Browse Definitions :
197 results for:

URL

URL (Uniform Resource Locator)

Definition | searchNetworking

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address.

hacktivism

Definition | SearchSecurity

Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

RESTful API

Definition | SearchAppArchitecture

A RESTful API is an application program interface (API) that uses HTTP requests to GET, PUT, POST and DELETE data. A RESTful API -- also referred to ...

KnujOn

Definition | WhatIs.com

KnujOn is an interactive Web-based spam reporting service. Through persistent policy enforcement, KnujOn reduces the value of unsolicited bulk email ...

htaccess

Definition | SearchNetworking

.htaccess is the default name for a file that is used to indicate who can or cannot access the contents of a specific file directory from the ...

file storage

Definition | SearchStorage

File storage stores data in a hierarchical structure, usually in a NAS system. The system storing data and the client retrieving data see files and ...

Microsoft Windows Information Protection (WIP)

Definition | SearchEnterpriseDesktop

Windows Information Protection is a feature built into Windows 10 that allows IT shops to control and manage business data separately from personal ...

12 factor app (twelve-factor app)

Definition | SearchSoftwareQuality

Twelve-factor app is a methodology for building distributed applications that run in the cloud and are delivered as a service. The approach was ...

Heap

Definition | SearchDataManagement

Heap is a user analytics tool which can be utilized to capture all web, mobile and cloud-based user interactions in an application.

network traffic

Definition | SearchNetworking

Network traffic, sometimes referred to as data traffic, is the amount of data which moves across a network during any given time.

next-generation firewall (NGFW)

Definition | SearchSecurity

A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close