حاسوب وشبكات وأمان

هنا تجدون قائمة مقالات من أقسام  علوم الحاسوب وأنظمة الحماية مرتبةً وفق أهميتها يمكنكم ترجمتها من الويكيبيديا الإنجليزية إلى العربية. إن كنت جديداً في العمل الويكيبيدي يمكنك مشاهدة القسم التعليمي لترى كيفية إنشاء المقالات بشرح مُبَسط.

علوم الحاسوبالحمايةالشبكات
Kolmogorov complexityBadtransBook:Computer Networking
Abstract data typeFull disclosure (computer security)AppleTalk
AI-completeGoodtimes virusAmerican Registry for Internet Numbers
Blowfish (cipher)Hacker ethicWireless broadband
BQPMacro virusClient–server model
Block cipherNetwarDigital Enhanced Cordless Telecommunications
Boolean satisfiability problemRyan LackeyFidoNet
Key sizeRFPolicyGأ‰ANT
Chomsky hierarchySHA-1IEEE 802.15
Common LispSocial engineeringIEEE 802
Colossus computerSegmentation faultInformation Sciences Institute
CurryingSANS InstituteInternetworking
Context-free grammarWau HollandInternetwork Packet Exchange
Church–Turing thesisBruce SchneierKermit (protocol)
Context-free languagePhrackMyrinet
CycBlum Blum ShubMulticast
Context switchAutomated information systems securityMaximum transmission unit
Decision problemCommunications securityNSAP address
Differential cryptanalysisSecurity managementProtocol stack
DenormalizationTrusted computing baseReal-time Transport Protocol
Double-ended queueOpen mail relaySHA-1
Expander graphHybris (computer worm)Semi-Automatic Ground Environment
Earley parser2600: The Hacker QuarterlySession Description Protocol
FoobarCommon CriteriaSession Announcement Protocol
Gregory ChaitinThe Open Group100BaseVG
HeapsortTrusted Computing10BASE2
H.263Packet analyzer10BASE5
Integer (computer science)Tokenization (data security)Ethernet over twisted pair
IdempotenceRoss J. Anderson56 kbit/s line
IEEE 754-1985SircamPlesiochronous digital hierarchy
Kent BeckRole-based access controlBroadband Integrated Services Digital Network
Hash-based message authentication codeChallenge-Handshake Authentication ProtocolSynchronous optical networking
Literate programmingYarrow algorithmName server
Linker (computing)UINAcoustic coupler
Multiple inheritanceAcceptable use policyAutomatic repeat request
MicrokernelAndy Mأ¼ller-MaguhnBandwidth compression
Mutual recursionL0phtDatagram
Non-deterministic Turing machineKarl Koch (hacker)D4 framing standard
Object codeLen SassamanDirect-sequence spread spectrum
Oracle machineChief information officerDistributed-queue dual-bus
Presburger arithmeticSQL SlammerHeuristic routing
Priority queueBrain (computer virus)Isochronous timing
Pie menuWarhol wormLink level
Quantum informationWhitelistMulticast address
Real-time computingElectronic Privacy Information CenterNational Information Infrastructure
RC4IBM Internet Security SystemsNegative-acknowledge character
Radiosity (computer graphics)Confused deputy problemNetwork architecture
Radix sortCTCPECNetwork management
Relational modelStateful firewallNon-return-to-zero
Red–black treeWar dialingPrimary Rate Interface
SHA-1Google HacksProtective distribution system
Star height problemCryptomeProtocol data unit
Sharp-P-completePolymorphic codeProvisioning
Scheme (programming language)Alphanumeric shellcodePulse-address multiple access
Splay treeTsutomu ShimomuraQueuing delay
String searching algorithmHeap overflowRing latency
Static program analysisRobert Morris (cryptographer)Round-trip delay time
SIGGRAPHSYN floodSingle-mode optical fiber
Side effect (computer science)NSAKEYT-carrier
Tree rotationUnix securityEndianness
TrieSOCKSIP over Avian Carriers
CypherpunkGray AreasUpload
SqueakFork bombBitstream
Best, worst and average caseOff-by-one errorNetwork File System
Blum Blum ShubRoot certificateEnhanced Interior Gateway Routing Protocol
Optimizing compilerVector (malware)Trivial File Transfer Protocol
Communications securityDavid A. WagnerAsia-Pacific Network Information Centre
Data elementBlaster (computer worm)LocalTalk
Hamming distanceDatenschleuderPacket analyzer
Minimum spanning treeDevnullWireless community network
