Kolmogorov complexity | Badtrans | Book:Computer Networking |
Abstract data type | Full disclosure (computer security) | AppleTalk |
AI-complete | Goodtimes virus | American Registry for Internet Numbers |
Blowfish (cipher) | Hacker ethic | Wireless broadband |
BQP | Macro virus | Client–server model |
Block cipher | Netwar | Digital Enhanced Cordless Telecommunications |
Boolean satisfiability problem | Ryan Lackey | FidoNet |
Key size | RFPolicy | Gأ‰ANT |
Chomsky hierarchy | SHA-1 | IEEE 802.15 |
Common Lisp | Social engineering | IEEE 802 |
Colossus computer | Segmentation fault | Information Sciences Institute |
Currying | SANS Institute | Internetworking |
Context-free grammar | Wau Holland | Internetwork Packet Exchange |
Church–Turing thesis | Bruce Schneier | Kermit (protocol) |
Context-free language | Phrack | Myrinet |
Cyc | Blum Blum Shub | Multicast |
Context switch | Automated information systems security | Maximum transmission unit |
Decision problem | Communications security | NSAP address |
Differential cryptanalysis | Security management | Protocol stack |
Denormalization | Trusted computing base | Real-time Transport Protocol |
Double-ended queue | Open mail relay | SHA-1 |
Expander graph | Hybris (computer worm) | Semi-Automatic Ground Environment |
Earley parser | 2600: The Hacker Quarterly | Session Description Protocol |
Foobar | Common Criteria | Session Announcement Protocol |
Gregory Chaitin | The Open Group | 100BaseVG |
Heapsort | Trusted Computing | 10BASE2 |
H.263 | Packet analyzer | 10BASE5 |
Integer (computer science) | Tokenization (data security) | Ethernet over twisted pair |
Idempotence | Ross J. Anderson | 56 kbit/s line |
IEEE 754-1985 | Sircam | Plesiochronous digital hierarchy |
Kent Beck | Role-based access control | Broadband Integrated Services Digital Network |
Hash-based message authentication code | Challenge-Handshake Authentication Protocol | Synchronous optical networking |
Literate programming | Yarrow algorithm | Name server |
Linker (computing) | UIN | Acoustic coupler |
Multiple inheritance | Acceptable use policy | Automatic repeat request |
Microkernel | Andy Mأ¼ller-Maguhn | Bandwidth compression |
Mutual recursion | L0pht | Datagram |
Non-deterministic Turing machine | Karl Koch (hacker) | D4 framing standard |
Object code | Len Sassaman | Direct-sequence spread spectrum |
Oracle machine | Chief information officer | Distributed-queue dual-bus |
Presburger arithmetic | SQL Slammer | Heuristic routing |
Priority queue | Brain (computer virus) | Isochronous timing |
Pie menu | Warhol worm | Link level |
Quantum information | Whitelist | Multicast address |
Real-time computing | Electronic Privacy Information Center | National Information Infrastructure |
RC4 | IBM Internet Security Systems | Negative-acknowledge character |
Radiosity (computer graphics) | Confused deputy problem | Network architecture |
Radix sort | CTCPEC | Network management |
Relational model | Stateful firewall | Non-return-to-zero |
Red–black tree | War dialing | Primary Rate Interface |
SHA-1 | Google Hacks | Protective distribution system |
Star height problem | Cryptome | Protocol data unit |
Sharp-P-complete | Polymorphic code | Provisioning |
Scheme (programming language) | Alphanumeric shellcode | Pulse-address multiple access |
Splay tree | Tsutomu Shimomura | Queuing delay |
String searching algorithm | Heap overflow | Ring latency |
Static program analysis | Robert Morris (cryptographer) | Round-trip delay time |
SIGGRAPH | SYN flood | Single-mode optical fiber |
Side effect (computer science) | NSAKEY | T-carrier |
Tree rotation | Unix security | Endianness |
Trie | SOCKS | IP over Avian Carriers |
Cypherpunk | Gray Areas | Upload |
Squeak | Fork bomb | Bitstream |
Best, worst and average case | Off-by-one error | Network File System |
Blum Blum Shub | Root certificate | Enhanced Interior Gateway Routing Protocol |
Optimizing compiler | Vector (malware) | Trivial File Transfer Protocol |
Communications security | David A. Wagner | Asia-Pacific Network Information Centre |
Data element | Blaster (computer worm) | LocalTalk |
Hamming distance | Datenschleuder | Packet analyzer |
Minimum spanning tree | Devnull | Wireless community network |
Tree structure | WinNuke | Apple Attachment Unit Interface |
Abstract factory pattern | Out-of-band | DICOM |
Shortest path problem | IEEE 802.1X | Gigabit Ethernet |
Control flow graph | Browser exploit | IEEE 802.8 |
Infinite loop | Tiger team | Abstract Syntax Notation One |
Linear congruential generator | List of TCP and UDP port numbers | DECnet |
Mersenne Twister | Claria Corporation | UIN |
Reed–Solomon error correction | Linux malware | ISCSI |
Entropy encoding | Staog | ARCNET |
Maclisp | Rebecca Mercuri | National Science Foundation Network |
Code talker | Hackers: Heroes of the Computer Revolution | Category 3 cable |
Communication complexity | Peter G. Neumann | ALOHAnet |
IBM Informix | Great Hacker War | FOSSIL |
W. T. Tutte | Challenge–response authentication | Wormhole switching |
Ford–Fulkerson algorithm | Wi-Fi Protected Access | HIPPI |
Prim's algorithm | Edward Felten | EtherType |
Greibach normal form | Mydoom | Rsync |
CYK algorithm | Key derivation function | Cacti (software) |
Disassembler | Mimail | Scalable Coherent Interface |
Unification (computer science) | Memory corruption | InterNIC |
S-expression | CoolWebSearch | MAE-West |
Anonymous remailer | Chinese wall | Distance-vector routing protocol |
Denotational semantics | Elk Cloner | Link-state routing protocol |
Multiplication algorithm | Dark Avenger | HomePNA |
Grover's algorithm | SCA (computer virus) | Hayes command set |
Trusted Computing | CSIv2 | Application layer |
Exception handling | Dan Geer | Root name server |
Digital Signature Algorithm | Bagle (computer worm) | NMEA 0183 |
Merkle–Hellman knapsack cryptosystem | MirOS BSD | Simple Service Discovery Protocol |
Augmented Backus–Naur form | Doomjuice | Internet Engineering Steering Group |
Abstract interpretation | Login spoofing | CBBS |
Ross J. Anderson | Secure attention key | Serial communication |
Closure (computer programming) | L0phtCrack | IEEE 802.1 |
Partial evaluation | Bounds checking | StarLAN |
Event-driven programming | 40-bit encryption | Ungermann-Bass |
Singleton pattern | NESSIE | Technological convergence |
Role-based access control | Kerio Technologies | Stateful firewall |
Computer chess | Passwd | Vampire tap |
Vigenأ¨re cipher | Cryptosystem | JXTA |
Binary heap | Certified Information Systems Security Professional | 10BASE-F |
Compiler-compiler | Self-destruct | 10BROAD36 |
Shannon–Hartley theorem | Wietse Venema | Multilayer switch |
Extended Backus–Naur form | Camellia (cipher) | SYN flood |
Universal Turing machine | Uncontrolled format string | Bootstrap Protocol |
Canonical LR parser | Authentication protocol | Traffic shaping |
Yarrow algorithm | Capability-based security | IEEE 802.11e-2005 |
Xerox Alto | Richard Forno | SOCKS |
Shellsort | Loyd Blankenship | Cambridge Ring (computer network) |
Max-flow min-cut theorem | New.net | Quadrics |
Hugh Darwen | Port scanner | IEEE 802.6 |
The Third Manifesto | Hardening (computing) | Open Grid Services Architecture |
Malleability (cryptography) | Trend Micro | Connexion by Boeing |
Information visualization | Integrated Windows Authentication | IPv4 subnetting reference |
A New Kind of Science | Hack-Tic | Email address |
Associative array | Buffer overflow protection | DOCSIS |
Gerald Jay Sussman | Key server (cryptographic) | X.509 |
Breadth-first search | Christmas tree packet | Downstream (networking) |
Bucket sort | Self-signed certificate | IP address blocking |
Advanced Encryption Standard process | Vern Paxson | TACACS |
Counting sort | CipherTrust | Pipex |
Standard ML | EICAR | Explicit Congestion Notification |
Chosen-ciphertext attack | PaX | Packet Switch Stream |
Generic programming | Biba Model | Autonomous system (Internet) |
Initialization vector | Juniper Networks | Zero-configuration networking |
Exclusive or | Security-focused operating system | IP fragmentation |
