Browse Definitions :
  • May 13, 2014 13 May'14

    pronoun

    A pronoun is a non-specific word that stands in for a noun, in situations where it should be clearly understood what or whom the pronoun refers to. The noun that the pronoun substitutes for is often placed closer to the start of the sentence; the ...  Continue Reading

  • May 12, 2014 12 May'14

    peer-to-peer botnet (P2P botnet)

    A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge.  Just as in the traditional botnet, which includes a command-and-control server, the bots are ...  Continue Reading

  • May 12, 2014 12 May'14

    botnet topology

    A botnet topology is the network structure by which botnet interconnections are organized. Botnet topologies may be either centralized around a command and control server (C&C server) or decentralized using peer-to-peer (P2P) communication.  Continue Reading

  • May 08, 2014 08 May'14

    noun

    A noun is a word used to identify an entity, a place, a thing or a concept; respectively, for example, Grace Hopper, Silicon Valley, a smartphone and synchronicity.  Continue Reading

  • May 06, 2014 06 May'14

    high-frequency trading (HFT)

    High-frequency trading (HFT) is the use of sophisticated software and high-end hardware to gain a speed advantage in automated trading systems. On a per-trade basis, the practice yields very little; however, traders who use the system make a great ...  Continue Reading

  • May 06, 2014 06 May'14

    computational fluid dynamics (CFD)

    Computational fluid dynamics (CFD) is the use of applied mathematics, physics and computational software to visualize how a gas or liquid flows -- as well as how the gas or liquid affects objects as it flows past.  Continue Reading

  • May 05, 2014 05 May'14

    wiretapping

    Wiretapping is the surreptitious electronic monitoring of telephone, telegraph, cellular, fax or Internet-based communications. Wiretapping is achieved either through the placement of a monitoring device informally known as a bug on the wire in ...  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • capacity management

    Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close