Browse Definitions :
228 results for:

HTTP

HTTP (Hypertext Transfer Protocol)

Definition | searchWinDevelopment

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the...

digital object identifier (DOI)

Definition | WhatIs.com

A DOI (digital object identifier) is a permanent identifier given to a Web file or other Internet document so that if its Internet address changes, ...

Zabbix

Definition | SearchITOperations

Zabbix is an open source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services.

cross-site scripting (XSS)

Definition | SearchSecurity

Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, into content from ...

cloud object storage

Definition | SearchStorage

Cloud object storage is a format for storing unstructured data in the cloud. Object storage is considered a good fit for the cloud because it is ...

Secure Electronic Transaction (SET)

Definition | SearchFinancialSecurity

Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet.

CloudAudit

Definition | SearchCloudSecurity

CloudAudit is a specification for the presentation of information about how a cloud computing service provider addresses control frameworks. The ...

drive-by pharming

Definition | SearchSecurity

Drive-by pharming is a vulnerability exploitation method in which the attacker takes advantage of an inadequately unprotected broadband router to ...

Squid proxy server

Definition | WhatIs.com

Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.

Java Platform, Enterprise Edition (Java EE)

Definition | TheServerSide.com

The Java Platform, Enterprise Edition (Java EE) is a collection of Java APIs owned by Oracle that software developers can use to write server-side ...

Audiobook: Intrusion Prevention Fundamentals

Definition | SearchNetworking

Intrusion Prevention Fundamentals: An introduction to network attack mitigation with IPS

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

  • incident response team

    An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

  • Hadoop as a service (HaaS)

    Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in...

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

Close