Browse MES - PAR
-
- message authentication code - A cryptographic checksu...
- message integrity code - A cryptographic checksum is a mat...
- metamorphic and polymorphic malware - Metamor...
- metamorphic malware - Metamorphic malware is malicious softwa...
- MFA - Multifactor authentication (MFA) is a security system in which more tha...
- MFT - What is managed file transfer (MFT)?Managed file transfer (MFT) is a ty...
- MICR - MICR (magnetic ink character recognition) is a technology used to ver...
- MICR (magnetic ink character recognition)
- micro-botnet - A micro-botnet, also called a mini-botnet or baby bot...
- micro-botnet (mini-botnet or baby botnet)
- Microsoft Antigen - Microsoft Antigen is a set of programs that...
- Microsoft Management Console - The Microsoft Managem...
- Microsoft Management Console (MMC) - The Micro...
- Microsoft Point to Point Encryption - MPPE (M...
- Microsoft Point-to-Point Encryption - MPPE (M...
- mini botnet - A micro-botnet, also called a mini-botnet or baby botne...
- minutiae - In the biometric process of fingerscanning, minutiae are spec...
- mitm - A man-in-the-middle (MitM) attack is an exploit in which an intruder ...
- MitM - Active man-in-the-middle (MitM) is an attack method that allows an in...
- MitM attack - A man-in-the-middle (MitM) attack is an exploit in whic...
- MMC - The Microsoft Management Console (MMC) is an application that provides ...
- mobile device attack - A mobile device attack is an exploit ...
- mobile phone spam - SMS spam (sometimes called cell phone spam)...
- Modes of Attack - Test yourself. A WhatIs.com tech vocabulary qui...
- modification detection code - A cryptographic checksu...
- MPPE - MPPE (Microsoft Point-to-Point Encryption) is a method of encrypting ...
- MPPE (Microsoft Point-to-Point Encryption)
- MSSP - An MSSP (managed security service provider) is an Internet service pr...
- MSSP (managed security service provider)
- multi part virus - A hybrid virus (sometimes called a multi-part...
- multi-part virus - A hybrid virus (sometimes called a multi-part...
- multifactor authentication - Multifactor authenticatio...
- multifactor authentication (MFA) - Multifactor a...
- multipartite virus - A hybrid virus (sometimes called a multi-...
- mutual authentication - Mutual authentication, also called ...
- National Computer Security Center - The Nationa...
- National Computer Security Center (NCSC)
- national ID card - A national identity card is a portable docume...
- national identity card - A national identity card is a por...
- NBA - Network behavior analysis (NBA) is a method of enhancing the security o...
- NBAD - Network behavior anomaly detection (NBAD) is the continuous monitorin...
- NBAR - Network Based Application Recognition (NBAR) is a mechanism that clas...
- NBAR (Network Based Application Recognition)
- NCSC - The National Computer Security Center (NCSC) is a U.S. government org...
- Near Earth Object Surveillance Satellite
- Near Field Communication - Near Field Communication (NFC...
- Near Field Communication (NFC) - Near Field Commun...
- NEOSSat - NEOSSat (Near Earth Object Surveillance Satellite) is a satelli...
- NEOSSat (Near Earth Object Surveillance Satellite)
- Nessus - Nessus is an open-source network vulnerability scanner that uses ...
- Network Based Application Recognition - Net...
- network behavior analysis - Network behavior analysis (...
- network behavior analysis (NBA) - Network behavio...
- network behavior anomaly detection - Network b...
- network behavior anomaly detection (NBAD)
- network encryption - Network encryption (sometimes called netw...
- network encryption (network layer or network le...
- network forensics - Network forensics is the capture, recording...
- network layer - Network encryption (sometimes called network layer,...
- network level encryption - Network encryption (sometimes...
- network perimeter - A network perimeter is the boundary between...
- network scanning - Network scanning is a procedure for identifyi...
- Next Generation Secure Computing Base - The...
- Next Generation Secure Computing Base (NGSCB)
- NFAT - An infinite sequence is a list or string of discrete objects, usually...
- NFC - Near Field Communication (NFC) is a short-range wireless connectivity s...
- NGSCB - The Next Generation Secure Computing Base (NGSCB) is a part of the ...
- Nimda - First appearing on September 18, 2001, Nimda is a computer virus th...
- NIST 800 Series - The NIST 800 Series is a set of documents that ...
- non-repudiation - Nonrepudiation is the assurance that someone ca...
- nonce - A nonce, in information technology, is a number generated for a spe...
- nonce (number used once or number once)
- nonrepudiation - Nonrepudiation is the assurance that someone cann...
- nuking - A "blue bomb" (also known as "WinNuke") is a technique for causin...
- number once - A nonce, in information technology, is a number generat...
- number used once - A nonce, in information technology, is a numb...
- OCSP - OCSP (Online Certificate Status Protocol) is one of two common scheme...
- OCSP (Online Certificate Status Protocol)
- OFB - In cryptography, output feedback (OFB) is a mode of operation for a blo...
- offensive security - Offensive security is a proactive and ant...
- one-time pad - In cryptography, a one-time pad is a system in which ...
- OneID - OneID is a digital identity management service that provides a repo...
- Online Certificate Security Protocol - OCSP ...
- Online Certificate Status Protocol - OCSP (Onl...
- Online Customer Privacy - Consumer privacy, also known as...
- Open System Authentication - Open System Authenticatio...
- Open System Authentication (OSA) - Open System A...
- Operation Phish Phry - Operation Phish Phry is a cybercrime ...
- OSA - Open System Authentication (OSA) is a process by which a computer can g...
- out-of-band patch - An out-of-band patch is a patch released at...
- output feedback - In cryptography, output feedback (OFB) is a mod...
- output feedback (OFB) - In cryptography, output feedback (O...
- ownership tag - An ownership tag is a security feature on Compaq co...
- P and NP - P versus NP (polynomial versus nondeterministic polynomial) r...
- P equals NP - P versus NP (polynomial versus nondeterministic polynom...
- P versus NP - P versus NP (polynomial versus nondeterministic polynom...
- P versus NP (polynomial versus nondeterministic...
- packet monkey - On the Internet, a packet monkey is someone (see cr...
- Palladium - Palladium is a plan from Intel, AMD, and Microsoft to build...
- parameter tampering - Parameter tampering is a form of Web-ba...