Tree structureWinNukeApple Attachment Unit Interface
Abstract factory patternOut-of-bandDICOM
Shortest path problemIEEE 802.1XGigabit Ethernet
Control flow graphBrowser exploitIEEE 802.8
Infinite loopTiger teamAbstract Syntax Notation One
Linear congruential generatorList of TCP and UDP port numbersDECnet
Mersenne TwisterClaria CorporationUIN
Reed–Solomon error correctionLinux malwareISCSI
Entropy encodingStaogARCNET
MaclispRebecca MercuriNational Science Foundation Network
Code talkerHackers: Heroes of the Computer RevolutionCategory 3 cable
Communication complexityPeter G. NeumannALOHAnet
IBM InformixGreat Hacker WarFOSSIL
W. T. TutteChallenge–response authenticationWormhole switching
Ford–Fulkerson algorithmWi-Fi Protected AccessHIPPI
Prim's algorithmEdward FeltenEtherType
Greibach normal formMydoomRsync
CYK algorithmKey derivation functionCacti (software)
DisassemblerMimailScalable Coherent Interface
Unification (computer science)Memory corruptionInterNIC
S-expressionCoolWebSearchMAE-West
Anonymous remailerChinese wallDistance-vector routing protocol
Denotational semanticsElk ClonerLink-state routing protocol
Multiplication algorithmDark AvengerHomePNA
Grover's algorithmSCA (computer virus)Hayes command set
Trusted ComputingCSIv2Application layer
Exception handlingDan GeerRoot name server
Digital Signature AlgorithmBagle (computer worm)NMEA 0183
Merkle–Hellman knapsack cryptosystemMirOS BSDSimple Service Discovery Protocol
Augmented Backus–Naur formDoomjuiceInternet Engineering Steering Group
Abstract interpretationLogin spoofingCBBS
Ross J. AndersonSecure attention keySerial communication
Closure (computer programming)L0phtCrackIEEE 802.1
Partial evaluationBounds checkingStarLAN
Event-driven programming40-bit encryptionUngermann-Bass
Singleton patternNESSIETechnological convergence
Role-based access controlKerio TechnologiesStateful firewall
Computer chessPasswdVampire tap
Vigenأ¨re cipherCryptosystemJXTA
Binary heapCertified Information Systems Security Professional10BASE-F
Compiler-compilerSelf-destruct10BROAD36
Shannon–Hartley theoremWietse VenemaMultilayer switch
Extended Backus–Naur formCamellia (cipher)SYN flood
Universal Turing machineUncontrolled format stringBootstrap Protocol
Canonical LR parserAuthentication protocolTraffic shaping
Yarrow algorithmCapability-based securityIEEE 802.11e-2005
Xerox AltoRichard FornoSOCKS
ShellsortLoyd BlankenshipCambridge Ring (computer network)
Max-flow min-cut theoremNew.netQuadrics
Hugh DarwenPort scannerIEEE 802.6
The Third ManifestoHardening (computing)Open Grid Services Architecture
Malleability (cryptography)Trend MicroConnexion by Boeing
Information visualizationIntegrated Windows AuthenticationIPv4 subnetting reference
A New Kind of ScienceHack-TicEmail address
Associative arrayBuffer overflow protectionDOCSIS
Gerald Jay SussmanKey server (cryptographic)X.509
Breadth-first searchChristmas tree packetDownstream (networking)
Bucket sortSelf-signed certificateIP address blocking
Advanced Encryption Standard processVern PaxsonTACACS
Counting sortCipherTrustPipex
Standard MLEICARExplicit Congestion Notification
Chosen-ciphertext attackPaXPacket Switch Stream
Generic programmingBiba ModelAutonomous system (Internet)
Initialization vectorJuniper NetworksZero-configuration networking
Exclusive orSecurity-focused operating systemIP fragmentation
Constant foldingWS-SecurityAttachment Unit Interface
Memory hierarchyBonziBuddyPBX
Algorithmic efficiencyThe Cuckoo's EggDirectory service
Delegation patternAd-AwareDemon Internet
Hamiltonian path problemService set (802.11 network)Out-of-band
X86 memory segmentationOperation SundevilAnisochronous
Fixed-point combinatorMunged passwordIEEE 802.1X
Reentrancy (computing)Chaos Communication CongressList of TCP and UDP port numbers
Kleene's recursion theoremNetcraftServer Message Block
Cut, copy, and pasteHackers on Planet EarthGigabit interface converter
Autokey cipher/dev/randomNetwork Control Protocol
Community networkIEEE 802.11i-2004X.400
