Jump to content

User:Platinum713/Books/Telecommunications

From Wikipedia, the free encyclopedia


Telecommunications

[edit]
Telecom Act of 1996
003 (UN M.49 code)
360 Safeguard
3G-324M
9P
ACARM-ng
Ad Hoc Configuration Protocol
Administrative division codes of the People's Republic of China
Administrative domain
Advanced Message Queuing Protocol
AEGIS SecureConnect
Aggregate Level Simulation Protocol
Airport code
Amateur radio satellite
Anomaly-based intrusion detection system
Anti-pharming
Anti-worm
Apache Avro
Apache Thrift
Application layer
Application-level gateway
Architecture for Control Networks
Armitage (computing)
ARP spoofing
ARPA Host Name Server Protocol
ArpON
Asprox botnet
Attack tree
Authenticated Identity Body
Authentication server
Bagle (computer worm)
BartVPN
Bastion host
BC Geographical Names
BitTorrent
BitTorrent tracker
Black hole (networking)
Blacker (security)
Boot Service Discovery Protocol
Botnet
BredoLab botnet
Browser security
Byzantine Foothold
C-squares
Call Admission Control
CAMEL Application Part
Captive portal
Capture the flag
CCSO Nameserver
Chapman code
Character Generator Protocol
Check Point GO
Check Point VPN-1
CimTrak
Cipher suite
Cisco Global Exploiter
Cisco PIX
Cisco Security Agent
Cisco Systems VPN Client
Classification of objects of the administrative-territorial system of Ukraine
Clear channel assessment attack
Client Puzzle Protocol
Client–server model
CLLI code
Cloudvpn
Communications satellite
Community Identification Number
Computer security
Context-based access control
ContraVirus
Countermeasure (computer)
Country code
Cracking of wireless networks
CubeSat
Cutwail botnet
CVSS
Cyber security and countermeasure
CyberCIEGE
D-Bus
Daytime Protocol
DDoS mitigation
Deep content inspection
Deep packet inspection
Defense in depth (computing)
Device fingerprint
DHCP snooping
DHCPv6
DHIPDS
DICOM
Differentiated security
Digital Postmarks
Direct Save Protocol
Directory Access Protocol
Discard Protocol
Distributed Codec Engine
Distributed Data Protocol
Distributed firewall
Distributed Interactive Simulation
Distributed Social Networking Protocol
Distributed Universal Number Discovery
DMZ (computing)
Domain Name System
Donbot botnet
Dual-homed
Dynamic Host Configuration Protocol
E2eTechnology
EAIF
Earth observation satellite
Echo Protocol
EGL (API)
Egress filtering
End node problem
Etch (protocol)
Evil bit
Extranet
Fail2ban
Fake AP
Faraday tent
Federal Geographic Data Committee
Federal Information Processing Standard state code
Festi botnet
File Access Listener
File Transfer Protocol
Financial Information eXchange
Firewalk (computing)
Firewall (computing)
Firewall pinhole
Firewalls and Internet Security
Forward-confirmed reverse DNS
FTAM
FTP servlet
FTPS
Gazetteer of Australia
Generalized TTL security mechanism
Geo URI
Geo-imputation
Geocoding
Geographic coordinate system
Geographic Names Information System
Geographical Names Board of Canada
Geohash
Geohash-36
GeoNames
GEOnet Names Server
Geoparsing
GeoSMS
Geotagging
Global Telecoms Exploitation
Gnutella
Google Safe Browsing
Gopher (protocol)
Greynet
Grid (spatial index)
Grum botnet
Guided tour puzzle protocol
Gumblar
H.248
H.323
Hacker (computer security)
High-Tech Bridge
Hole punching
Honeyd
HoneyMonkey
Honeynet Project
Honeypot (computing)
Honeytoken
Hookflash
Host Identity Protocol
HTTP 2.0
HTTP body data
Hyper geocode
Hyper Text Coffee Pot Control Protocol
Hypertext Transfer Protocol
IBM Advanced Program-to-Program Communication
ICMP hole punching
Identity driven networking
IEC 62351
IEEE 802.1X
IF-MAP
INAP
Ingress filtering
Integrated Windows Authentication
Inter-Asterisk eXchange
Inter-protocol exploitation
International Air Transport Association airport code
Internet
Internet Communications Engine
Internet Message Access Protocol
Internet Open Trading Protocol
Internet Relay Chat
IntruShield
Intrusion prevention system
IPFilter
Ipfirewall
IpTTY
ISCSI
ISCSI Boot Firmware Table
ISDN User Part
ISP redirect page
Java Naming and Directory Interface
Java Remote Method Protocol
Jingle (protocol)
KAME project
Kaspersky Anti-Virus
Kelihos botnet
Kerberos (protocol)
Kerio Control
Key distribution center
Key ring file
Knowledge-based authentication
Kraken botnet
Lethic botnet
Lightweight Directory Access Protocol
Link-local Multicast Name Resolution
List of cyber attack threat trends
List of geocoding systems
List of IATA-indexed railway stations
List of postal codes
List of products that support SMB
List of SIP request methods
List of SIP response codes
List of telecommunications encryption terms
List of web service protocols
Lorcon
M0n0wall
MAC flooding
Mail Transfer Protocol
Man-in-the-middle attack
Man-on-the-side attack
Managed security service
Managed VoIP Service
Mariposa botnet
Marsden square
Media Gateway Control Protocol
Media Gateway Control Protocol architecture
Media Resource Control Protocol
Mega-D botnet
Message Oriented Text Interchange Systems
Message send protocol
Message Session Relay Protocol
Messaging security
Metasploit Project
Metulji botnet