Constant folding | WS-Security | Attachment Unit Interface |
Memory hierarchy | BonziBuddy | PBX |
Algorithmic efficiency | The Cuckoo's Egg | Directory service |
Delegation pattern | Ad-Aware | Demon Internet |
Hamiltonian path problem | Service set (802.11 network) | Out-of-band |
X86 memory segmentation | Operation Sundevil | Anisochronous |
Fixed-point combinator | Munged password | IEEE 802.1X |
Reentrancy (computing) | Chaos Communication Congress | List of TCP and UDP port numbers |
Kleene's recursion theorem | Netcraft | Server Message Block |
Cut, copy, and paste | Hackers on Planet Earth | Gigabit interface converter |
Autokey cipher | /dev/random | Network Control Protocol |
Community network | IEEE 802.11i-2004 | X.400 |
CiteSeerX | Adversary (cryptography) | Point-to-point (telecommunications) |
Tree decomposition | Paul Kocher | Banyan VINES |
Cocktail shaker sort | Kill switch | Anycast |
Polynomial-time reduction | Systrace | External Data Representation |
Block cipher mode of operation | TCP Wrapper | Hidden node problem |
Interactive proof system | Exec Shield | List of device bit rates |
Illegal prime | Elias Levy | XENPAK |
Isabelle (proof assistant) | Return-to-libc attack | IEEE 802.20 |
Factory method pattern | Metamorphic code | LAN eXtensions for Instrumentation |
Command pattern | InfraGard | Wi-Fi Protected Access |
Aozora Bunko | Wendy M. Grossman | Preboot Execution Environment |
Teradata | Address space layout randomization | Dot-decimal notation |
Open Database Connectivity | Mandatory access control | Inter-Asterisk eXchange |
Outline of computer science | FIPS 140-2 | IEEE 802.7 |
Iterator | Lightweight Extensible Authentication Protocol | Anonymous P2P |
Call Level Interface | Montgomery modular multiplication | Deep packet inspection |
Relational algebra | Mail and wire fraud | IEEE 802.15.4 |
Relational calculus | Center for Democracy and Technology | Email spam |
Discrete logarithm | Scareware | CSIv2 |
Cryptographically secure pseudorandom number generator | Identity management | Broadcast address |
Hoare logic | Port knocking | Netlib |
Aho–Corasick algorithm | Agobot | CSNET |
Don Norman | Application firewall | Path length |
State diagram | Balabit | Slot time |
ECMAScript | Iptables | Address space |
Birthday attack | Gene Spafford | Profibus |
Generic function | Abraxas (computer virus) | Network access point |
Name binding | Category:Hacker conventions | CARNet |
Timeline of quantum computing | Acid (computer virus) | Local collision |
Rate–distortion theory | Acme (computer virus) | Authentication protocol |
PowerPC 7xx | Cydoor | Cut-through switching |
Borإ¯vka's algorithm | Spy Sweeper | Mbone |
Set (abstract data type) | Actifed (computer virus) | Apple Filing Protocol |
Raphael Finkel | Cisco PIX | Template:OSI model |
Second normal form | FTP bounce attack | 8b/10b encoding |
Third normal form | Computer security policy | Localhost |
Fourth normal form | Ada (computer virus) | Mnet (peer-to-peer network) |
Handwriting recognition | Multilevel security | Port scanner |
Directed acyclic graph | National Information Assurance Glossary | MLAN |
Functional dependency | Power virus | David J. Farber |
Trapdoor function | AI (computer virus) | Telebit |
Combinatorial search | AIDS (computer virus) | Trunking |
List (abstract data type) | Privilege separation | Fat tree |
Mizar system | PhreakNIC | Maximum segment size |
DBase | Object-code Buffer Overrun Evaluator | Hostname |
Structural induction | Red/black concept | Generic Routing Encapsulation |
Constraint satisfaction problem | Markus Kuhn (computer scientist) | Hybrid fibre-coaxial |
Jonathan Zittrain | Category:Spyware removal | HEAnet |
Subtyping | Whiz Kids (TV series) | CNAME record |
Michael A. Jackson | Information technology management | Multihoming |
Concurrency control | Steve Gibson (computer programmer) | Broadcast traffic |
Self-modifying code | Certificate signing request | FCAPS |
Multiversion concurrency control | Australian High Tech Crime Centre | International Academy of Digital Arts and Sciences |
McCarthy 91 function | BS 7799 | Mobile code |
Floyd–Warshall algorithm | Global Information Assurance Certification | Digital Divide Network |
Communications Security Establishment | Host-based intrusion detection system | Juniper Networks |
Windows-1252 | Linux-VServer | Small form-factor pluggable transceiver |
Affective computing | Anomaly-based intrusion detection system | 6to4 |
Database transaction | ToneLoc | 9P (protocol) |
Dynamic programming language | Stratus VOS | Guard tone |
Amortized analysis | Security token | Deficit round robin |
Markov chain Monte Carlo | List of warez groups | Category:Ethernet standards |
Edmonds–Karp algorithm | Sneakers (1992 film) | Service set (802.11 network) |
Extract, transform, load | Bluesnarfing | Organizationally unique identifier |
NSAKEY | SSL acceleration | MCCP |
S-box | Matt Blaze | Abilene Network |
CAST-128 | National Cyber Security Division | FAST TCP |
Modula-3 | Remote Access Quarantine Client | Forwarding equivalence class |
Coroutine | CA Anti-Spyware | Power over Ethernet |
Two-phase locking | SpySubtract | IEEE 802.11i-2004 |
Higher-order function | Gordon Lyon | Network service |
Durability (database systems) | Digest access authentication | Label Distribution Protocol |
Connected component (graph theory) | Hacktivismo | Wi-Fi Alliance |
Communicating sequential processes | Johan Helsingius | Internode (ISP) |
Treap | Dancing pigs | TCP Wrapper |
Language technology | Ixquick | Open Platform Communications |
JD Edwards | Michaإ‚ Zalewski | TCP offload engine |
Knuth–Morris–Pratt algorithm | Anti-phishing software | Enterasys Networks |
Automated Mathematician | Stealware | Virtual Telecommunications Access Method |
Fibonacci heap | ShmooCon | Distributed data store |
Curry–Howard correspondence | Datagram Transport Layer Security | E.123 |
Foreign key | DNS spoofing | Banyan Systems |
Polymorphism (computer science) | Class (warez) | Direct Internet Message Encapsulation |
Bitwise operation | Federal Information Security Management Act of 2002 | Lightweight Extensible Authentication Protocol |
Game tree | MafiaBoy | Category:Ethernet |
Formal verification | Nicolas Jacobsen | Representational state transfer |
Operational semantics | AOHell | Digital Signal 1 |
Consistency model | Greynet | Management information base |
Pattern matching | FIPS 140 | Measuring network throughput |
Algebraic data type | Polyinstantiation | Class-based queueing |
Dining philosophers problem | Grandmaster Ratte' | Hayes Microcomputer Products |
State (computer science) | Pharming | Port knocking |
Carnegie Mellon School of Computer Science | Sir Dystic | SURAnet |
XOR linked list | Demon Roach Underground | Mid Atlantic Crossroads |
Block size (cryptography) | Extensible Authentication Protocol | STUN |
3-Way | Christien Rioux | Distributed Computing Environment |
ISAAC (cipher) | HoHoCon | Liberty Alliance |
Web of trust | StarForce | IEEE 802.16 |
Stochastic context-free grammar | Computer emergency response team | Application firewall |
Year 2038 problem | Bluesniping | XAUI |
Data mart | Dorothy E. Denning | Crossover cable |
VC dimension | Strong authentication | CCMP |
CODASYL | Fortuna (PRNG) | Service data unit |
Local search (optimization) | MAC flooding | Cisco PIX |
French Institute for Research in Computer Science and Automation | SHA-2 | Foundry Networks |
Speculative execution | Bolgimo | FTP bounce attack |
Automatic label placement | Direct Revenue | Administrative share |
Charles H. Moore | Privilege (computing) | Node (networking) |
Model checking | Authentication and Key Agreement (protocol) | RTP Control Protocol |
Isolation (database systems) | Peiter Zatko | Telecommunications Management Network |
Glossary of graph theory terms | Chris Wysopal | .arpa |
Graph drawing | Carolyn Meinel | Resilient Packet Ring |
Edge detection | SULFNBK.EXE | Overlay network |
Peterson's algorithm | Cult of the Dead Cow | Key-based routing |
Skip list | Arbitrary code execution | Ad hoc On-Demand Distance Vector Routing |
