User:Platinum713/Books/Telecommunications
Appearance
The Wikimedia Foundation's book rendering service has been withdrawn. Please upload your Wikipedia book to one of the external rendering services. |
You can still create and edit a book design using the Book Creator and upload it to an external rendering service:
|
This user book is a user-generated collection of Wikipedia articles that can be easily saved, rendered electronically, and ordered as a printed book. If you are the creator of this book and need help, see Help:Books (general tips) and WikiProject Wikipedia-Books (questions and assistance). Edit this book: Book Creator · Wikitext Order a printed copy from: PediaPress [ About ] [ Advanced ] [ FAQ ] [ Feedback ] [ Help ] [ WikiProject ] [ Recent Changes ] |
Telecommunications
[edit]- Telecom Act of 1996
- 003 (UN M.49 code)
- 360 Safeguard
- 3G-324M
- 9P
- ACARM-ng
- Ad Hoc Configuration Protocol
- Administrative division codes of the People's Republic of China
- Administrative domain
- Advanced Message Queuing Protocol
- AEGIS SecureConnect
- Aggregate Level Simulation Protocol
- Airport code
- Amateur radio satellite
- Anomaly-based intrusion detection system
- Anti-pharming
- Anti-worm
- Apache Avro
- Apache Thrift
- Application layer
- Application-level gateway
- Architecture for Control Networks
- Armitage (computing)
- ARP spoofing
- ARPA Host Name Server Protocol
- ArpON
- Asprox botnet
- Attack tree
- Authenticated Identity Body
- Authentication server
- Bagle (computer worm)
- BartVPN
- Bastion host
- BC Geographical Names
- BitTorrent
- BitTorrent tracker
- Black hole (networking)
- Blacker (security)
- Boot Service Discovery Protocol
- Botnet
- BredoLab botnet
- Browser security
- Byzantine Foothold
- C-squares
- Call Admission Control
- CAMEL Application Part
- Captive portal
- Capture the flag
- CCSO Nameserver
- Chapman code
- Character Generator Protocol
- Check Point GO
- Check Point VPN-1
- CimTrak
- Cipher suite
- Cisco Global Exploiter
- Cisco PIX
- Cisco Security Agent
- Cisco Systems VPN Client
- Classification of objects of the administrative-territorial system of Ukraine
- Clear channel assessment attack
- Client Puzzle Protocol
- Client–server model
- CLLI code
- Cloudvpn
- Communications satellite
- Community Identification Number
- Computer security
- Context-based access control
- ContraVirus
- Countermeasure (computer)
- Country code
- Cracking of wireless networks
- CubeSat
- Cutwail botnet
- CVSS
- Cyber security and countermeasure
- CyberCIEGE
- D-Bus
- Daytime Protocol
- DDoS mitigation
- Deep content inspection
- Deep packet inspection
- Defense in depth (computing)
- Device fingerprint
- DHCP snooping
- DHCPv6
- DHIPDS
- DICOM
- Differentiated security
- Digital Postmarks
- Direct Save Protocol
- Directory Access Protocol
- Discard Protocol
- Distributed Codec Engine
- Distributed Data Protocol
- Distributed firewall
- Distributed Interactive Simulation
- Distributed Social Networking Protocol
- Distributed Universal Number Discovery
- DMZ (computing)
- Domain Name System
- Donbot botnet
- Dual-homed
- Dynamic Host Configuration Protocol
- E2eTechnology
- EAIF
- Earth observation satellite
- Echo Protocol
- EGL (API)
- Egress filtering
- End node problem
- Etch (protocol)
- Evil bit
- Extranet
- Fail2ban
- Fake AP
- Faraday tent
- Federal Geographic Data Committee
- Federal Information Processing Standard state code
- Festi botnet
- File Access Listener
- File Transfer Protocol
- Financial Information eXchange
- Firewalk (computing)
- Firewall (computing)
- Firewall pinhole
- Firewalls and Internet Security
- Forward-confirmed reverse DNS
- FTAM
- FTP servlet
- FTPS
- Gazetteer of Australia
- Generalized TTL security mechanism
- Geo URI
- Geo-imputation
- Geocoding
- Geographic coordinate system
- Geographic Names Information System
- Geographical Names Board of Canada
- Geohash
- Geohash-36
- GeoNames