CiteSeerXAdversary (cryptography)Point-to-point (telecommunications)
Tree decompositionPaul KocherBanyan VINES
Cocktail shaker sortKill switchAnycast
Polynomial-time reductionSystraceExternal Data Representation
Block cipher mode of operationTCP WrapperHidden node problem
Interactive proof systemExec ShieldList of device bit rates
Illegal primeElias LevyXENPAK
Isabelle (proof assistant)Return-to-libc attackIEEE 802.20
Factory method patternMetamorphic codeLAN eXtensions for Instrumentation
Command patternInfraGardWi-Fi Protected Access
Aozora BunkoWendy M. GrossmanPreboot Execution Environment
TeradataAddress space layout randomizationDot-decimal notation
Open Database ConnectivityMandatory access controlInter-Asterisk eXchange
Outline of computer scienceFIPS 140-2IEEE 802.7
IteratorLightweight Extensible Authentication ProtocolAnonymous P2P
Call Level InterfaceMontgomery modular multiplicationDeep packet inspection
Relational algebraMail and wire fraudIEEE 802.15.4
Relational calculusCenter for Democracy and TechnologyEmail spam
Discrete logarithmScarewareCSIv2
Cryptographically secure pseudorandom number generatorIdentity managementBroadcast address
Hoare logicPort knockingNetlib
Aho–Corasick algorithmAgobotCSNET
Don NormanApplication firewallPath length
State diagramBalabitSlot time
ECMAScriptIptablesAddress space
Birthday attackGene SpaffordProfibus
Generic functionAbraxas (computer virus)Network access point
Name bindingCategory:Hacker conventionsCARNet
Timeline of quantum computingAcid (computer virus)Local collision
Rate–distortion theoryAcme (computer virus)Authentication protocol
PowerPC 7xxCydoorCut-through switching
Borإ¯vka's algorithmSpy SweeperMbone
Set (abstract data type)Actifed (computer virus)Apple Filing Protocol
Raphael FinkelCisco PIXTemplate:OSI model
Second normal formFTP bounce attack8b/10b encoding
Third normal formComputer security policyLocalhost
Fourth normal formAda (computer virus)Mnet (peer-to-peer network)
Handwriting recognitionMultilevel securityPort scanner
Directed acyclic graphNational Information Assurance GlossaryMLAN
Functional dependencyPower virusDavid J. Farber
Trapdoor functionAI (computer virus)Telebit
Combinatorial searchAIDS (computer virus)Trunking
List (abstract data type)Privilege separationFat tree
Mizar systemPhreakNICMaximum segment size
DBaseObject-code Buffer Overrun EvaluatorHostname
Structural inductionRed/black conceptGeneric Routing Encapsulation
Constraint satisfaction problemMarkus Kuhn (computer scientist)Hybrid fibre-coaxial
Jonathan ZittrainCategory:Spyware removalHEAnet
SubtypingWhiz Kids (TV series)CNAME record
Michael A. JacksonInformation technology managementMultihoming
Concurrency controlSteve Gibson (computer programmer)Broadcast traffic
Self-modifying codeCertificate signing requestFCAPS
Multiversion concurrency controlAustralian High Tech Crime CentreInternational Academy of Digital Arts and Sciences
McCarthy 91 functionBS 7799Mobile code
Floyd–Warshall algorithmGlobal Information Assurance CertificationDigital Divide Network
Communications Security EstablishmentHost-based intrusion detection systemJuniper Networks
Windows-1252Linux-VServerSmall form-factor pluggable transceiver
Affective computingAnomaly-based intrusion detection system6to4
Database transactionToneLoc9P (protocol)
Dynamic programming languageStratus VOSGuard tone
Amortized analysisSecurity tokenDeficit round robin
Markov chain Monte CarloList of warez groupsCategory:Ethernet standards
Edmonds–Karp algorithmSneakers (1992 film)Service set (802.11 network)
Extract, transform, loadBluesnarfingOrganizationally unique identifier
NSAKEYSSL accelerationMCCP
S-boxMatt BlazeAbilene Network
CAST-128National Cyber Security DivisionFAST TCP
Modula-3Remote Access Quarantine ClientForwarding equivalence class
CoroutineCA Anti-SpywarePower over Ethernet
Two-phase lockingSpySubtractIEEE 802.11i-2004
Higher-order functionGordon LyonNetwork service
Durability (database systems)Digest access authenticationLabel Distribution Protocol
