Browse Definitions :

Contact Us

Send us your comments

WhatIs.com welcomes your feedback. Our goal is to create the best Computer Dictionary-specific site on the web. One way we can do that is by listening to your feedback. We will try to address all feedback on a case-by-case basis. Please be patient.

Thank you for your interest in WhatIs.com.

Thank you for your feedback.

* Indicates field is required

Incorrect please try again

Write, call or fax

WhatIs.com

c/o TechTarget

275 Grove Street

Newton, MA 02466

Phone: (617) 431-9200

Fax: (617) 431-9201

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close