- GEOnet Names Server
- Geoparsing
- GeoSMS
- Geotagging
- Global Telecoms Exploitation
- Gnutella
- Google Safe Browsing
- Gopher (protocol)
- Greynet
- Grid (spatial index)
- Grum botnet
- Guided tour puzzle protocol
- Gumblar
- H.248
- H.323
- Hacker (computer security)
- High-Tech Bridge
- Hole punching
- Honeyd
- HoneyMonkey
- Honeynet Project
- Honeypot (computing)
- Honeytoken
- Hookflash
- Host Identity Protocol
- HTTP 2.0
- HTTP body data
- Hyper geocode
- Hyper Text Coffee Pot Control Protocol
- Hypertext Transfer Protocol
- IBM Advanced Program-to-Program Communication
- ICMP hole punching
- Identity driven networking
- IEC 62351
- IEEE 802.1X
- IF-MAP
- INAP
- Ingress filtering
- Integrated Windows Authentication
- Inter-Asterisk eXchange
- Inter-protocol exploitation
- International Air Transport Association airport code
- Internet
- Internet Communications Engine
- Internet Message Access Protocol
- Internet Open Trading Protocol
- Internet Relay Chat
- IntruShield
- Intrusion prevention system
- IPFilter
- Ipfirewall
- IpTTY
- ISCSI
- ISCSI Boot Firmware Table
- ISDN User Part
- ISP redirect page
- Java Naming and Directory Interface
- Java Remote Method Protocol
- Jingle (protocol)
- KAME project
- Kaspersky Anti-Virus
- Kelihos botnet
- Kerberos (protocol)
- Kerio Control
- Key distribution center
- Key ring file
- Knowledge-based authentication
- Kraken botnet
- Lethic botnet
- Lightweight Directory Access Protocol
- Link-local Multicast Name Resolution
- List of cyber attack threat trends
- List of geocoding systems
- List of IATA-indexed railway stations
- List of postal codes
- List of products that support SMB
- List of SIP request methods
- List of SIP response codes
- List of telecommunications encryption terms
- List of web service protocols
- Lorcon
- M0n0wall
- MAC flooding
- Mail Transfer Protocol
- Man-in-the-middle attack
- Man-on-the-side attack
- Managed security service
- Managed VoIP Service
- Mariposa botnet
- Marsden square
- Media Gateway Control Protocol
- Media Gateway Control Protocol architecture
- Media Resource Control Protocol
- Mega-D botnet
- Message Oriented Text Interchange Systems
- Message send protocol
- Message Session Relay Protocol
- Messaging security
- Metasploit Project
- Metulji botnet
- Microsoft Media Server
- Microsoft SmartScreen
- Middlebox
- Military satellite
- MIME
- MIMIC Simulator
- MiNET
- Miredo
- MMS Architecture
- Mobile Application Part
- Mobile virtual private network
- Monoculture (computer science)
- Mosh (software)
- MQ Telemetry Transport
- Multicast DNS
- MySecureCyberspace
- NAT traversal
- National Cyber Range
- National Information Standards Organization Circulation Interchange Protocol
- National Strategy for Trusted Identities in Cyberspace
- National Transportation Communications for Intelligent Transportation System Protocol
- Natural Area Code
- Net-SNMP
- NETCONF
- Netsniff-ng
- NetStumbler
- Network Access Control
- Network Admission Control
- Network Based Application Recognition
- Network encryption cracking
- Network File System
- Network intelligence
- Network Interface Layer Security
- Network intrusion detection system
- Network News Transfer Protocol
- Network security
- Network security policy
- Network Security Toolkit
- Network Time Protocol
- Network Voice Protocol
- Network-based Call Signaling
- Nfront security
- NIST RBAC model
- Nitol botnet
- Nomenclature of Territorial Units for Statistics
- NT LAN Manager
- Null session
- OCML
- OFTP
- OKATO
- ONS coding system
- Open Control Architecture
- Open Phone Abstraction Library
- Open proxy
- Open Settlement Protocol
- OpenConnect
- OpenVPN
- Operation Cyber Condition Zebra
- Operation: Bot Roast
- OSSEC
- Outbound content compliance
- OWASP
- Packet analyzer
- Packet capture appliance
- Packet Storm
- PacketFence
- Pass the hash
- Password length parameter
- Penetration test
- People Finder Interchange Format
