Browse Definitions :
228 results for:

HTTP

HTTP (Hypertext Transfer Protocol)

Definition | searchWinDevelopment

HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the...

intranet

Definition | WhatIs.com

An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among ...

Quick Start Glossary: PCI DSS (Payment Card Industry Data Security Standard)

Definition | WhatIs.com

Payment Card Industry Data Security Standard (PCI DSS): Print the glossary out for a fast reference or access online to see full definitions and ...

Instant Messaging: Glossary

Definition | SearchDomino

This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.

proxy server

Definition | WhatIs.com

What is a proxy server? A proxy server acts as an intermediary between an end user and the Internet for security, privacy, administrative control and...

cloud application

Definition | SearchCloudComputing

A cloud application, or cloud app, is a software program where cloud-based and local components work together.

denial-of-service attack

Definition | SearchSecurity

A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, ...

cipher

Definition | SearchSecurity

In cryptology, the discipline concerned with the study of cryptographic algorithms, a cipher is an algorithm for encrypting and decrypting data.

SSL VPN (Secure Sockets Layer virtual private network)

Definition | SearchSecurity

An SSL VPN is a type of virtual private network that uses the Secure Sockets Layer protocol -- or, more often, its successor, the Transport Layer ...

Web Services: Glossary

Definition | SearchMicroservices

This is a glossary of terms related to Web services.

vulnerability disclosure

Definition | SearchSecurity

Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that stipulates guidelines...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • GPS jamming

    GPS jamming is the process of using a frequency transmitting device to block or interfere with radio communications.

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

Close