Microsoft Media Server
Microsoft SmartScreen
Middlebox
Military satellite
MIME
MIMIC Simulator
MiNET
Miredo
MMS Architecture
Mobile Application Part
Mobile virtual private network
Monoculture (computer science)
Mosh (software)
MQ Telemetry Transport
Multicast DNS
MySecureCyberspace
NAT traversal
National Cyber Range
National Information Standards Organization Circulation Interchange Protocol
National Strategy for Trusted Identities in Cyberspace
National Transportation Communications for Intelligent Transportation System Protocol
Natural Area Code
Net-SNMP
NETCONF
Netsniff-ng
NetStumbler
Network Access Control
Network Admission Control
Network Based Application Recognition
Network encryption cracking
Network File System
Network intelligence
Network Interface Layer Security
Network intrusion detection system
Network News Transfer Protocol
Network security
Network security policy
Network Security Toolkit
Network Time Protocol
Network Voice Protocol
Network-based Call Signaling
Nfront security
NIST RBAC model
Nitol botnet
Nomenclature of Territorial Units for Statistics
NT LAN Manager
Null session
OCML
OFTP
OKATO
ONS coding system
Open Control Architecture
Open Phone Abstraction Library
Open proxy
Open Settlement Protocol
OpenConnect
OpenVPN
Operation Cyber Condition Zebra
Operation: Bot Roast
OSSEC
Outbound content compliance
OWASP
Packet analyzer
Packet capture appliance
Packet Storm
PacketFence
Pass the hash
Password length parameter
Penetration test
People Finder Interchange Format
Persistent Shared Object Model
Personal firewall
Phoning home
Phreaking
Populated place
Port forwarding
Port knocking
Port triggering
Portal:Telecommunication
POSITIF (project)
Precision Time Protocol
Prelude Hybrid IDS
Protected computer
Proxy list
Pseudoserver
QDGC
QOTD
Qwest
RADIUS
RadSec
Real Data Transport
Real Time Streaming Protocol
Real-time adaptive security
Real-time Transport Protocol
Realtek Remote Control Protocol
Reconnaissance satellite
Registration, Admission and Status
Remote Desktop Protocol
Remote procedure call
Reverse geocoding
RF shielding of buildings
RF shielding paint
RFB protocol
Robust random early detection
Rogue access point
Rogue DHCP
Rtelnet
RTP audio video profile
RTP Control Protocol
Rustock botnet
RVU protocol
Safe@Office
Sality
Same-origin policy
Science DMZ Network Architecture
Screened-subnet firewall
Screening router
SDEP
Secure Password Authentication
Secure Service Network
Secure Shell
Security Attribute Modulation Protocol
Security controls
Security Protocols Open Repository
Security service (telecommunication)
Security Task Manager
Semantic URL attack
Server Message Block
Server Routing Protocol
Service discovery
Service layer
Service scan
Session hijacking
Session Initiation Protocol
Sguil
Shared Dictionary Compression Over HTTP
Shared resource
Shell shoveling
Signaling Compression
SIMPLE
SIMPLE (military communications protocol)
Simple Gateway Control Protocol
Simple Mail Transfer Protocol
Simple Network Management Protocol
Simple Sensor Interface protocol
Simple Symmetric Transport Protocol
Simple Update Protocol
SIP Trunking
Skinny Call Control Protocol
Skype protocol
Slenfbot
Smart card management system
SOAP
SoftEther VPN
Software Upgrade Protocol
SPDY
SPICE (protocol)
Split tunneling
Spoofing attack
Spyware
Srizbi botnet
SSL-Explorer
SSL-Explorer: Community Edition
Standard Geographical Classification code (Canada)
Standard Interchange Format
Stateful firewall
Stealth wallpaper
Stepping stone (computer security)
Storm botnet
Streaming Text Oriented Messaging Protocol
StrongSwan
STUN
Sybil attack
SYN cookies
T.37
T.38
Tabular Data Stream
TACACS
TACLANE
Tarpit (networking)
TCP Cookie Transactions
TCP Gender Changer
TCP hole punching
TCP reset attack
Tcpcrypt
TDL-4
Telecommunications Act of 1996
Telnet
Threat (computer)
Threenix
Ticket (IT security)
Time Protocol
TimeML
Timestamping (computing)
Transaction verification
Transport Layer Security
Transverse Mercator projection
Transverse Mercator: Bowring series
Transverse Mercator: Redfearn series
Traversal Using Relays around NAT
Trusted Network Connect
Trusted path
UBIGEO
UDP hole punching
UN M.49
UN/LOCODE
Unified threat management
Unique Feature Identifier
UNIStim
United States Board on Geographic Names
User:Awesomekatrina/3
User:Dbabbitt/Sandbox/Draft Distributed Autonomous Organization Article
User:Timtempleton/sandbox
UT-VPN
Variant object
Verisys
Video Acceleration API
Virtual private network
Virtual private server
Virut
VLAN hopping
VPN-1 VSX NGX
VPNBook
Vulnerability management
VyOS
W3af
Waledac botnet
Warchalking
Wardriving
Warflying
WarVOX
Warzapping
Web application security
Web application security scanner
Web threat
WebNFS
WebScarab
WebSocket
Wi-Fi Protected Access
Wire protocol
Wireless Communications Transfer Protocol
World Meteorological Organization squares
X Image Extension
X video extension
X Window System
X Window System protocols and architecture
X-Video Bitstream Acceleration
X-Video Motion Compensation
X.400
X.500
XML
XML Configuration Access Protocol
XMPP
Z39.50