Connected component (graph theory)HacktivismoWi-Fi Alliance
Communicating sequential processesJohan HelsingiusInternode (ISP)
TreapDancing pigsTCP Wrapper
Language technologyIxquickOpen Platform Communications
JD EdwardsMichaإ‚ ZalewskiTCP offload engine
Knuth–Morris–Pratt algorithmAnti-phishing softwareEnterasys Networks
Automated MathematicianStealwareVirtual Telecommunications Access Method
Fibonacci heapShmooConDistributed data store
Curry–Howard correspondenceDatagram Transport Layer SecurityE.123
Foreign keyDNS spoofingBanyan Systems
Polymorphism (computer science)Class (warez)Direct Internet Message Encapsulation
Bitwise operationFederal Information Security Management Act of 2002Lightweight Extensible Authentication Protocol
Game treeMafiaBoyCategory:Ethernet
Formal verificationNicolas JacobsenRepresentational state transfer
Operational semanticsAOHellDigital Signal 1
Consistency modelGreynetManagement information base
Pattern matchingFIPS 140Measuring network throughput
Algebraic data typePolyinstantiationClass-based queueing
Dining philosophers problemGrandmaster Ratte'Hayes Microcomputer Products
State (computer science)PharmingPort knocking
Carnegie Mellon School of Computer ScienceSir DysticSURAnet
XOR linked listDemon Roach UndergroundMid Atlantic Crossroads
Block size (cryptography)Extensible Authentication ProtocolSTUN
3-WayChristien RiouxDistributed Computing Environment
ISAAC (cipher)HoHoConLiberty Alliance
Web of trustStarForceIEEE 802.16
Stochastic context-free grammarComputer emergency response teamApplication firewall
Year 2038 problemBluesnipingXAUI
Data martDorothy E. DenningCrossover cable
VC dimensionStrong authenticationCCMP
CODASYLFortuna (PRNG)Service data unit
Local search (optimization)MAC floodingCisco PIX
French Institute for Research in Computer Science and AutomationSHA-2Foundry Networks
Speculative executionBolgimoFTP bounce attack
Automatic label placementDirect RevenueAdministrative share
Charles H. MoorePrivilege (computing)Node (networking)
Model checkingAuthentication and Key Agreement (protocol)RTP Control Protocol
Isolation (database systems)Peiter ZatkoTelecommunications Management Network
Glossary of graph theory termsChris Wysopal.arpa
Graph drawingCarolyn MeinelResilient Packet Ring
Edge detectionSULFNBK.EXEOverlay network
Peterson's algorithmCult of the Dead CowKey-based routing
Skip listArbitrary code executionAd hoc On-Demand Distance Vector Routing
Candidate keyRubberhose (file system)Datagram Congestion Control Protocol
Object fileHacktivismo Enhanced-Source Software License AgreementGovernment Open Systems Interconnection Profile
Business performance managementGutmann methodIEEE 802.10
Arlington HallTCP/IP stack fingerprintingLeaky bucket
Database schemaList of Unix daemonsPort triggering
Object type (object-oriented programming)Robert SchifreenNational LambdaRail
Jakob Nielsen (usability consultant)Comodo GroupCategory:Channel access methods
Magic number (programming)StankDawgZoneCD
Graph minorXandu.2385Internet Storage Name Service
DBLPComet CursorComputer network naming scheme
CAcert.orgStakkatoVoice over WLAN
Correctness (computer science)Mathew BevanMMDF
Hill climbingBliss (virus)Internet Stream Protocol
System programmingAuthentication serverInformation technology management
Static single assignment formCWShredderRONJA
Atomicity (database systems)Wireless Transport Layer SecurityLine Mode Browser
Self-balancing binary search treeAutoRunToken bucket
ID-based encryptionDan FarmerAgent Extensibility Protocol
Ad hoc polymorphismWindows Live OneCareRandom early detection
Adjacency listOperation D-EliteZMODEM
MetaprogrammingMarkus HessXMODEM
Dominator (graph theory)UXuYMODEM
Schedule (computer science)BBS: The DocumentaryCertificate signing request
Platform-independent modelShadowCrewTemporally ordered routing algorithm
Model-driven architectureDatabase auditDefault gateway
Maximum flow problemInformation technology controlsNewbridge Networks
