Browse Definitions :
197 results for:

URL

URL (Uniform Resource Locator)

Definition | searchNetworking

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address.

input validation attack

Definition | WhatIs.com

An input validation attack is any malicious action against a computer system that involves manually entering strange information into a normal user ...

destreaming

Definition | WhatIs.com

Destreaming, in a multimedia context, is the practice of saving streamed data as a file.

phtml suffix (PHP)

Definition | WhatIs.com

A PHTML (or it's sometimes called a PHP) page is a Web page that includes a script written in PHP, a language comparable to JavaScript or Microsoft's...

pharming

Definition | SearchSecurity

Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites ...

shoppable video

Definition | WhatIs.com

A shoppable video is a multimedia recording that allows a user to initiate an order from within the video. Typically, a shoppable video demonstrates...

domain name

Definition | SearchWinDevelopment

A domain name locates an organization or other entity on the Internet. For example, the domain name "www.totalbaseball.com" locates an Internet ...

fake news

Definition | WhatIs.com

Fake news is an inaccurate, sometimes sensationalistic report that is created to gain attention, mislead, deceive or damage a reputation. Unlike ...

HTTPS (HTTP over SSL or HTTP Secure)

Definition | SearchSoftwareQuality

HTTPS (HTTP over SSL or HTTP Secure) is the use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP ...

choreography

Definition | SearchAppArchitecture

Choreography, in a Web services context, refers to specifications for how messages should flow among diverse, interconnected components and ...

XPointer

Definition | WhatIs.com

XPointer is a language for locating data within an Extensible Markup Language (XML) document based on properties such as location within the document...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close