Candidate key | Rubberhose (file system) | Datagram Congestion Control Protocol |
Object file | Hacktivismo Enhanced-Source Software License Agreement | Government Open Systems Interconnection Profile |
Business performance management | Gutmann method | IEEE 802.10 |
Arlington Hall | TCP/IP stack fingerprinting | Leaky bucket |
Database schema | List of Unix daemons | Port triggering |
Object type (object-oriented programming) | Robert Schifreen | National LambdaRail |
Jakob Nielsen (usability consultant) | Comodo Group | Category:Channel access methods |
Magic number (programming) | StankDawg | ZoneCD |
Graph minor | Xandu.2385 | Internet Storage Name Service |
DBLP | Comet Cursor | Computer network naming scheme |
CAcert.org | Stakkato | Voice over WLAN |
Correctness (computer science) | Mathew Bevan | MMDF |
Hill climbing | Bliss (virus) | Internet Stream Protocol |
System programming | Authentication server | Information technology management |
Static single assignment form | CWShredder | RONJA |
Atomicity (database systems) | Wireless Transport Layer Security | Line Mode Browser |
Self-balancing binary search tree | AutoRun | Token bucket |
ID-based encryption | Dan Farmer | Agent Extensibility Protocol |
Ad hoc polymorphism | Windows Live OneCare | Random early detection |
Adjacency list | Operation D-Elite | ZMODEM |
Metaprogramming | Markus Hess | XMODEM |
Dominator (graph theory) | UXu | YMODEM |
Schedule (computer science) | BBS: The Documentary | Certificate signing request |
Platform-independent model | ShadowCrew | Temporally ordered routing algorithm |
Model-driven architecture | Database audit | Default gateway |
Maximum flow problem | Information technology controls | Newbridge Networks |
Jأ¼rgen Schmidhuber | Certified Information Security Manager | HomePlug |
Levenshtein distance | Drive-by download | Free Haven Project |
Edit distance | Gary McKinnon | Exponential backoff |
Clipper chip | Code Access Security | Category:Wireless network organizations |
Rewriting | Poly1305 | Long Reach Ethernet |
Branch predictor | Clark–Wilson model | Byte stream |
Calculus of communicating systems | Anti-worm | List of IP protocol numbers |
Combinatorial optimization | Chkrootkit | RS-485 |
Citation index | DShield | Interpacket gap |
Meet-in-the-middle attack | Fortinet | Segmentation and Reassembly |
Blind signature | CounterSpy (software) | Netgear |
Needham–Schroeder protocol | OWASP | Anomaly-based intrusion detection system |
Otway–Rees protocol | Oligomorphic code | NetFlow |
Tracing garbage collection | Diameter protocol | Econet |
Commitment scheme | Patch Tuesday | Switched Multi-megabit Data Service |
Beale ciphers | Byte Bandit | List of network protocols (OSI model) |
Subgraph isomorphism problem | Virus Bulletin | SSL acceleration |
Elliptic Curve Digital Signature Algorithm | Rainbow Series | Route reflector |
Schnorr signature | AIDS (Trojan horse) | Media Gateway Controller |
Zero-knowledge proof | AirSnort | Wireless WAN |
Affine cipher | Data Execution Prevention | Allowed cell rate |
Rabin cryptosystem | Authenticated encryption | Reverse DNS lookup |
Anonymous P2P | Rkhunter | Active monitor |
List of important publications in computer science | Solar Designer | Media-independent interface |
Duff's device | Anti-pharming | Secure Remote Password protocol |
Secret sharing | ABC (computer virus) | Administrative distance |
James Clark (programmer) | Graphical identification and authentication | ICMP Router Discovery Protocol |
Dead code elimination | Directory traversal attack | Deflection routing |
Abstraction inversion | Paradox (warez) | ANSI T1.413 Issue 2 |
Hidden surface determination | COPS (software) | Voice over the Net |
Skipjack (cipher) | Central Point Anti-Virus | IEEE 802.1Q |
Deutsch–Jozsa algorithm | WinDbg | IEEE 802.22 |
Canny edge detector | Hacking: The Art of Exploitation | Interplanetary Internet |
Hierarchical clustering | Honker Union | Medium Attachment Unit |
Paillier cryptosystem | Butchered from Inside | List of file transfer protocols |
NTRUEncrypt | Black Hat Briefings | Frame check sequence |
Register allocation | Rainbow table | Wireless Leiden |
Astrophysics Data System | HoneyMonkey | NetBIOS over TCP/IP |
Check digit | Graybird | RapidIO |
40-bit encryption | ISACA | Network processor |
GOST (block cipher) | Erik Bloodaxe (hacker) | 473L system |
Codd's 12 rules | Brian LaMacchia | Stealware |
Blinding (cryptography) | Loren Kohnfelder | Maximum length sequence |
Union type | Anti-Phishing Working Group | Data URI scheme |
Randomized algorithm | NBName | Datagram Transport Layer Security |
V (operating system) | Tuxissa | Load-balanced switch |
NESSIE | Seccomp | Adam Shand (manager) |
2-satisfiability | Craig Neidorf | HomeRF |
Starvation (computer science) | Chief data officer | Professional video over IP |
Probabilistically checkable proof | Quarantine (computing) | AES47 |
Continuation | Mixed threat attack | Exposed node problem |
Andrew Project | Farid Essebar | Digital Audio Access Protocol |
PowerPC G4 | Titan Rain | Delivery traffic indication message |
History of cryptography | Application security | Network planning and design |
Independent set (graph theory) | Firestarter (firewall) | Extensible Authentication Protocol |
Camellia (cipher) | NetOps | Traffic policing (communications) |
Las Vegas algorithm | Shawn Carpenter | Keith Uncapher |
Confusion and diffusion | Astalavista.box.sk | Structured cabling |
Btrieve | Ophcrack | Generic cell rate algorithm |
A5/2 | Norton Personal Firewall | BBN Butterfly |
Soft heap | What the Hack | Policy-based routing |
Type conversion | Sarah Gordon | List of BBS software |
Graph (abstract data type) | Winlogon | MAC flooding |
Master theorem | Rogue access point | Network computing |
Sorting network | Salsa20 | SHA-2 |
Vertex cover | HMAC-based One-time Password Algorithm | NLS (computer system) |
Glasgow Haskell Compiler | Trusted Computing Group | SuperSet Software |
Approximation algorithm | Jtest | Campus network |
Delimiter | Windows Firewall | Internetwork protocol |
Message authentication code | Johannes Ullrich | Optical Internetworking Forum |
Forward chaining | List of computer criminals | Chuck Forsberg |
Backward chaining | RainbowCrack | SynOptics |
Flat file database | Smeg Virus Construction Kit | List of acquisitions by Cisco Systems |
Abstraction layer | Browser hijacking | AAL1gator |
Binary decision diagram | Digital DawgPound | Go-Back-N ARQ |
Monad (functional programming) | Internet Authentication Service | Selective Repeat ARQ |
Coq | Barracuda Networks | Nagle's algorithm |
Function type | Alcon (computer virus) | TippingPoint |
David J. Farber | Cryptographic key types | CYCLADES |
Artificial general intelligence | Secure environment | List of layout engines |
Signed number representations | Crash reporter | Broadband remote access server |
Ant colony optimization algorithms | Parry Aftab | System Packet Interface |
FEAL | Software token | Subnetwork Access Protocol |
NetLogo | Ben Laurie | LattisNet |
Tree traversal | Sadmind | 4B5B |
GMR (cryptography) | Ingress filtering | VSAN |
Fair-share scheduling | Brewer and Nash model | Bully algorithm |
Parameterized complexity | Graham-Denning model | Google Web Accelerator |
David Gelernter | Security modes | Secure Neighbor Discovery |
C99 | Computer security model | MAE-East |
Apriori algorithm | Site Security Handbook | IL (network protocol) |
KASUMI | Electronic lock | Meet-me room |
CAST-256 | Keychain (software) | Category:Firewall software |
Bombe | Null route | Service control point |
Key server (cryptographic) | Mutual authentication | Channel code |
PKCS | Optix Pro | Cleave (fiber) |
Biuro Szyfrأ³w | DoSnet | PhoneNet |
Compare-and-swap | Software assurance | Jim Allchin |
2–3 tree | Bit nibbler | Category:MPLS networking |
Ambiguous grammar | GNOME Keyring | Switched fabric |
Jack Dongarra | RootkitRevealer | Structure of Management Information |
Normal number (computing) | Camping (computing) | Deutsches Forschungsnetz |
Autonomic computing | WinFixer | Authentication server |
