Browse Definitions :
197 results for:

URL

URL (Uniform Resource Locator)

Definition | searchNetworking

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address.

dead body spam (corpse graffiti)

Definition | WhatIs.com

Dead body spam, also known as corpse graffiti, is a message in a video game that's spelled out with dead characters.

404 (status code)

Definition | WhatIs.com

404 is a frequently-seen status code that tells a Web user that a requested page is "Not found."

Forward DNS lookup

Definition | SearchNetworking

Forward DNS lookup is using an Internet domain name to find an IP address.

Rock Phish

Definition | SearchSecurity

Rock Phish is both a phishing toolkit and the entity that publishes the kit, either a hacker, or, more likely, a sophisticated group of hackers. ...

dark web (darknet)

Definition | WhatIs.com

The dark web, also referred to as the darknet, is an encrypted portion of the internet that is not indexed by search engines and requires specific ...

querystring

Definition | WhatIs.com

A querystring is a set of characters input to a computer or Web browser and sent to a query program to recover specific information from a database.

API endpoint

Definition | SearchAppArchitecture

An API endpoint is a point at which an application program interface (API) -- the code that allows two software programs to communicate with each ...

bookmarklet

Definition | WhatIs.com

A bookmarklet is a JavaScript applet that runs directly in the browser.

Web bug (Web beacon)

Definition | WhatIs.com

A Web bug, also known as a Web beacon, is a file object (usually a graphic image such as a transparent GIF) that is placed on a Web page or in an ...

recursive DNS query

Definition | WhatIs.com

A recursive DNS query is a request from a client for a website that must be responded to with either the sought response or an error message stating ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close