Browse Definitions :
197 results for:

URL

URL (Uniform Resource Locator)

Definition | searchNetworking

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address.

session hijacking (TCP session hijacking)

Definition | SearchSoftwareQuality

Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and...

history

Definition | WhatIs.com

In a Web browser, the history is a detailed list of Web sites the computer has visited which remains in a computer's memory for a pre-determined ...

Google Alert

Definition | WhatIs.com

Google Alert is an automated Web search service that can help people and businesses monitor the Internet for developments and activities that could ...

ICQ

Definition | SearchWindowsServer

ICQ ("I Seek You") is a program you can download that will let you know when friends and contacts are also online on the Internet.

tilde

Definition | WhatIs.com

A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~. It's a special typographic character found on most keyboards that means various things,...

trap

Definition | WhatIs.com

In a Web site, a trap is a page that does not allow the reader to back up a previous page (the Back button on the toolbar is inoperable).

session prediction (credential/session prediction)

Definition | SearchSoftwareQuality

Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an ...

splash page (splash screen)

Definition | WhatIs.com

A splash page (or splash screen) is: An initial Web site page used to capture the user's attention for a short time as a promotion or lead-in to the...

Symantec.cloud Service Provider Program

Definition | SearchITChannel

The Symantec.cloud Service Provider Program is Symantec’s partner program for managed service providers, hosted application providers, Internet ...

symmetric communications

Definition | SearchNetworking

Compare asymmetric communications.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems -- including hardware, software and data -- from cyberattacks.

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close