Browse Definitions :

Browse Definitions by Alphabet

XPR - XWI

  • XPRL - XPRL (Extensible Public Relations Language) is an open specification for an XML-based language being developed for the public relations sector.
  • XPRL (Extensible Public Relations Language) - XPRL (Extensible Public Relations Language) is an open specification for an XML-based language being developed for the public relations sector.
  • XQL - XQL (XML Query Language) is a way to locate and filter the elements (data fields) and text in an Extensible Markup Language (XML) document.
  • XQL (XML Query Language) - XQL (XML Query Language) is a way to locate and filter the elements (data fields) and text in an Extensible Markup Language (XML) document.
  • XQuery - XQuery is a specification for a query language that allows a user or programmer to extract information from an Extensible Markup Language (XML) file or any collection of data that can be XML-like.
  • XrML (Extensible Rights Markup Language) - XrML (Extensible Rights Markup Language) is a proposed standard digital rights management (DRM) markup language.
  • XSD - XSD is a W3C recommendation that defines the way to utilize the elements in an XML document.
  • XSD (XML Schema Definition) - XSD is a W3C recommendation that defines the way to utilize the elements in an XML document.
  • XSL - XSL (Extensible Stylesheet Language), formerly called Extensible Style Language, is a language for creating a style sheet that describes how data sent over the Web using the Extensible Markup Language (XML) is to be presented to the user.
  • XSL (Extensible Stylesheet Language) - XSL (Extensible Stylesheet Language), formerly called Extensible Style Language, is a language for creating a style sheet that describes how data sent over the Web using the Extensible Markup Language (XML) is to be presented to the user.
  • XSL Transformations - XSL Transformations (XSLT) is a standard way to describe how to transform (change) the structure of an XML (Extensible Markup Language) document into an XML document with a different structure.
  • XSL Transformations (XSLT) - XSL Transformations (XSLT) is a standard way to describe how to transform (change) the structure of an XML (Extensible Markup Language) document into an XML document with a different structure.
  • XSLT - XSL Transformations (XSLT) is a standard way to describe how to transform (change) the structure of an XML (Extensible Markup Language) document into an XML document with a different structure.
  • xSP - xSP is a generic term for any kind of service provider on the Internet.
  • XSRF - Cross-site request forgery (XSRF or CSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user.
  • XSS - Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, into content from otherwise trusted websites.
  • XSS hole - Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, into content from otherwise trusted websites.
  • XST - Cross-site tracing (XST) is a sophisticated form of cross-site scripting (XSS) that can bypass security countermeasures already put in place to protect against XSS.
  • XTACACS - TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can be allowed to a given system.
  • Xubuntu - Ubuntu (pronounced oo-BOON-too) is an open source Debian-based Linux distribution.
  • XUL (Extensible User-interface Language) - XUL (Extensible User-interface Language) is a standard way to exchange data that describes a program's user interface, or at least the portion of it that can be controlled by programming.
  • XWindows - The X Window System (sometimes referred to as "X" or as "XWindows") is an open, cross-platform, client/server system for managing a windowed graphical user interface in a distributed network.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close