NSPACE | Hare (computer virus) | Microconnect distributed antenna |
List of functional programming topics | Cryptographic Service Provider | Wireless Transport Layer Security |
Peter Landin | ToorCon | Link aggregation |
Cellular Message Encryption Algorithm | Sony BMG copy protection rootkit scandal | Cable tester |
Arthur–Merlin protocol | Website defacement | Label-switched path |
List of complexity classes | Category:Password managers | ATA over Ethernet |
Join (SQL) | Nahshon Even-Chaim | SpaceWire |
Advice (complexity) | Internet Gateway Device Protocol | Database audit |
Polynomial-time approximation scheme | Defacement (vandalism) | Cisco Catalyst |
Cluster analysis | Microsoft CryptoAPI | Poly1305 |
Cycle detection | EAuthentication | Google Data Centers |
Graph-structured stack | Forcepoint | Internet Content Adaptation Protocol |
Alice and Bob | AntiVirus Gold | Category:IEEE 802 |
Nonlinear programming | System Management Mode | Category:Ethernet cables |
Rabin–Karp algorithm | Zango (company) | Real Data Transport |
Boyer–Moore string search algorithm | Cyber security standards | Diffusing update algorithm |
ALGOL 60 | Template:Malware-stub | Insteon |
ALGOL 68 | Stacheldraht | Neighbor Discovery Protocol |
Salt (cryptography) | Category:Malware stubs | Discard Protocol |
Short-circuit evaluation | Cyber-security regulation | Daytime Protocol |
Classical cipher | Gokar | Time Protocol |
Church–Turing–Deutsch principle | GIANT AntiSpyware | Virtual routing and forwarding |
Result set | Protection ring | Silly window syndrome |
List of terms relating to algorithms and data structures | Multipartite virus | Carrier sense multiple access with collision avoidance and resolution using priorities |
Guarded Command Language | Ghostball (computer virus) | TCP Vegas |
Snark (graph theory) | Nimda | Greenfield project |
McEliece cryptosystem | Blended threat | Metro Ethernet |
Cardan grille | Hardware security module | Industrial Ethernet |
Continuation-passing style | International Safe Harbor Privacy Principles | Precision Time Protocol |
Conditional loop | Antichrist (virus hoax) | Dave Forney |
Turing degree | AGI-Plan | VLAN Management Policy Server |
System F | Category:DOS file viruses | Bearer-Independent Call Control |
Avalanche effect | Category:Virus hoaxes | CAVNET |
Strassen algorithm | Category:Exploit-based worms | Open Root Server Network |
Executive information system | AntiCMOS | EtherChannel |
Two-phase commit protocol | ARCV-n | 10 Gigabit Ethernet Alliance |
Adversary (cryptography) | ITSEC | IEEE 1675-2008 |
Merkle's Puzzles | NVIR | GG45 |
Suffix tree | SevenDust (computer virus) | RG-58 |
Cell (microprocessor) | ISO/IEC 27001:2005 | Alacritech |
Authorization certificate | Microsoft Baseline Security Analyzer | Fast Infoset |
Empty string | Check Point VPN-1 | TCP Westwood |
Code (cryptography) | Dynamic linker | Autonegotiation |
EFF DES cracker | Anton Chuvakin | Channel bonding |
Computation tree logic | HuntBar | TeraGrid |
Addition-chain exponentiation | Spy Wiper | Answer tone |
CORDIC | Ilfak Guilfanov | Advanced Telecommunications Computing Architecture |
R-tree | Mumu (computer worm) | Multicast DNS |
Deep Thought (chess computer) | OpenBSD security features | Anti-pharming |
Action at a distance (computer programming) | Alabama (computer virus) | Interface Message Processor |
Set cover problem | Executable space protection | Kalpana (company) |
Cryptanalysis of the Enigma | Category:Denial-of-service attacks | Ping flood |
Star schema | Voyager (computer worm) | UDP hole punching |
L-attributed grammar | Christopher Boyd | Best-effort delivery |
Array programming | Tom Cross (computer security) | National research and education network |
Parsing expression grammar | Brian Krebs | AS2 |
Concatenative programming language | Intruder detection | Getaddrinfo |
Topological sorting | OneHalf | Medium-dependent interface |
Montgomery modular multiplication | Bomber (computer virus) | Optical fiber connector |
Statement (computer science) | Session fixation | Intelligent computer network |
Expression-oriented programming language | Type enforcement | Context-aware network |
P-Grid | Life is beautiful virus hoax | 4B3T |
Paul H. Cress | MAC spoofing | Declarative Referential Integrity |
Constraint satisfaction | Multi categories security | Penultimate hop popping |
Parallel random-access machine | Zmist | Fast retransmit |
Semantic security | EGABTR | Remote collision |
Temporal Key Integrity Protocol | Certified Ethical Hacker | South African Internet Exchange |
Collision attack | Air gap (networking) | NBName |
Peter J. Denning | Summercon | Anything In Anything |
Agent-based model | Electron (computer hacker) | BBN Report 1822 |
Artificial chemistry | SSLeay | EveryDNS |
Needleman–Wunsch algorithm | PGPDisk | IEEE 802.18 |
List of academic databases and search engines | William Genovese | Ethernet flow control |
Solovay–Strassen primality test | Blackworm | IP multicast |
Branch (computer science) | Firewall pinhole | Packet-switched network |
Cuthill–McKee algorithm | Security testing | FreeDCE |
Code page 437 | IronPort | Secure Real-time Transport Protocol |
Role-oriented programming | Common Vulnerabilities and Exposures | Hubert Zimmermann |
Inline assembler | McAfee SiteAdvisor | Reliability (computer networking) |
Bill Inmon | NT LAN Manager | Wire protocol |
Database design | Michael Howard (Microsoft) | F5 Networks |
NSA encryption systems | Leap (computer worm) | TCP tuning |
AN/CYZ-10 | Legion of Doom (hacking) | Source-specific multicast |
Probabilistic encryption | 0x80 | Interactive Connectivity Establishment |
Fusion tree | Hackers at Large | List of assigned /8 IPv4 address blocks |
Call-with-current-continuation | Vsftpd | Architecture for Control Networks |
BATON | National Information Assurance Certification and Accreditation Process | Network browser |
Database theory | Improper input validation | PARC Universal Packet |
Kuroda normal form | EFF-Austin | Sorcerer's Apprentice Syndrome |
The Humane Interface | Adam Botbyl | Packet Assembler/Disassembler |
Tail call | Attack tree | Z-Wave |
Atomic commit | Flip button | Rogue access point |
Accounting method | Beast (Trojan horse) | Salsa20 |
WATFIV | Intego | Bruce Jay Nelson |
Laguerre's method | Chief security officer | Broadcasting (networking) |
Consistency (database systems) | Shadowserver | Registered state change notification |
Trabb Pardo–Knuth algorithm | Coverity | Delay-tolerant networking |
L (complexity) | Jennifer Seberry | Local Procedure Call |
First-class function | Chief information security officer | RG-59 |
Powerset construction | Network telescope | Computer network diagram |
O(1) scheduler | Form (computer virus) | IEEE Standards Association |
Terry Sejnowski | Category:Computer security procedures | Robust Header Compression |
Complete (complexity) | Database forensics | Fred Baker (IETF chair) |
Lovelace Medal | ITIL security management | IEEE 802.11p |
Strong RSA assumption | Zooko's triangle | VocalTec |
Turing reduction | Shatter attack | QLogic |
ICE (cipher) | Lattice-based access control | IEEE 802.11u |
Van Emde Boas tree | The 414s | IEEE 802.11n-2009 |
One-time password | ClipGenie | Internet transit |
Schnorr group | Access Control Matrix | Netsukuku |
Pairing | Crack (password software) | DSL modem |
Rope (data structure) | Avi Rubin | TERENA |
Decisional Diffie–Hellman assumption | Vundo | 6over4 |
Relational operator | Data Protection API | ISATAP |
SPIN model checker | FreeOTFE | Network Voice Protocol |
Pipeline (software) | Concept virus | Packet loss |
CPLEX | Gemalto | Multi-mode optical fiber |
Web engineering | Take-grant protection model | Layer 2 MPLS VPN |
Proof assistant | Chain of trust | Ipfirewall |
Feature detection (computer vision) | Non-interference (security) | Barracuda Networks |
Esterel | Black hole (networking) | Egress filtering |
No free lunch theorem | Moonlight Maze | Proportionally fair |
No free lunch in search and optimization | Ankit Fadia | IP address management |
Operator-precedence parser | TCP half-open | Ingress filtering |