Jأ¼rgen SchmidhuberCertified Information Security ManagerHomePlug
Levenshtein distanceDrive-by downloadFree Haven Project
Edit distanceGary McKinnonExponential backoff
Clipper chipCode Access SecurityCategory:Wireless network organizations
RewritingPoly1305Long Reach Ethernet
Branch predictorClark–Wilson modelByte stream
Calculus of communicating systemsAnti-wormList of IP protocol numbers
Combinatorial optimizationChkrootkitRS-485
Citation indexDShieldInterpacket gap
Meet-in-the-middle attackFortinetSegmentation and Reassembly
Blind signatureCounterSpy (software)Netgear
Needham–Schroeder protocolOWASPAnomaly-based intrusion detection system
Otway–Rees protocolOligomorphic codeNetFlow
Tracing garbage collectionDiameter protocolEconet
Commitment schemePatch TuesdaySwitched Multi-megabit Data Service
Beale ciphersByte BanditList of network protocols (OSI model)
Subgraph isomorphism problemVirus BulletinSSL acceleration
Elliptic Curve Digital Signature AlgorithmRainbow SeriesRoute reflector
Schnorr signatureAIDS (Trojan horse)Media Gateway Controller
Zero-knowledge proofAirSnortWireless WAN
Affine cipherData Execution PreventionAllowed cell rate
Rabin cryptosystemAuthenticated encryptionReverse DNS lookup
Anonymous P2PRkhunterActive monitor
List of important publications in computer scienceSolar DesignerMedia-independent interface
Duff's deviceAnti-pharmingSecure Remote Password protocol
Secret sharingABC (computer virus)Administrative distance
James Clark (programmer)Graphical identification and authenticationICMP Router Discovery Protocol
Dead code eliminationDirectory traversal attackDeflection routing
Abstraction inversionParadox (warez)ANSI T1.413 Issue 2
Hidden surface determinationCOPS (software)Voice over the Net
Skipjack (cipher)Central Point Anti-VirusIEEE 802.1Q
Deutsch–Jozsa algorithmWinDbgIEEE 802.22
Canny edge detectorHacking: The Art of ExploitationInterplanetary Internet
Hierarchical clusteringHonker UnionMedium Attachment Unit
Paillier cryptosystemButchered from InsideList of file transfer protocols
NTRUEncryptBlack Hat BriefingsFrame check sequence
Register allocationRainbow tableWireless Leiden
Astrophysics Data SystemHoneyMonkeyNetBIOS over TCP/IP
Check digitGraybirdRapidIO
40-bit encryptionISACANetwork processor
GOST (block cipher)Erik Bloodaxe (hacker)473L system
Codd's 12 rulesBrian LaMacchiaStealware
Blinding (cryptography)Loren KohnfelderMaximum length sequence
Union typeAnti-Phishing Working GroupData URI scheme
Randomized algorithmNBNameDatagram Transport Layer Security
V (operating system)TuxissaLoad-balanced switch
NESSIESeccompAdam Shand (manager)
2-satisfiabilityCraig NeidorfHomeRF
Starvation (computer science)Chief data officerProfessional video over IP
Probabilistically checkable proofQuarantine (computing)AES47
ContinuationMixed threat attackExposed node problem
Andrew ProjectFarid EssebarDigital Audio Access Protocol
PowerPC G4Titan RainDelivery traffic indication message
History of cryptographyApplication securityNetwork planning and design
Independent set (graph theory)Firestarter (firewall)Extensible Authentication Protocol
Camellia (cipher)NetOpsTraffic policing (communications)
Las Vegas algorithmShawn CarpenterKeith Uncapher
Confusion and diffusionAstalavista.box.skStructured cabling
BtrieveOphcrackGeneric cell rate algorithm
A5/2Norton Personal FirewallBBN Butterfly
Soft heapWhat the HackPolicy-based routing
Type conversionSarah GordonList of BBS software
Graph (abstract data type)WinlogonMAC flooding
Master theoremRogue access pointNetwork computing
Sorting networkSalsa20SHA-2
Vertex coverHMAC-based One-time Password AlgorithmNLS (computer system)
Glasgow Haskell CompilerTrusted Computing GroupSuperSet Software
Approximation algorithmJtestCampus network
DelimiterWindows FirewallInternetwork protocol
Message authentication codeJohannes UllrichOptical Internetworking Forum
Forward chainingList of computer criminalsChuck Forsberg
Backward chainingRainbowCrackSynOptics
