-
-
- National Automated Clearing House Association
- National Automated Clearing House Association (...
- National Computer Security Center
- The Nationa...
- National Computer Security Center (NCSC)
- national ID card
- A national identity card is a portable docume...
- national identity card
- A national identity card is a por...
- NBA
- Network behavior analysis (NBA) is a method of enhancing the security o...
- NBAD
- Network behavior anomaly detection (NBAD) is the continuous monitorin...
- NBAR
- Network Based Application Recognition (NBAR) is a mechanism that clas...
- NBAR (Network Based Application Recognition)
- NCSC
- The National Computer Security Center (NCSC) is a U.S. government org...
- NDA
- A non-disclosure agreement (NDA) is a signed formal agreement in which ...
- Near Earth Object Surveillance Satellite
- Near Field Communication
- Near Field Communication (NFC...
- Near Field Communication (NFC)
- Near Field Commun...
- NEOSSat
- NEOSSat (Near Earth Object Surveillance Satellite) is a satelli...
- NEOSSat (Near Earth Object Surveillance Satellite)
- Nessus
- Nessus is an open-source network vulnerability scanner that uses ...
- net filter
- Netfilter is a utility in Linux 2.4 (and later releases) ...
- netfilter
- Netfilter is a utility in Linux 2.4 (and later releases) th...
- netfilter/iptables
- Netfilter is a utility in Linux 2.4 (and ...
- netmask
- In administering Internet sites, a netmask is a string of 0's a...
- Network Based Application Recognition
- Net...
- network behavior analysis
- Network behavior analysis (...
- network behavior analysis (NBA)
- Network behavio...
- network behavior anomaly detection
- Network b...
- network behavior anomaly detection (NBAD)
- network encryption
- Network encryption (sometimes called netw...
- network encryption (network layer or network le...
- network forensics
- Network forensics is the capture, recording...
- Network Intelligence India
- Network Intelligence Indi...
- Network Intelligence India Pvt Ltd
- Network I...
- Network Intelligence India Pvt. Ltd.
- Netwo...
- Network Intelligence India Pvt. Ltd. (NII Consu...
- network intrusion protection system
- A netwo...
- network intrusion protection system (NIPS)
- network layer
- Network encryption (sometimes called network layer,...
- network level encryption
- Network encryption (sometimes...
- network perimeter
- A network perimeter is the boundary between...
- network scanning
- Network scanning is a procedure for identifyi...
- Next Generation Secure Computing Base
- The...
- Next Generation Secure Computing Base (NGSCB)
- NFAT
- An infinite sequence is a list or string of discrete objects, usually...
- NFC
- Near Field Communication (NFC) is a short-range wireless connectivity s...
- NGSCB
- The Next Generation Secure Computing Base (NGSCB) is a part of the ...
- NII Consulting
- Network Intelligence India Pvt. Ltd. (NII Consult...
- Nimda
- First appearing on September 18, 2001, Nimda is a computer virus th...
- NIPS
- A network intrusion protection system (NIPS) is an umbrella term for ...
- NIST 800 Series
- The NIST 800 Series is a set of documents that ...
- NO to a national ID
- NO2ID is a grass-roots campaign in the ...
- NO2ID
- NO2ID is a grass-roots campaign in the UK that developed in opposit...
- NO2ID (NO to a national ID)
- NO2ID is a grass-roots ...
- non disclosure agreement
- A non-disclosure agreement (N...
- non-disclosure agreement
- A non-disclosure agreement (N...
- non-disclosure agreement (NDA)
- A non-disclosure ...
- non-repudiation
- Nonrepudiation is the assurance that someone ca...
- nonce
- A nonce, in information technology, is a number generated for a spe...
- nonce (number used once or number once)
- nonrepudiation
- Nonrepudiation is the assurance that someone cann...
- nuking
- A "blue bomb" (also known as "WinNuke") is a technique for causin...
- number once
- A nonce, in information technology, is a number generat...
- number used once
- A nonce, in information technology, is a numb...
- OAuth
- OAuth (Open Authorization) is an open protocol for token-based auth...
- OCR
- OCR (optical character recognition) is the recognition of printed or wr...
- OCR (optical character recognition)
- OCR (op...
- OCSP
- OCSP (Online Certificate Status Protocol) is one of two common scheme...
- OCSP (Online Certificate Status Protocol)
- OFB
- In cryptography, output feedback (OFB) is a mode of operation for a blo...
- onboarding and offboarding
- In identity management, o...
- one-time pad
- In cryptography, a one-time pad is a system in which ...
- OneID
- OneID is a digital identity management service that provides a repo...
- online backup
- Online backup is a method of offsite data storage i...
- online backup (remote backup)
- Online backup is a ...
- Online Certificate Security Protocol
- OCSP ...
- Online Certificate Status Protocol
- OCSP (Onl...
- Online Customer Privacy
- Consumer privacy, also known as...
- open id
- OpenID is a decentralized single sign-on authentication system ...
- Open Source Hardening Project
- The Open Source Har...
- Open System Authentication
- Open System Authenticatio...
- Open System Authentication (OSA)
- Open System A...
- OpenBSD
- OpenBSD is a free open source operating system based upon the B...
- OpenID
- OpenID is a decentralized single sign-on authentication system fo...
- operational costs
- Definition - In information technology, ope...
- OSA
- Open System Authentication (OSA) is a process by which a computer can g...
- output feedback
- In cryptography, output feedback (OFB) is a mod...
- output feedback (OFB)
- In cryptography, output feedback (O...
- ownership tag
- An ownership tag is a security feature on Compaq co...
- P and NP
- P versus NP (polynomial versus nondeterministic polynomial) r...
- P equals NP
- P versus NP (polynomial versus nondeterministic polynom...
- P versus NP
- P versus NP (polynomial versus nondeterministic polynom...
- P versus NP (polynomial versus nondeterministic...
- PA DSS
- Payment Application Data Security Standard (PA-DSS) is a set of r...
- PA-DSS
- Payment Application Data Security Standard (PA-DSS) is a set of r...
- PA-DSS (Payment Application Data Security Stand...
- packet mangling
- Packet mangling is the modification of packets ...
- packet monkey
- On the Internet, a packet monkey is someone (see cr...
- Palladium
- Palladium is a plan from Intel, AMD, and Microsoft to build...
- PAN truncation
- PAN (primary account number) truncation is a tech...
- PAN truncation (primary account number)
- parameter tampering
- Parameter tampering is a form of Web-ba...
- partner portal
- A partner portal is a Web-based application that ...