Suffix array | Aladdin Knowledge Systems | Frame Relay Assembler/Disassembler |
Demand paging | CoSign single sign on | Null route |
Architecture of Btrieve | Password management | Patch panel |
Memory segmentation | Whale (computer virus) | PROFINET |
Message passing | Dave Kleiman | Category:Industrial Ethernet |
B+ tree | Rop Gonggrijp | Radio over IP |
Corecursion | Privilege bracketing | Defence Information Infrastructure |
Schأ¶nhage–Strassen algorithm | CERT Coordination Center | Category 4 cable |
Binary data | ShieldsUp | Avionics Full-Duplex Switched Ethernet |
Digest access authentication | Marc Maiffret | QuickTime Broadcaster |
Left recursion | Archiveus | RASPPPoE |
OLE DB | Certified Computer Examiner | Switch virtual interface |
Predicate transformer semantics | Ping-Pong virus | Physical Medium Dependent |
Chromatic polynomial | Bro (software) | DOCSIS Set-top Gateway |
Snowflake schema | AEGIS SecureConnect | Physical Coding Sublayer |
Search problem | Yamanner | Lawrence Roberts (scientist) |
Software transactional memory | Economics of security | Gأ‰ANT2 |
Radix tree | Commwarrior-A | Knowledge-based processor |
Lucid (programming language) | Peg DHCP | Multiple Registration Protocol |
Akelarre (cipher) | Software security assurance | LwIP |
Index locking | Lorcon | Object-based storage device |
Vertex separator | Messenger Plus! | Automatically switched optical network |
Interval tree | Cracking of wireless networks | Middlebox |
Reversible computing | Cyber Security Task Force | StreamCast Networks |
RSA problem | Cisco Global Exploiter | NetWare Loadable Module |
Secure voice | David Litchfield | List of SIP software |
Acoustic cryptanalysis | Malicious Software Removal Tool | Open-access network |
Brian Randell | Peter Garza | Internet Gateway Device Protocol |
ContactPoint | Hackers Wanted | Category 1 cable |
Computational intelligence | Network Access Control | Category 2 cable |
Cramer–Shoup cryptosystem | Protocol-based intrusion detection system | SCinet |
De Bruijn sequence | Application protocol-based intrusion detection system | Multicast Open Shortest Path First |
Comparison of relational database management systems | Attack surface | Internet Protocol Control Protocol |
Entry point | SpywareQuake | Corporation for Education Network Initiatives in California |
Optimal asymmetric encryption padding | Emcodec | CaBIG |
MQV | C-list (computer security) | Weighted random early detection |
Treemapping | Local shared object | RelayNet |
Comparison of object-relational database management systems | IT Underground | Secure Hypertext Transfer Protocol |
Smith–Waterman algorithm | Voice phishing | Kaseya Network Monitor |
Row- and column-major order | Kerio Control | IEEE 1355 |
Commit (data management) | Zip bomb | Remote scripting |
Fortuna (PRNG) | Rafael Nأ؛أ±ez (hacker) | Cable Internet access |
Actor model | Ewido Networks | IEEE 1901 |
SHA-2 | CryptGenRandom | Home network |
Loose coupling | Vyatta | Apple Network Server |
IEEE P1363 | Tribe Flood Network | Hybrid automatic repeat request |
Multimap | Trinoo | Bandwidth-delay product |
AA tree | Defensive computing | Category:Nortel |
Integrated Computer-Aided Manufacturing | Honeynet Project | Dynamic Multipoint Virtual Private Network |
Delete (SQL) | Microsoft Forefront | Ethernet Powerlink |
Zentralblatt MATH | Joanna Rutkowska | TCP Westwood plus |
Jeffrey Ullman | Cryptoloop | Wireless Router Application Platform |
List of NP-complete problems | Wireless intrusion prevention system | OpenBSD security features |
Call stack | Information assurance | Edge device |
Aravind Joshi | Navidad virus | Category:Denial-of-service attacks |
Factory (object-oriented programming) | Michael Schroeder | Qualcomm Atheros |
Operational data store | Nobody (username) | Internet Fibre Channel Protocol |
Dominating set | WANSecure Firewall | DECserver |
Rubberhose (file system) | Google hacking | Air gap (networking) |
Maximal independent set | GlobalHell | CANopen |
Calling convention | Category:Free antivirus software | Netlink |
Linear grammar | Kinsmod | Flooding (computer networking) |
Charles Goldfarb | Blue Pill (software) | BIC TCP |
Internet studies | Festering Hate | Private IP |
Loop optimization | SMS phishing | Firewall pinhole |
Quadratic probing | Sysjail | QuickTime Streaming Server |
Feedback vertex set | Robert C. Seacord | Provider-independent address space |
Feedback arc set | Department of Defense Information Assurance Certification and Accreditation Process | Jumbo frame |
Asynchronous I/O | Information Technology Security Assessment | Mobile Computing and Communications Review |
Keystroke-level model | Window Snyder | IEEE 802.1ag |
IBM Research - Almaden | Mixter | Dynamic synchronous transfer mode |
Function composition (computer science) | Responsible disclosure | Packet crafting |
Per Martin-Lأ¶f | Child Exploitation Tracking System | Label switch router |
Clipping (computer graphics) | Natas (computer virus) | Fair queuing |
Proxy re-encryption | Extended Validation Certificate | NT LAN Manager |
Computational Diffie–Hellman assumption | Filesystem-level encryption | NAT Port Mapping Protocol |
In-memory database | Heuristic analysis | Ethernet crossover cable |
Microsoft Jet Database Engine | Comparison of firewalls | ISO/IEC 11801 |
Dependent type | Dan Boneh | HSTCP |
Graph isomorphism problem | Computer Security Institute | Packet loss concealment |
Database audit | Roger R. Schell | T/TCP |
Null (SQL) | Brontok | IEEE P802.1p |
Pseudorandom binary sequence | Security and Maintenance | Category:Internet self-classification codes |
Operator-precedence grammar | Host protected area | Devicescape |
Bitmap index | Chief privacy officer | Smith Micro Software |
Poly1305 | System Center Data Protection Manager | LeechModem |
ElGamal signature scheme | HTTP header injection | Vsftpd |
P/poly | Multiplexed Transport Layer Security | Ethernet extender |
Coding by exception | Md5deep | Congestion window |
Void type | Employee monitoring software | BiModem |
POSSE project | Christopher Soghoian | Lynx (protocol) |
IDEA NXT | Chad Davis | Tmodem |
Pumping lemma for regular languages | Opportunistic TLS | Reserved IP addresses |
Cyberinfrastructure | Petname | ZMax |
Cursor (databases) | Melih Abdulhayoؤںlu | IEEE 802.11y-2008 |
E0 (cipher) | Air Force Cyber Command (Provisional) | ProCurve |
Boomerang attack | Category:Information technology organisations | Super G (wireless networking) |
Quantum programming | ExploreZip | Energy Sciences Network |
Domain-specific modeling | Scores (computer virus) | Sun SPOT |
K-ary tree | MacMag | Extreme Networks |
National DNA database | MDEF | ZRTP |
Interlock protocol | Differentiated security | SM4 Algorithm |
Common Algebraic Specification Language | Dennis Moran (computer criminal) | Maximum throughput scheduling |
Single event upset | Website spoofing | Ethernet Automatic Protection Switching |
Longest common substring problem | File inclusion vulnerability | Mail-sink |
Lamport's bakery algorithm | CVSS | Microcom Networking Protocol |
Ciphertext indistinguishability | Stration | PWE3 |
Forward secrecy | Milestone Systems | AOSS |
Futures and promises | Kernel Patch Protection | TCP sequence prediction attack |
Jaccard index | Idle scan | Michael Silverton |
Preemption (computing) | 4K (computer virus) | Host (network) |
Arts and Humanities Citation Index | Jeremy Hammond | Metrics (networking) |
Lustre (programming language) | 1260 (computer virus) | HyperSCSI |
Lock (database) | Martأn Abadi | Wireless site survey |
OCB mode | Payment Card Industry Data Security Standard | Ricochet (Internet service) |
CCM mode | AntiVermins | Connect:Direct |
Authenticated encryption | File binder | SEMCI |
Data structure alignment | Movieland | Jumbogram |
Destructor (computer programming) | Rafail Ostrovsky | Time Independent Escape Sequence |
Microsoft Data Access Components | FSA Corporation | Commercial Internet eXchange |
SQL-92 | Jim Christy | MTR (software) |
Broadcast encryption | Q-CERT | Hole punching (networking) |
Concrete security | Object-capability model | Interconnect bottleneck |