Flat file databaseSmeg Virus Construction KitList of acquisitions by Cisco Systems
Abstraction layerBrowser hijackingAAL1gator
Binary decision diagramDigital DawgPoundGo-Back-N ARQ
Monad (functional programming)Internet Authentication ServiceSelective Repeat ARQ
CoqBarracuda NetworksNagle's algorithm
Function typeAlcon (computer virus)TippingPoint
David J. FarberCryptographic key typesCYCLADES
Artificial general intelligenceSecure environmentList of layout engines
Signed number representationsCrash reporterBroadband remote access server
Ant colony optimization algorithmsParry AftabSystem Packet Interface
FEALSoftware tokenSubnetwork Access Protocol
NetLogoBen LaurieLattisNet
Tree traversalSadmind4B5B
GMR (cryptography)Ingress filteringVSAN
Fair-share schedulingBrewer and Nash modelBully algorithm
Parameterized complexityGraham-Denning modelGoogle Web Accelerator
David GelernterSecurity modesSecure Neighbor Discovery
C99Computer security modelMAE-East
Apriori algorithmSite Security HandbookIL (network protocol)
KASUMIElectronic lockMeet-me room
CAST-256Keychain (software)Category:Firewall software
BombeNull routeService control point
Key server (cryptographic)Mutual authenticationChannel code
PKCSOptix ProCleave (fiber)
Biuro Szyfrأ³wDoSnetPhoneNet
Compare-and-swapSoftware assuranceJim Allchin
2–3 treeBit nibblerCategory:MPLS networking
Ambiguous grammarGNOME KeyringSwitched fabric
Jack DongarraRootkitRevealerStructure of Management Information
Normal number (computing)Camping (computing)Deutsches Forschungsnetz
Autonomic computingWinFixerAuthentication server
NSPACEHare (computer virus)Microconnect distributed antenna
List of functional programming topicsCryptographic Service ProviderWireless Transport Layer Security
Peter LandinToorConLink aggregation
Cellular Message Encryption AlgorithmSony BMG copy protection rootkit scandalCable tester
Arthur–Merlin protocolWebsite defacementLabel-switched path
List of complexity classesCategory:Password managersATA over Ethernet
Join (SQL)Nahshon Even-ChaimSpaceWire
Advice (complexity)Internet Gateway Device ProtocolDatabase audit
Polynomial-time approximation schemeDefacement (vandalism)Cisco Catalyst
Cluster analysisMicrosoft CryptoAPIPoly1305
Cycle detectionEAuthenticationGoogle Data Centers
Graph-structured stackForcepointInternet Content Adaptation Protocol
Alice and BobAntiVirus GoldCategory:IEEE 802
Nonlinear programmingSystem Management ModeCategory:Ethernet cables
Rabin–Karp algorithmZango (company)Real Data Transport
Boyer–Moore string search algorithmCyber security standardsDiffusing update algorithm
ALGOL 60Template:Malware-stubInsteon
ALGOL 68StacheldrahtNeighbor Discovery Protocol
Salt (cryptography)Category:Malware stubsDiscard Protocol
Short-circuit evaluationCyber-security regulationDaytime Protocol
Classical cipherGokarTime Protocol
Church–Turing–Deutsch principleGIANT AntiSpywareVirtual routing and forwarding
Result setProtection ringSilly window syndrome
List of terms relating to algorithms and data structuresMultipartite virusCarrier sense multiple access with collision avoidance and resolution using priorities
Guarded Command LanguageGhostball (computer virus)TCP Vegas
Snark (graph theory)NimdaGreenfield project
McEliece cryptosystemBlended threatMetro Ethernet
Cardan grilleHardware security moduleIndustrial Ethernet
Continuation-passing styleInternational Safe Harbor Privacy PrinciplesPrecision Time Protocol
Conditional loopAntichrist (virus hoax)Dave Forney
Turing degreeAGI-PlanVLAN Management Policy Server
System FCategory:DOS file virusesBearer-Independent Call Control
Avalanche effectCategory:Virus hoaxesCAVNET
Strassen algorithmCategory:Exploit-based wormsOpen Root Server Network
Executive information systemAntiCMOSEtherChannel
Two-phase commit protocolARCV-n10 Gigabit Ethernet Alliance
Adversary (cryptography)ITSECIEEE 1675-2008
Merkle's PuzzlesNVIRGG45
Suffix treeSevenDust (computer virus)RG-58
Cell (microprocessor)ISO/IEC 27001:2005Alacritech
