail storage
- Fingernail storage is a method of writing...
- fingerprint scanning
- Fingerscanning, also called fingerpri...
- fingerscanning
- Fingerscanning, also called fingerprint scanning,...
- fingerscanning (fingerprint scanning)
- Fin...
- FIPS PUB 197
- The Advanced Encryption Standard (AES) is an encrypti...
- fire brigade attack
- A bucket brigade attack is one in which...
- fire fighting
- Firefighting is an emergency allocation of resource...
- firefighting
- Firefighting is an emergency allocation of resources,...
- Firefox 3.5
- Firefox 3.5 is a version of the Mozilla Foundation's We...
- Firesheep
- Firesheep is a Firefox plug-in that automates session hijac...
- Firestarter
- Firestarter is an open source firewall program for pers...
- firewall
- A firewall is a set of related programs, located at a network...
- Firewall Builder
- Firewall Builder, also called Fwbuilder, is a...
- Firewall Builder (Fwbuilder)
- Firewall Builder, als...
- first computer virus
- Elk Cloner was the first computer vir...
- fishing
- Phishing is an e-mail fraud method in which the perpetrator sen...
- Flexible Mandatory Access Control
- Flexible Ma...
- Flexible Mandatory Access Control (FMAC)
- FMAC
- Flexible Mandatory Access Control (FMAC) is an ongoing project intend...
- footbath
- In computers, a sheepdip (or, variously, sheep dipping or a f...
- footprinting
- In the study of DNA, footprinting is the method used ...
- forensic
- Forensic, in a general sense, means "related to or used in co...
- forensic watermark
- A forensic watermark, also called a digit...
- forensic watermark (digital watermark)
- Freedom of Information Act 2000
- The Freedom of ...
- frequency-hopping spread spectrum
- Frequency h...
- FSA
- The FSA (Financial Services Authority) is an independent, non-governmen...