Hidden Field Equations | Damballa (company) | Content processor |
Profiling (computer programming) | AOL Active Virus Shield | Freesite |
A Symbolic Analysis of Relay and Switching Circuits | Authenticated Identity Body | Virtual Leased Line |
Arrow (computer science) | Security controls | Nintendo GameCube Broadband Adapter and Modem Adapter |
Merge (version control) | Factotum (software) | Category:Wireless sensor network |
Deterministic encryption | Twinge attack | JPIP |
Oakley protocol | Lawrie Brown | Geocast |
Answer set programming | Attack patterns | HTTP compression |
Block cellular automaton | Ambient authority | Constrained Shortest Path First |
Rainbow table | Syhunt | Ethernet over SDH |
Declarative Referential Integrity | Bot herder | LMHOSTS |
Semi-Thue system | Webroot | Head-of-line blocking |
Goldwasser–Micali cryptosystem | Norton 360 | Category:Network addressing |
Channel I/O | Data loss prevention software | Black hole (networking) |
Full Domain Hash | HitmanPro | List of SIP request methods |
ADOdb Lite | Cascade (computer virus) | List of SIP response codes |
Automatic parallelization | Muffin (proxy) | Windows DNA |
Concurrent computing | Lance Hoffman | D-Link G604T network adaptor |
Station-to-Station protocol | Carlisle Adams | Compound TCP |
Data element definition | Misuse detection | Network Chemistry |
Object-oriented analysis and design | MacScan | Comparison of open-source wireless drivers |
Higher-order abstract syntax | Dead Peer Detection | Internet Control Message Protocol version 6 |
Recordset | Burt Kaliski | Dynamic bandwidth allocation |
David Cheriton | Nikita Borisov | TransPAC2 |
Herb Grosch | Kaisa Nyberg | EtherCAT |
Efficient Probabilistic Public-Key Encryption Scheme | 5lo | Space Communications Protocol Specifications |
Salsa20 | SSH Communications Security | Exterior gateway protocol |
Hessian form of an elliptic curve | Paul van Oorschot | Template:Routing scheme |
DPLL algorithm | Alec Yasinsac | Active queue management |
Leftist tree | Bradley Willman | Nasan |
Stream (computing) | Riskware | Audio over Ethernet |
User error | Spy-phishing | Rollover cable |
Trusted Computing Group | Syndie | Mobile VoIP |
Proof complexity | Jonathan James | AEGIS SecureConnect |
Exact cover | MP3Concept | Ingress router |
Algorithmic information theory | Finjan | Ethernet physical layer |
St-connectivity | Hacker group | Ethernet in the first mile |
CBC-MAC | WARP (information security) | Goodput |
Karp–Lipton theorem | Tom Berson | WiMedia Alliance |
Vantage-point tree | STRIDE (security) | AES51 |
Quickselect | Event data | Split multi-link trunking |
Signed zero | Institute for Information Infrastructure Protection | Advanced Message Queuing Protocol |
John Gage | L. Jean Camp | Global Environment for Network Innovations |
Time series database | Organisation-based access control | H-TCP |
Behavior-driven development | Chris Klaus | Committed information rate |
Evaluation strategy | Authbind | New API |
List of computer science conferences | Month of bugs | 6LoWPAN |
Collision resistance | Cyber force | Fully switched network |
Cigarette smokers problem | Computer security incident management | EAD socket |
Unique games conjecture | CDP Spoofing | TCP window scale option |
PCP theorem | ESafe | Network monitoring interface card |
Cryptomeria cipher | Server-Gated Cryptography | Duplex mismatch |
Business Process Model and Notation | Evil twin (wireless networks) | TERA |
Anonymous recursion | WANK (computer worm) | N3 (NHS) |
D (data language specification) | Father Christmas (computer worm) | NHSnet |
Blum–Goldwasser cryptosystem | Reverse connection | Buffalo network-attached storage series |
R (complexity) | OpenCA | LSID |
Fagin's theorem | Skype security | Individual Address Block |
Simple Features | Free Speech Flag | ODVA (company) |
Inverted index | LAIM Working Group | Network Access Control |
Generalized suffix tree | Torpig | Dynablock |
Pseudo-polynomial time | Samhain (software) | Equal-cost multi-path routing |
Cryptographic Service Provider | Jeffrey Hunker | Path MTU Discovery |
Comparison sort | Security Protocols Open Repository | Bandwidth allocation |
Upper ontology | PERMIS | UWB Forum |
Lamport signature | Toxbot | Category:Network time-related software |
Attack model | Intel Active Management Technology | Motorola Canopy |
Diffie–Hellman problem | 2007 cyberattacks on Estonia | Vyatta |
Conjunctive grammar | Backdoor.Win32.IRCBot | SIP URI scheme |
Cobham's thesis | Conference on Email and Anti-Spam | Application-level gateway |
Ralph Kimball | Spyvampire | Global network positioning |
Combined Cipher Machine | Security breach notification laws | National Energy Research Scientific Computing Center |
Asymptotically optimal algorithm | User Interface Privilege Isolation | Zero-information network |
Division algorithm | Secure Computing Corporation | H.323 |
Elliptic curve Diffie–Hellman | ISO/IEC 27002 | Site Multihoming by IPv6 Intermediation |
Distributed algorithm | Zenux | Ultra Network Technologies |
GLR parser | Norton AntiBot | Simple Sensor Interface protocol |
Smart environment | MPack (software) | Common Hybrid Interface Protocol System |
Parametric polymorphism | Category:Social engineering (computer security) | SYN cookies |
Pairing heap | 3wPlayer | Net-SNMP |
Armstrong's axioms | Ultimate Fixer | WANSecure Firewall |
Anubis (cipher) | Virus Locker | Max-min fairness |
Push–relabel maximum flow algorithm | MoBlock | Kenya Data Networks |
Check constraint | WS-Federation | Broadview Networks |
Christos Papadimitriou | Collaboration-oriented architecture | IEBus |
NTRUSign | ContraVirus | Very high-speed Backbone Network Service |
GGH signature scheme | Web Services Security Kerberos Binding | FastPath |
Approximate string matching | Dave Aitel | Residential gateway |
Jack Edmonds | Web Single Sign-On Interoperability Profile | RAD Group |
Unit type | Web Single Sign-On Metadata Exchange Protocol | Fully connected network |
.onion | Gpg4win | Token ring |
OpenBSD security features | INIT 1984 | List of Bluetooth profiles |
Skew heap | Separation of protection and security | Operations, administration and management |
3-D Secure | Protection mechanism | Alfred Spector |
Anonym.OS | Angela Orebaugh | SWITCH Information Technology Services |
Brian Reid (computer scientist) | Vba32 AntiVirus | Chipcom |
Accuracy paradox | Tأµnu Samuel | Circuit ID |
Plaintext-aware encryption | KWallet | List of Internet exchange points by size |
Introduction to Automata Theory, Languages, and Computation | CAPICOM | 64b/66b encoding |
Call graph | Peter Gutmann (computer scientist) | Berkeley Automounter |
Where (SQL) | Zlob trojan | Router alert label |
Boyce–Codd normal form | Derek Atkins | Cleanfeed (content blocking system) |
Fifth normal form | Stack buffer overflow | Weighted fair queueing |
Programming language theory | Microcosm Ltd | IWARP |
Tutte polynomial | ISO/IEC 27005 | Multiplexed Transport Layer Security |
Fragmentation (computing) | Harri Hursti | Sun Modular Datacenter |
Comparison of parser generators | Category:Information technology projects | Interop |
Deterministic pushdown automaton | W32.Myzor.FK@yf | Scopia |
Book embedding | Sherwood Applied Business Security Architecture | Provider Backbone Bridge Traffic Engineering |
Transactional memory | Computer trespass | IEEE 802.1ah-2008 |
David Eppstein | Wicked Rose | Transparent LAN Service |
Cuckoo hashing | Computer Underground Digest | Terabeam |
Universal hashing | Mary Ann Davidson | Proxim Wireless |
Data architecture | Data breach | Source routing |
Constraint satisfaction dual problem | SAINT (software) | Distributed transient network |
Category:Technology strategy | Memory safety | Cheeger constant (graph theory) |
Crypt (Unix) | Windows Security Log | Association of Internet Researchers |
Stable model semantics | Hacking tool | Design of Systems on Silicon |
Catalog Service for the Web | 1984 Network Liberty Alliance | Universal Powerline Association |
Catamorphism | Layered security | Port Aggregation Protocol |