Authorization certificateMicrosoft Baseline Security AnalyzerFast Infoset
Empty stringCheck Point VPN-1TCP Westwood
Code (cryptography)Dynamic linkerAutonegotiation
EFF DES crackerAnton ChuvakinChannel bonding
Computation tree logicHuntBarTeraGrid
Addition-chain exponentiationSpy WiperAnswer tone
CORDICIlfak GuilfanovAdvanced Telecommunications Computing Architecture
R-treeMumu (computer worm)Multicast DNS
Deep Thought (chess computer)OpenBSD security featuresAnti-pharming
Action at a distance (computer programming)Alabama (computer virus)Interface Message Processor
Set cover problemExecutable space protectionKalpana (company)
Cryptanalysis of the EnigmaCategory:Denial-of-service attacksPing flood
Star schemaVoyager (computer worm)UDP hole punching
L-attributed grammarChristopher BoydBest-effort delivery
Array programmingTom Cross (computer security)National research and education network
Parsing expression grammarBrian KrebsAS2
Concatenative programming languageIntruder detectionGetaddrinfo
Topological sortingOneHalfMedium-dependent interface
Montgomery modular multiplicationBomber (computer virus)Optical fiber connector
Statement (computer science)Session fixationIntelligent computer network
Expression-oriented programming languageType enforcementContext-aware network
P-GridLife is beautiful virus hoax4B3T
Paul H. CressMAC spoofingDeclarative Referential Integrity
Constraint satisfactionMulti categories securityPenultimate hop popping
Parallel random-access machineZmistFast retransmit
Semantic securityEGABTRRemote collision
Temporal Key Integrity ProtocolCertified Ethical HackerSouth African Internet Exchange
Collision attackAir gap (networking)NBName
Peter J. DenningSummerconAnything In Anything
Agent-based modelElectron (computer hacker)BBN Report 1822
Artificial chemistrySSLeayEveryDNS
Needleman–Wunsch algorithmPGPDiskIEEE 802.18
List of academic databases and search enginesWilliam GenoveseEthernet flow control
Solovay–Strassen primality testBlackwormIP multicast
Branch (computer science)Firewall pinholePacket-switched network
Cuthill–McKee algorithmSecurity testingFreeDCE
Code page 437IronPortSecure Real-time Transport Protocol
Role-oriented programmingCommon Vulnerabilities and ExposuresHubert Zimmermann
Inline assemblerMcAfee SiteAdvisorReliability (computer networking)
Bill InmonNT LAN ManagerWire protocol
Database designMichael Howard (Microsoft)F5 Networks
NSA encryption systemsLeap (computer worm)TCP tuning
AN/CYZ-10Legion of Doom (hacking)Source-specific multicast
Probabilistic encryption0x80Interactive Connectivity Establishment
Fusion treeHackers at LargeList of assigned /8 IPv4 address blocks
Call-with-current-continuationVsftpdArchitecture for Control Networks
BATONNational Information Assurance Certification and Accreditation ProcessNetwork browser
Database theoryImproper input validationPARC Universal Packet
Kuroda normal formEFF-AustinSorcerer's Apprentice Syndrome
The Humane InterfaceAdam BotbylPacket Assembler/Disassembler
Tail callAttack treeZ-Wave
Atomic commitFlip buttonRogue access point
Accounting methodBeast (Trojan horse)Salsa20
WATFIVIntegoBruce Jay Nelson
Laguerre's methodChief security officerBroadcasting (networking)
Consistency (database systems)ShadowserverRegistered state change notification
Trabb Pardo–Knuth algorithmCoverityDelay-tolerant networking
L (complexity)Jennifer SeberryLocal Procedure Call
First-class functionChief information security officerRG-59
Powerset constructionNetwork telescopeComputer network diagram
O(1) schedulerForm (computer virus)IEEE Standards Association
Terry SejnowskiCategory:Computer security proceduresRobust Header Compression
Complete (complexity)Database forensicsFred Baker (IETF chair)
Lovelace MedalITIL security managementIEEE 802.11p
Strong RSA assumptionZooko's triangleVocalTec
Turing reductionShatter attackQLogic
ICE (cipher)Lattice-based access controlIEEE 802.11u
Van Emde Boas treeThe 414sIEEE 802.11n-2009
One-time passwordClipGenieInternet transit
Schnorr groupAccess Control MatrixNetsukuku