- Persistent Shared Object Model
- Personal firewall
- Phoning home
- Phreaking
- Populated place
- Port forwarding
- Port knocking
- Port triggering
- Portal:Telecommunication
- POSITIF (project)
- Precision Time Protocol
- Prelude Hybrid IDS
- Protected computer
- Proxy list
- Pseudoserver
- QDGC
- QOTD
- Qwest
- RADIUS
- RadSec
- Real Data Transport
- Real Time Streaming Protocol
- Real-time adaptive security
- Real-time Transport Protocol
- Realtek Remote Control Protocol
- Reconnaissance satellite
- Registration, Admission and Status
- Remote Desktop Protocol
- Remote procedure call
- Reverse geocoding
- RF shielding of buildings
- RF shielding paint
- RFB protocol
- Robust random early detection
- Rogue access point
- Rogue DHCP
- Rtelnet
- RTP audio video profile
- RTP Control Protocol
- Rustock botnet
- RVU protocol
- Safe@Office
- Sality
- Same-origin policy
- Science DMZ Network Architecture
- Screened-subnet firewall
- Screening router
- SDEP
- Secure Password Authentication
- Secure Service Network
- Secure Shell
- Security Attribute Modulation Protocol
- Security controls
- Security Protocols Open Repository
- Security service (telecommunication)
- Security Task Manager
- Semantic URL attack
- Server Message Block
- Server Routing Protocol
- Service discovery
- Service layer
- Service scan
- Session hijacking
- Session Initiation Protocol
- Sguil
- Shared Dictionary Compression Over HTTP
- Shared resource
- Shell shoveling
- Signaling Compression
- SIMPLE
- SIMPLE (military communications protocol)
- Simple Gateway Control Protocol
- Simple Mail Transfer Protocol
- Simple Network Management Protocol
- Simple Sensor Interface protocol
- Simple Symmetric Transport Protocol
- Simple Update Protocol
- SIP Trunking
- Skinny Call Control Protocol
- Skype protocol
- Slenfbot
- Smart card management system
- SOAP
- SoftEther VPN
- Software Upgrade Protocol
- SPDY
- SPICE (protocol)
- Split tunneling
- Spoofing attack
- Spyware
- Srizbi botnet
- SSL-Explorer
- SSL-Explorer: Community Edition
- Standard Geographical Classification code (Canada)
- Standard Interchange Format
- Stateful firewall
- Stealth wallpaper
- Stepping stone (computer security)
- Storm botnet
- Streaming Text Oriented Messaging Protocol
- StrongSwan
- STUN
- Sybil attack
- SYN cookies
- T.37
- T.38
- Tabular Data Stream
- TACACS
- TACLANE
- Tarpit (networking)
- TCP Cookie Transactions
- TCP Gender Changer
- TCP hole punching
- TCP reset attack
- Tcpcrypt
- TDL-4
- Telecommunications Act of 1996
- Telnet
- Threat (computer)
- Threenix
- Ticket (IT security)
- Time Protocol
- TimeML
- Timestamping (computing)
- Transaction verification
- Transport Layer Security
- Transverse Mercator projection
- Transverse Mercator: Bowring series
- Transverse Mercator: Redfearn series
- Traversal Using Relays around NAT
- Trusted Network Connect
- Trusted path
- UBIGEO
- UDP hole punching
- UN M.49
- UN/LOCODE
- Unified threat management
- Unique Feature Identifier
- UNIStim
- United States Board on Geographic Names
- User:Awesomekatrina/3
- User:Dbabbitt/Sandbox/Draft Distributed Autonomous Organization Article
- User:Timtempleton/sandbox
- UT-VPN
- Variant object
- Verisys
- Video Acceleration API
- Virtual private network
- Virtual private server
- Virut
- VLAN hopping
- VPN-1 VSX NGX
- VPNBook
- Vulnerability management
- VyOS
- W3af
- Waledac botnet
- Warchalking
- Wardriving
- Warflying
- WarVOX
- Warzapping
- Web application security
- Web application security scanner
- Web threat
- WebNFS
- WebScarab
- WebSocket
- Wi-Fi Protected Access
- Wire protocol
- Wireless Communications Transfer Protocol
- World Meteorological Organization squares
- X Image Extension
- X video extension
- X Window System
- X Window System protocols and architecture
- X-Video Bitstream Acceleration
- X-Video Motion Compensation
- X.400
- X.500
- XML
- XML Configuration Access Protocol
- XMPP
- Z39.50