Skip to content

Latest commit

 

History

History
97 lines (80 loc) · 6.22 KB

glossary.md

File metadata and controls

97 lines (80 loc) · 6.22 KB

Bookmarks tagged [glossary]

https://www.ssl.com/faqs/what-is-an-x-509-certificate/

X.509 is a standard format for public key certificates, digital documents that securely associate cryptographic key pairs with identities such as websites, individuals, or organizations.

Firs...


https://en.wikipedia.org/wiki/Eavesdropping

Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.


https://www.sciencedirect.com/topics/computer-science/entropy

Entropy, in cyber security, is a measure of the randomness or diversity of a data-generating function. Data with full entropy is completely random and no meaningful patterns can be found. Low entr...


https://kubernetes.io/docs/reference/glossary/

This glossary is intended to be a comprehensive, standardized list of Kubernetes terminology. It includes technical terms that are specific to K8s, as well as more general terms that provide useful co...


https://en.wikipedia.org/wiki/Hungarian_notation

Hungarian notation is an identifier naming convention in computer programming, in which the name of a variable or function indicates its intention or kind, and in some dialects its type. The original ...


https://en.wikipedia.org/wiki/Key_escrow

Key escrow (also known as a “fair” cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party...


https://en.wikipedia.org/wiki/Publish%E2%80%93subscribe_pattern

In software architecture, publish–subscribe is a messaging pattern where senders of messages, called publishers, do not program the messages to be sent directly to specific receivers, called subscribe...


https://en.wikipedia.org/wiki/Transaction_log

In the field of databases in computer science, a transaction log (also transaction journal, database log, binary log or audit trail) is a history of actions executed by a database management system us...


https://en.wikipedia.org/wiki/Request_for_Comments

A Request for Comments (RFC), in the context of Internet technology, is a type of publication from the Internet technical community, including the Internet Engineering Task Force (IETF), the principal...


https://computer.howstuffworks.com/vpn4.htm

Site-to-site VPN - A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other. Learn how site-to-site VPNs works.


https://www.gartner.com/it-glossary/

IT Terms, IT Dictionary & IT Definitions


http://whatis.techtarget.com/

Technology Definitions and Cheat Sheets from WhatIs.com - The Tech Dictionary and IT Encyclopedia


https://en.wikipedia.org/wiki/Spoofing_attack

In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage.


https://www.youtube.com/watch?v=43fqzaSH0CQ

Building efficient data centers that can hold thousands of machines is hard enough. Programming thousands of machines is even harder. One approach pioneered by Google is known as MapReduce. MapReduce ...


https://docs.mongodb.com/manual/reference/glossary/

Find definition of database, collection, document, BSON etc.