Browse Definitions :
197 results for:

URL

URL (Uniform Resource Locator)

Definition | searchNetworking

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address.

ad server

Definition | WhatIs.com

An ad server is software that stores advertising content and delivers it to websites and applications.

Great Firewall of China

Definition | WhatIs.com

The Great Firewall of China is a country wide firewall that restricts content that is censored by the Chinese Government, protecting infrastructure ...

Google hacking (Google scanning or Engine hacking)

Definition | SearchSecurity

Google hacking is the use of a search engine, such as Google, to locate a security vulnerability on the Internet...

distributed search

Definition | WhatIs.com

Distributed search is a search engine model in which the tasks of Web crawling, indexing and query processing are distributed among multiple ...

SMiShing (SMS phishing)

Definition | SearchMobileComputing

SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone. ...

AWS SDK for Go

Definition | SearchAWS

The AWS SDK for Go is a collection of tools that helps a developer integrate applications built with the Go programming language into the Amazon Web ...

arachniography

Definition | WhatIs.com

An arachniography (pronounced uh-RAK-nee-AH-gruf-ee) is a bibliography of Web pages.

proxy hacking

Definition | SearchITChannel

Proxy hacking, also known as proxy hijacking, is an attack technique designed to supplant an authentic Web page in a search engine's index and search...

content delivery (content distribution, content distribution delivery, or content caching)

Definition | WhatIs.com

On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of ...

Microsoft Office 365 Advanced Threat Protection

Definition | SearchWindowsServer

Microsoft Office 365 Advanced Threat Protection (ATP) is Microsoft's optional cloud-based service that scans and filters email to protect subscribers...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close