Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
d
- Drive-by Download Description: Drive-by Download refers to a method of transferring malicious software to a computer without the user's consent. This process can(...) Read more
- Domain Spoofing Description: Domain spoofing is a technique used by attackers to impersonate a legitimate domain and deceive users. This type of attack relies(...) Read more
- Denial of Service Attack Description: A denial of service (DoS) attack is a malicious attempt to disrupt the normal functioning of a server, service, or network by(...) Read more
- Dynamic Analysis Description: Dynamic analysis is the testing of software by executing it in a runtime environment. Unlike static analysis, which examines the(...) Read more
- Database Security Description: Database security refers to the protection of databases against compromises to their confidentiality, integrity, and availability.(...) Read more
- Digital Rights Management Description: Digital Rights Management (DRM) refers to a set of technologies and practices designed to control the use of digital content and(...) Read more
- Data governance Description: Data governance refers to the overall management of the availability, usability, integrity, and security of the data employed in an(...) Read more
- Digital footprint Description: The digital footprint refers to the trail of data that a person leaves when interacting with the Internet. This concept encompasses(...) Read more
- Data Classification Description: Data classification is the process of categorizing data to ensure proper handling and protection. This process involves organizing(...) Read more
- Digital Twin Description: A digital twin is a digital replica of a physical object or system used in the context of augmented reality and the Internet of(...) Read more
- Distributed Ledger Technology Description: Distributed Ledger Technology (DLT) is a system that enables the secure and transparent recording of transactions across multiple(...) Read more
- Digital Certificate Description: A digital certificate is an electronic document used to prove ownership of a public key. This certificate acts as a kind of(...) Read more
- Data Masking Description: Data masking is the process of obscuring specific data within a database to protect it. This method is primarily used to safeguard(...) Read more
- Digital Ecosystem Description: The digital ecosystem refers to a complex network of interconnected digital technologies and services that interact with each other(...) Read more
- Data Stewardship Description: Data management is the management of data assets to ensure data quality and compliance. This process involves planning,(...) Read more