It's a good time to pray for victims of September 11, 2001 terrorist activities!
'
Geneonet


All Terms

802.3
:-)
abstract syntax
Abstract Syntax Notation One (ASN.1)
acceptable risk
Acceptable Use Policy (AUP)
access
access authorization
access control
Access Control List (ACL)
access method
ACK
acknowledgment (ACK)
ACL
active threats
AD
address
address mask
address resolution
Address Resolution Protocol (ARP)
Administrative Domain (AD)
advanced peer-to-peer networking (APPN)
advanced program-to-program communications (APPC)
Advanced Research Projects Agency Network (ARPANET)
AFP
agent
alias
allocate
American National Standards Institute (ANSI)
American Standard Code for Information Interchange (ASCII)
amplifier
Anonymous FTP (File Transfer Protocol)
ANSI
answer modem
API
APPC
AppleShare
AppleTalk
AppleTalk Filing Protocol (AFP)
application
application interface
application layer
Application Program Interface (API)
APPN
archie
archive
archive site
ARCnet (Attached Resource Computing Network)
ARP
ARPA
ARPANET
AS
ASCII
ASN.1
assigned numbers
asymmetric encryption
asynchronous
Asynchronous Transfer Mode (ATM)
asynchronous transmission
ATM
attach
attach manager
attachment unit interface (AUI)
attributes
audit of computer security
AUP
authentication
authorization
Autonomous System (AS)
availability
b/s (bits per second)
back door
backbone
bacterium (informal)
bad block table
bandwidth
bang
bang path
baseband (signaling)
basic conversation
basic conversation verbs
Basic Encoding Rules (BER)
basic input/output system (BIOS)
batch
batch processing
baud
baud rate
BBS
BCNU
BER
Berkeley Internet Name Domain (BIND)
Berkeley Software Distribution (BSD)
BGP
big-endian
binary
BIND
BIOS
Birds Of a Feather (BOF)
bisynchronous transmission
bit
bit rate
bit-mapped graphics
BITNET
block
BNC-connector
BOF
BOOTP
Border Gateway Protocol (BGP)
bounce
boundary function
branch cable
bridge
broadband
broadcast
broadcast search
broadcast storm
brouter
browser
BSD
BTW
BUFFER
bug
Bulletin Board System (BBS)
bus
byte
cache
carrier sense
CATV
CCITT
CCITT recommendations
central processing unit
centralized network
Centronics
character user interface (CUI)
checksum
cipher
ciphertext
class of service
client
client-server
Client-Server Interface
client/server architecture
client/server programming
cluster controller
coaxial
code
cold-site
collision
collision detection
combined functions
combined status indicators
command languages
common programming interface-communications (CPI-C)
communications
communications network
communications security (COMSEC)
communications security equipment
computer conferencing
computer network
computer security
concurrent
confidentiality
confirmation
congestion
connection network
connection-oriented services
connectionless applications
connectionless service
connectivity
console
contention
control point (CP)
control-unit terminal (CUT)
controller board
conversation
conversation security
conversation state
cooperative programming
CP
CP-CP SESSIONS
CP/M
CPU
CREN
crypto-information
cryptochannel
cryptogram
cryptography
cryptology
cryptomaterial
CSMA/CD
CTS/RTS
CUI
cursor
CUT
cyclic redundancy check (CRC)
daemon
data base
data communications
data encryption standard (DES)
data file
data link
data link control
data link layer
data management system
Data origin authentication
data security
data set ready
data terminal ready
datagram
datagram service
DB-25
deallocate
DECnet
dedicated
dedicated line
device driver
dial-up line
dialog box
digital signature
directory
directory rights
disaster
disaster recovery operation
disaster recovery plan
disk storage (disc storage)
distributed data processing (DDP)
distributed network
DLC
DLL
Domain Name System (DNS)
DOS (Disk Operating System)
download
DSR
DTE
DTR
dynamic link library (DLL)
E-mail (electronic mail)
EBCDIC
EDI
Electronic Bulletin Board
electronic data interchange (EDI)
electronic mail
Email message (RFC # 822)
emulator, terminal
EN
encryption
encryption algorithm
end node (EN)
end-to-end encryption
envelope
Ethernet
EtherTalk
Extended Binary Coded Decimal Interchange Code (EBCDIC)
F-connector
FAT
FAX (facsimile)
FEP (Front End Processor)
fiber optic inter-repeater link (FOIRL)
fiber optic medium attachment unit (FOMAU)
fiber optic medium-dependent interface (FOMDI)
fiber optic physical medium attachment (FOPMA)
fiber optics
file allocation table (FAT)
file sharing
file transfer protocol
floppy disks
flow control
focal point
FOIRL BER
FOIRL compatibility interfaces
FOMAU's receive optical fiber
FOMAU's transmit optical fiber
footprint
frame
FTP
full-duplex
gateway
GB
gigabyte (GB)
graphical user interface (GUI)
GUI
half-duplex
handheld password generators (HPGs)
HDLC
headend
Hertz
HFS
Hierarchical File System (HFS)
High-Level Data Link Control (HDLC)
High-Level Language/Application Program Interface (HLLAPI)
highsplit
HLLAPI
host
Host Computer
hot-site
hub
IBM
IBM Token Ring
icon
IEEE
IEEE 802 Standards
IEEE 802.3
impedance
information security
Institute of Electrical and Electronic Engineers (IEEE)
integrity (of data)
interactive processing
interface
intermediate routing
