Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
h
- Hardware Integrity Description: Hardware integrity refers to the assurance that the physical components of a computer system are functioning correctly and have not(...) Read more
- Host Vulnerability Assessment Description: Host vulnerability assessment is the process of identifying and evaluating vulnerabilities in host systems, which are the devices(...) Read more
d
- Databases hackingDescription: Database hacking refers to the act of exploiting vulnerabilities in database systems, which can lead to unauthorized access to(...) Read more
m
- Mobile hackingDescription: Mobile hacking refers to the act of exploiting vulnerabilities in mobile devices, such as smartphones and tablets, to gain(...) Read more
s
- Security hackingDescription: Security hacking refers to the act of exploiting security weaknesses in systems and networks, with the aim of identifying(...) Read more
p
- Privacy hackingDescription: Privacy hacking refers to the act of exploiting vulnerabilities that compromise user privacy. This phenomenon has become(...) Read more
i
- Identity hackingDescription: Identity hacking refers to the act of exploiting vulnerabilities in information systems to steal personal information, such as(...) Read more
w
- Web application hackingDescription: Web application hacking refers to the act of exploiting vulnerabilities in web applications with the aim of gaining unauthorized(...) Read more
h
- HTTP Strict Transport Security Description: HTTP Strict Transport Security (HSTS) is a web security policy mechanism that helps protect websites against man-in-the-middle(...) Read more
- High Performance Computing Security Description: High-Performance Computing Security (HPC) refers to the measures and protocols implemented to protect systems and data in computing(...) Read more
- HBase Description: HBase is a distributed and scalable big data store modeled after Google's Bigtable. Designed to handle large volumes of data in(...) Read more
- Hierarchical Database Description: A hierarchical database is a database model that organizes data in a tree-like structure, where each record has a single parent and(...) Read more
- Heterogeneous database Description: A heterogeneous database is a database that can store and manage different types of data from various sources. This type of(...) Read more
- HAVING Description: HAVING is an SQL clause used to filter records that operate on summarized results of GROUP BY. Unlike the WHERE clause, which(...) Read more
- Hint Description: A hint is a directive given to the SQL optimizer to influence the execution plan chosen for a query. These directives allow(...) Read more