EAX mode | Privacy-invasive software | Category:Mid-importance Computer networking articles |
Mario Szegedy | Gateway Anti-Virus | Category:Physical layer protocols |
Verifiable secret sharing | Access token | GeoNet |
Declaration (computer programming) | Mandatory Integrity Control | Category:Information technology organisations |
Serializability | Fast flux | Home Gateway Initiative |
Commitment ordering | Virgil D. Gligor | Network booting |
SM4 Algorithm | National Vulnerability Database | MAC filtering |
Nominal type system | Security Content Automation Protocol | Category:Link access protocols |
Structural type system | W32/Storm.worm | Broadcast radiation |
Complexity of constraint satisfaction | Ambulance (computer virus) | Cable dressing |
Inside–outside algorithm | Sony malware | Network address |
LR-attributed grammar | NetIQ Access Manager | Passport Carrier Release |
ECLR-attributed grammar | Kenneth P. Weiss | 100 Gigabit Ethernet |
Spatial database | Dual EC DRBG | Rogue DHCP |
Edge cover | Kiwicon | Bandwidth equalization |
Bibliographic database | Protected computer | Idle scan |
Graph state | Bluebugging | Link Layer Topology Discovery |
Doubly linked list | Stefan Savage | OmniPeek |
CMAC | Consumer alert system | List of network protocol stacks |
PostBQP | TLS-PSK | Geographic routing |
Access Control Matrix | CryptoRights Foundation | Multiservice Switch |
Knuth Prize | Akbot | Etherloop |
YAWL | Blacker (security) | IEEE 802.1AE |
Executable UML | Zardoz (computer security) | Reciprocity (network science) |
Pre-shared key | Micro Bill Systems | UDP-Lite |
Color quantization | GlobalSign | Alarm filtering |
Data domain | CESG Claims Tested Mark | Dynamic Trunking Protocol |
Hأ©ctor Garcأa-Molina | Virtual security switch | ATM25 |
Hasty Pudding cipher | Przemysإ‚aw Frasunek | TCP acceleration |
Regular tree grammar | MacSweeper | TCP-Illinois |
MAINWAY | Mylife (computer worm) | Link-local address |
Network Security Services | Alcra (computer worm) | Comparison of wireless data standards |
SQL:2003 | Human–computer interaction (security) | Outline of the Internet |
Tacit programming | Swatting | Virtual Interface Architecture |
Information algebra | Information Networking Institute | Category:Fiber-optic connectors |
Architectural pattern | Category:Risk analysis methodologies | Mobile broadband |
Jim Highsmith | Johnny Long | Hybrid Scheduling |
Application virtualization | Cyber Storm Exercise | Dell PowerConnect |
David McGoveran | Transaction verification | LocalTalk-to-Ethernet bridge |
Nikos Lorentzos | Cold boot attack | CaGrid |
Grille (cryptography) | IT risk | GatorBox |
Ring signature | Secure coding | ISCSI Extensions for RDMA |
Haxe | Centurion guard | GlusterFS |
W-shingling | Symantec Endpoint Protection | Tail drop |
MINIX 3 | Four Horsemen of the Infocalypse | Infomania |
Cooperative multitasking | Device fingerprint | Government Secure Intranet |
Harmony Compiler | Cyber Storm II | PME Aggregation Function |
Enterprise Data Modeling | Trust anchor | Category:Bonding protocols |
Mathematical Optimization Society | Windows Search | 10PASS-TS |
Cris Kobryn | Online Armor Personal Firewall | Inter-server |
Hopcroft–Karp algorithm | Heap spraying | List of Bluetooth protocols |
Rabin signature algorithm | EC-Council | List of WiMAX networks |
Map (higher-order function) | PKCS 1 | Digital media player |
Disaster informatics | Ne0h | MEF Forum |
David E. Goldberg | Pre-boot authentication | Catalyst 6500 |
3M computer | Kraken botnet | Ethernet over PDH |
Anticipatory scheduling | Category:Electronic Frontier Foundation | Ethernet frame |
Benaloh cryptosystem | Paywall | ClydeNET |
Naccache–Stern cryptosystem | Sygate Technologies | EtherSound |
Naccache–Stern knapsack cryptosystem | Blacklist (computing) | BOINC client–server technology |
John Amsden Starkweather | Monoculture (computer science) | SSH Communications Security |
Strong NP-completeness | Peter H. Gregory | Network agility |
Lagrangian relaxation | Virtual Bouncer | Nick McKeown |
Fold (higher-order function) | Runas | Nemo Systems |
Linear programming relaxation | Yersinia (computing) | Category:LAN messengers |
Computational complexity of mathematical operations | Website reputation ratings | Simple API for Grid Applications |
Tree sort | Computer Online Forensic Evidence Extractor | Gordon Stitt |
Cryptography law | Kak worm | Packet transfer delay |
Ronald Fedkiw | KoKo (computer virus) | Internet number |
Outline of artificial intelligence | Michael Schearer | Copper cable certification |
Generalized algebraic data type | Category:Botnets | NMEA 2000 |
Letter frequency | Einstein (US-CERT program) | T-MPLS |
Secure Hash Standard | Dan Kaminsky | CobraNet |
End-user development | VLAN hopping | Routing protocol |
Minimum-cost flow problem | Robert Slade | Service data point |
Blob detection | Twelve Tricks | Network delay |
A-normal form | Category:British computer criminals | Kiwi Advanced Research and Education Network |
Web of Knowledge | Category:Computer criminals by nationality | Network for Earthquake Engineering Simulation |
Damgأ¥rd–Jurik cryptosystem | Category:Russian computer criminals | Proposed top-level domain |
Threshold cryptosystem | Category:German computer criminals | Taxonomy of congestion control |
Domain-key normal form | Proofpoint, Inc. | Category:Computer networking articles needing expert attention |
Column-oriented DBMS | Jon Callas | Cognio |
Demzilla | Meredith L. Patterson | Application delivery network |
ZINC database | Marcus J. Ranum | Boston MXP |
Application streaming | National Cybersecurity Center | EMBnet |
Order by | Curve25519 | Category:Start-Class Computer networking articles |
Feige–Fiat–Shamir identification scheme | Qualified Security Assessor | Category:Low-importance Computer networking articles |
Filesystem-level encryption | Lynis | Windows Vista networking technologies |
Thomsen Diagrams | SafeNet | Dimension Data |
Symposium on Principles of Programming Languages | XSS worm | Inter-domain |
Variable-length code | Committee on National Security Systems | Future Internet Research and Experimentation |
Dijkstra Prize | Shankar's Virus | Berkeley Packet Filter |
Computer programming in the punched card era | Martin Roesch | Leader election |
Hadamard code | Daniel B. Cid | Connection-oriented Ethernet |
KeeLoq | Evgeniy Gabrilovich | Windows Rally |
Adaptive grammar | Hacking at Random | ANT (network) |
Okamoto–Uchiyama cryptosystem | Zorp firewall | ACSI-CORBA mapping |
Fractional cascading | Man-in-the-browser | Forwarding information base |
Parity game | Neil Daswani | Eduroam |
Circuit complexity | Switzerland (software) | C-DOT |
Hutter Prize | Bohmini.A | ISO/IEEE 11073 |
Terminal and nonterminal symbols | Massachusetts Bay Transportation Authority v. Anderson | Skype security |
SQL Anywhere | Uncomplicated Firewall | Unisphere Networks |
Opportunistic TLS | Bugtraq | TechNet (computer network) |
Bozo bit | Killbit | Named data networking |
Quantum finite automata | Bargain Buddy | BlueArc |
Public key fingerprint | DNSCurve | Pulse~Link |
Deterministic context-free language | W32.Gammima.AG | Multi-link trunking |
Weak NP-completeness | TriGeo Network Security | Internet layer |
Adaptive quadrature | David Brumley | Red Swoosh |
TypeScript | International Journal of Private Law | DANTE |
Anomaly detection | Susan Landau | HP OpenCall |
Competitive analysis (online algorithm) | Web threat | Source route bridging |
Information-based complexity | Cookiemonster attack | IBM WebSphere DataPower SOA Appliances |
Chan's algorithm | Jeanson James Ancheta | Loop Management System |
Kotok-McCarthy | RF monitor software | IGMP snooping |
Hierocrypt | Null session | Sensor node |
Key encapsulation | Fake AP | TZSP |
Pairing-based cryptography | Rogue system | Network allocation vector |
Link time | Yasca | Multi-user MIMO |
Automated proof checking | Clickjacking | MP101 |
List of online databases | Gary McGraw | Ethernet over PDH over SONET/SDH |
John Alan Robinson | Charlie Miller (security researcher) | Virtual Link Aggregation Control Protocol |