International Standards Organization (ISO)
Internet
internetwork
Internetwork Packet Exchange (IPX)
IP (Internet protocol)
IP Address
IPX
ipx
ipx/spx
ISO
ISO/OSI
jitter
KB
kbyte/s
kernel
key
key distribution center (KDC)
key generator
key hashing
key management
key notarization
kilobits per second (kbit/s)
kilobyte (KB)
kilobytes per second (kbyte/s)
kilohertz
LAN
LAN interface board
leaf
leased line
line extender
link encryption
Listserv Lists (or listservers)
LLC
local area network
local area network (LAN)
LocalTalk
logic bomb
logical link control (LLC)
logical record
logical unit (LU)
logical unit 6.2 (LU 6.2)
login script
long conversation
low entry networking (LEN) NODE
LU
MAC
Mail Transport Agent
Mail User Agent
mainframe computer
malicious software
management services
manager's workstation
Manchester encoding
manipulation detection code
mapped conversation
mapped conversation verbs
Masquerading
master-slave computer system
MB
MDC
medium access control (MAC)
medium attachment unit (MAU)
medium dependent interface (MDI)
megabyte (MB)
menu
menu trees
message
message authentication code (MAC)
message race
MHS
microcomputer
microprocessor
midrange
midsplit
minicomputer
mode name
modem
modification detection code
MTA
MUA
multi-user system
multimedia
Multiple Virtual Storage (MVS)
multitasking
MVS
naming collision
National Institute of Standards and Technology
native key
NetBEUI
NetBIOS (Network Basic Input/Output System)
NetView
network
network adapter
Network File System (NFS)
network interface board
network interface card
network management
network node
network operating system (NOS)
network security
network server
NFS
NIC (Network Information Center)
NIST
NLM
node
nondedicated
notarization
NREN
object
object protection
object reuse
octet
off-the-shelf
office automation
on-line processing
OPAC
open systems interconnection (OSI)
operating system
originate-only-modem
originator
OSI (Open Systems Interconnection)
OSI (Open Systems Interconnection) reference model
outlet
packet
packet assembler/disassembler (PAD)
packet switching
PAD
parallel sessions
parameter
parity
partner
passive threats
passphrase
password
PBX/PABX
peer protocol
peer systems
Peer-entity authentication
peer-to-peer
peer-to-peer LANs
peripheral
peripheral node
persistent verification
personal computer
personal identification number (PIN)
physical access control
physical record
physical security
physical unit (PU)
PIP
plaintext
platform
portability
private key cryptosystem (encryption)
process
processing overlap
program
program initialization parameter (PIP)
protected resource
protocol
protocol data unit (PDU)
protocol suite
PU
public key
public key cryptosystem
public key cryptosystem
pull-down menu
questionnaire
rabbit (informal)
race
RAM
receive
record locking
reference monitor concept
reliability
remote
Remote Access
remote job entry (RJE)
repeater
repudiation
resource
return code
rights
risk analysis
ROM
route
router
routing
SAA
sap
SDLC
security
security audit
security mechanisms
security service
security threat
self-registration
Sequenced Packet Exchange (SPX)
sequential processing
serial
server
session
session security
SFT
Shareware
shell
short conversation
SNA
socket
software
spectrum
spread sheet programs
SPX
SSCP
SSCP-PU SESSION
start-stop transmission
station
stream i/o
subarea
subject
subject security level
subsplit
supervisor
symmetric encryption
synchronization level
synchronous
Synchronous Data Link Control (SDLC)
System Application Architecture (SAA)
System Fault Tolerance (SFT)
system services control point
systems application architecture (SAA)
systems network architecture (SNA)
Systems Network Architecture (SNA)
target
TCP/IP
TCP/IP (Transmission Control Protocol/Internet Protocol)
telecommunications
teletex
TELNET
terminal
Terminal Emulation
terminal emulator
Terminal Server
text editor
text formatter
threats
throughput
TIC
time bomb
TN3270
token
token passing
token ring
Token Ring interface coupler (TIC)
topology
topology database
traffic
traffic analysis
traffic flow confidentiality
traffic flow security
traffic padding
transaction
transaction processing
transaction program (TP)
transceiver
trojan horse
trunk cable
trusted computer system
trusted computing base (TCB)
trusted path
trusted software
turn-key system
twinaxial cable
twisted pair
two phase commits
type 2.1 Node
uninterruptible power supply (UPS)
UNIX
UNIX-to-UNIX CoPy (UUCP)
upload
UPS
Usenet
user
uucp
vector graphics
verb
videotex
virtual circuit
virus
VM/CMS (Virtual Machine/Conversational Monitor System)
VMS
volume
vtap
WAN
warm-site
web browser
wide area network
wide area network (WAN)
Winchester disks
window
windows (Microsoft)
windows uucp leaf system
word processing
workgroup
workstation
worm
WYSIWYG
XON/XOFF

You are visitor number
Hit Counter
Since November 20, 1999

Created by Jim Needham

İVector Graphics 1995

Revised: February 16, 2011
Best viewed with
 

Shop at Amazon.com!


Copyright © 1998 by Enterprise-Wide Computing, Inc.
Design by Enterprise-Wide Computing, Inc.
Email: info@ewc-inc.com
URL: http://ewcnet.com
Last Modified:
Thursday, April 23, 1998