Bookmarks tagged [glossary]
https://www.ssl.com/faqs/what-is-an-x-509-certificate/
X.509 is a standard format for public key certificates, digital documents that securely associate cryptographic key pairs with identities such as websites, individuals, or organizations.
Firs...
- tags: security, glossary, ssl-certificate
https://en.wikipedia.org/wiki/Eavesdropping
Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.
https://www.sciencedirect.com/topics/computer-science/entropy
Entropy, in cyber security, is a measure of the randomness or diversity of a data-generating function. Data with full entropy is completely random and no meaningful patterns can be found. Low entr...
https://kubernetes.io/docs/reference/glossary/
This glossary is intended to be a comprehensive, standardized list of Kubernetes terminology. It includes technical terms that are specific to K8s, as well as more general terms that provide useful co...
- tags: kubernetes, glossary
https://en.wikipedia.org/wiki/Hungarian_notation
Hungarian notation is an identifier naming convention in computer programming, in which the name of a variable or function indicates its intention or kind, and in some dialects its type. The original ...
- tags: glossary
https://en.wikipedia.org/wiki/Key_escrow
Key escrow (also known as a “fair” cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party...
- tags: cryptography, glossary
https://en.wikipedia.org/wiki/Publish%E2%80%93subscribe_pattern
In software architecture, publish–subscribe is a messaging pattern where senders of messages, called publishers, do not program the messages to be sent directly to specific receivers, called subscribe...
- tags: glossary, publish-subscribe, architecture
https://en.wikipedia.org/wiki/Transaction_log
In the field of databases in computer science, a transaction log (also transaction journal, database log, binary log or audit trail) is a history of actions executed by a database management system us...
https://en.wikipedia.org/wiki/Request_for_Comments
A Request for Comments (RFC), in the context of Internet technology, is a type of publication from the Internet technical community, including the Internet Engineering Task Force (IETF), the principal...
- tags: glossary
https://computer.howstuffworks.com/vpn4.htm
Site-to-site VPN - A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other. Learn how site-to-site VPNs works.
- tags: glossary, networking, vpn
https://www.gartner.com/it-glossary/
IT Terms, IT Dictionary & IT Definitions
- tags: glossary
Technology Definitions and Cheat Sheets from WhatIs.com - The Tech Dictionary and IT Encyclopedia
- tags: computer-science, glossary
https://en.wikipedia.org/wiki/Spoofing_attack
In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage.
- tags: networking, security, glossary
https://www.youtube.com/watch?v=43fqzaSH0CQ
Building efficient data centers that can hold thousands of machines is hard enough. Programming thousands of machines is even harder. One approach pioneered by Google is known as MapReduce. MapReduce ...
https://docs.mongodb.com/manual/reference/glossary/
Find definition of database, collection, document, BSON etc.