Gadget (computer science) | AS4 | Operating system Wi-Fi support |
AntiPatterns | Mega-D botnet | R-SMLT |
Cosine similarity | IT Baseline Protection Catalogs | InterSwitch Trunk |
ARIA (cipher) | Template:Symantec | Distributed Multi-Link Trunking |
CIPHERUNICORN-E | Agent.AWF | Distributed Split Multi-Link Trunking |
CIPHERUNICORN-A | Mebroot | Metro Ethernet Routing Switch 8600 |
Dutch national flag problem | SUPERAntiSpyware | Grid-oriented storage |
Alex Biryukov | Category:Computer security qualifications | National Transportation Communications for Intelligent Transportation System Protocol |
Deniable authentication | Category:Computer security accreditations | Lockstep protocol |
Heinz Zemanek | HDDerase | WS-Federation |
COCONUT98 | CyberArk | Kerrie Holley |
Interface-based programming | Douglas Thomas | Avaya ERS 8600 |
Gerhard Weikum | JBoss SSO | 6in4 |
Muller automaton | Managed security service | Nexus Hawk |
Davies' attack | Category:Australian computer criminals | IEC 61883 |
Michael McRobbie | Graugon AntiVirus | White spaces (radio) |
Implicit certificate | Warzapping | IP fragmentation attack |
Frame (artificial intelligence) | McColo | AtlantaIX |
Tom Berson | Koobface | Category:IEEE 802.11 |
Dynamic loading | Template:Intel technology | Anonymizer |
Data aggregation | AACS encryption key controversy | Mod qos |
Integrity constraints | Form grabbing | Internalnet |
Hirsch conjecture | SOAtest | EtherNet/IP |
Graph cuts in computer vision | Justin Tanner Petersen | IPv6 transition mechanism |
String operations | BigFix Inc | BREN |
Arthur Samuel | VirusBuster | Force10 |
Tony Hey | Template:Firewall software | Adisak Mekkittikul |
Coinduction | Template:WikiProject Computer Security | MetroFi |
Server-Gated Cryptography | Category:Start-Class Computer Security articles | Multiwavelength optical networking |
Agent-based computational economics | Category:Stub-Class Computer Security articles | List of DNS record types |
Shamir's Secret Sharing | Category:Mid-importance Computer Security articles | IEEE Communications Society |
Mean shift | Category:WikiProject Computer Security articles | Category:Information technology projects |
Encyclopedia of Reagents for Organic Synthesis | Category:WikiProject Computer Security | Wireless repeater |
Introselect | Category:Computer Security articles by quality | Unique local address |
Rule 184 | Category:Computer Security articles by importance | Cooperative MIMO |
BD+ | Alexander Sotirov | ControlNet |
Abstract family of languages | Cyberwarfare by Russia | DHCP snooping |
Instrumentation (computer programming) | Virus Information Alliance | Fixed wireless |
Government database | Category:FA-Class Computer Security articles | Private VLAN |
Usage share of operating systems | ArcSight | ISO/IEC JTC 1 |
Data warehouse appliance | In-session phishing | OpenSimulator |
2-EXPTIME | Comodo Internet Security | Link-Local Multicast Name Resolution |
SQL Server Compact | Tor-ramdisk | Daintree Networks |
Karger's algorithm | Happy99 | IEEE 802.11 (legacy mode) |
Edmonds' algorithm | AhnLab, Inc. | Cube-connected cycles |
Distinguishing attack | Category:Computer security companies specializing in botnets | IEEE 802.11a-1999 |
Gio Wiederhold | FireEye | IEEE 802.11b-1999 |
SLD resolution | Category:Screenshots of spyware removal | IEEE 802.11g-2003 |
Total functional programming | Mirar Toolbar | Template:Gnutella |
SQL/PSM | Norton Insight | Avaya ERS 5500 Series |
Hybrid cryptosystem | Category:B-Class Computer Security articles | Technology stack |
Global serializability | Norton Safe Web | Transmission delay |
Circular buffer | Shred (Unix) | Category:Top-importance Computer networking articles |
Graph partition | Melissa Hathaway | Audio over IP |
SafetyLit | Zone-H | Federal Networking Council |
Back-end database | Open security | Network speaker |
List decoding | Cameron Lacroix | RMI Corporation |
Delimited continuation | Federal Desktop Core Configuration | Network-centric emergency notification |
Jenkins–Traub algorithm | Category:Unknown-importance Computer Security articles | Byte serving |
DNA database | NetScreen Technologies | Glenn Ricart |
Collection (abstract data type) | Malwarebytes | MC-LAG |
Gpg4win | DREAD (risk assessment model) | Eirpac |
And–or tree | Category:NA-importance Computer Security articles | FlexCAN |
Blom's scheme | Category:NA-Class Computer Security articles | Sun Neptune |
Quantum walk | Category:Unassessed Computer Security articles | PSNEXT |
KeY | Category:List-Class Computer Security articles | National Grid Service |
Trellis (graph) | Category:GA-Class Computer Security articles | Ceph (software) |
Naked objects | Category:FL-Class Computer Security articles | Certified Wireless Network Administrator |
Crypto phone | Template:Cult of the Dead Cow | Panasas |
Decision Linear assumption | Network forensics | Fencing (computing) |
CMN-GOMS | Hack trapper | Netgear SC101 |
List of academic computer science departments | Pete Herzog | Network Direct Attached Storage |
Distributed concurrency control | GhostNet | Karn's algorithm |
International Symposium on Graph Drawing | Kaspersky Anti-Hacker | Aurora (protocol) |
ATLA Religion Database | CA/Browser Forum | Network equipment provider |
Jim Bell | Swizzor | Corporation for Research and Educational Networking |
Helmut Schreyer | X.1035 | Zardoz (computer security) |
Aspect-oriented software development | DoD Cyber Crime Center | Data rate units |
74181 | Hacker Halted | Category:Internet-based works |
Computers and Intractability | Category:Computer security conferences | Semaphore Flag Signaling System |
Flashsort | Dr Solomon's Antivirus | Backbone cabling |
Scott Ambler | United States Cyber Command | Buffalo AirStation |
Analytical Sciences Digital Library | Privacy piracy | Lanstar |
Activation function | Offensive Security Certified Professional | Virtual output queueing |
Operational system | Sean Hastings | OpenFabrics Alliance |
One-way quantum computer | Jake Kouns | Virtual security switch |
Cluster state | Obfuscated TCP | GigE Vision |
Dual EC DRBG | Raphael Gray | AirPort Time Capsule |
Artificial bee colony algorithm | Leonard Rose (hacker) | TCP hole punching |
Comparison of database tools | Multi-factor authentication | Peer-to-peer SIP |
TLS-PSK | BotHunter | TTP/A |
Three-pass protocol | Banner grabbing | Internet in Ukraine |
Kernelization | Ivan Krstiؤ‡ | Carrier Ethernet |
B* | Little Snitch | High Performance Storage System |
Embedded database | Vulnerability management | Template:Infobox Internet exchange point |
David S. H. Rosenthal | Tom Van Vleck | Information Networking Institute |
Transaction data | Imprivata | Sytek Inc |
Asymptotic computational complexity | Anna Kournikova (computer virus) | Stream Reservation Protocol |
Average-case complexity | Billion laughs | Live Communications Server 2003 |
Mogensen–Scott encoding | Malware Bell | Z-SAN |
Bees algorithm | Slowloris (computer security) | Network block device |
Quantum digital signature | Nftables | DSL Rings |
Applications of artificial intelligence | Software forensics | Fixed–mobile convergence |
Cold boot attack | Gumblar | RTP audio video profile |
SQL:2008 | Antisec Movement | Spider Systems |
Boneh–Franklin scheme | Neurosecurity | Category:Audio network protocols |
Cocks IBE scheme | Mark Ludwig | Blue (queue management algorithm) |
Multivariate cryptography | Mobile device forensics | PKCS 1 |
Computational creativity | Computer security conference | Italian Grid Infrastructure |
Job shop scheduling | Badbunny | Fibre Channel over Ethernet |
Artificial stupidity | One-time authorization code | MagicJack |
Monoculture (computer science) | Heap feng shui | IP exchange |
Tomaso Poggio | Category:Privilege escalation exploits | Worldwide LHC Computing Grid |
DFA minimization | KYPS | Software flow control |
Blum–Micali algorithm | Return-oriented programming | ARPA Host Name Server Protocol |
Topological data analysis | OpenCandy | Airborne Networking |
TorChat | Offer Assistant | Stackable switch |
Dantzig–Wolfe decomposition | Green Antivirus 2009 | TM Forum |