PairingCrack (password software)DSL modem
Rope (data structure)Avi RubinTERENA
Decisional Diffie–Hellman assumptionVundo6over4
Relational operatorData Protection APIISATAP
SPIN model checkerFreeOTFENetwork Voice Protocol
Pipeline (software)Concept virusPacket loss
CPLEXGemaltoMulti-mode optical fiber
Web engineeringTake-grant protection modelLayer 2 MPLS VPN
Proof assistantChain of trustIpfirewall
Feature detection (computer vision)Non-interference (security)Barracuda Networks
EsterelBlack hole (networking)Egress filtering
No free lunch theoremMoonlight MazeProportionally fair
No free lunch in search and optimizationAnkit FadiaIP address management
Operator-precedence parserTCP half-openIngress filtering
Suffix arrayAladdin Knowledge SystemsFrame Relay Assembler/Disassembler
Demand pagingCoSign single sign onNull route
Architecture of BtrievePassword managementPatch panel
Memory segmentationWhale (computer virus)PROFINET
Message passingDave KleimanCategory:Industrial Ethernet
B+ treeRop GonggrijpRadio over IP
CorecursionPrivilege bracketingDefence Information Infrastructure
Schأ¶nhage–Strassen algorithmCERT Coordination CenterCategory 4 cable
Binary dataShieldsUpAvionics Full-Duplex Switched Ethernet
Digest access authenticationMarc MaiffretQuickTime Broadcaster
Left recursionArchiveusRASPPPoE
OLE DBCertified Computer ExaminerSwitch virtual interface
Predicate transformer semanticsPing-Pong virusPhysical Medium Dependent
Chromatic polynomialBro (software)DOCSIS Set-top Gateway
Snowflake schemaAEGIS SecureConnectPhysical Coding Sublayer
Search problemYamannerLawrence Roberts (scientist)
Software transactional memoryEconomics of securityGأ‰ANT2
Radix treeCommwarrior-AKnowledge-based processor
Lucid (programming language)Peg DHCPMultiple Registration Protocol
Akelarre (cipher)Software security assuranceLwIP
Index lockingLorconObject-based storage device
Vertex separatorMessenger Plus!Automatically switched optical network
Interval treeCracking of wireless networksMiddlebox
Reversible computingCyber Security Task ForceStreamCast Networks
RSA problemCisco Global ExploiterNetWare Loadable Module
Secure voiceDavid LitchfieldList of SIP software
Acoustic cryptanalysisMalicious Software Removal ToolOpen-access network
Brian RandellPeter GarzaInternet Gateway Device Protocol
ContactPointHackers WantedCategory 1 cable
Computational intelligenceNetwork Access ControlCategory 2 cable
Cramer–Shoup cryptosystemProtocol-based intrusion detection systemSCinet
De Bruijn sequenceApplication protocol-based intrusion detection systemMulticast Open Shortest Path First
Comparison of relational database management systemsAttack surfaceInternet Protocol Control Protocol
Entry pointSpywareQuakeCorporation for Education Network Initiatives in California
Optimal asymmetric encryption paddingEmcodecCaBIG
MQVC-list (computer security)Weighted random early detection
TreemappingLocal shared objectRelayNet
Comparison of object-relational database management systemsIT UndergroundSecure Hypertext Transfer Protocol
Smith–Waterman algorithmVoice phishingKaseya Network Monitor
Row- and column-major orderKerio ControlIEEE 1355
Commit (data management)Zip bombRemote scripting
Fortuna (PRNG)Rafael Nأ؛أ±ez (hacker)Cable Internet access
Actor modelEwido NetworksIEEE 1901
SHA-2CryptGenRandomHome network
Loose couplingVyattaApple Network Server
IEEE P1363Tribe Flood NetworkHybrid automatic repeat request
MultimapTrinooBandwidth-delay product
AA treeDefensive computingCategory:Nortel
Integrated Computer-Aided ManufacturingHoneynet ProjectDynamic Multipoint Virtual Private Network
Delete (SQL)Microsoft ForefrontEthernet Powerlink
Zentralblatt MATHJoanna RutkowskaTCP Westwood plus
Jeffrey UllmanCryptoloopWireless Router Application Platform
List of NP-complete problemsWireless intrusion prevention systemOpenBSD security features
Call stackInformation assuranceEdge device
Aravind JoshiNavidad virusCategory:Denial-of-service attacks
Factory (object-oriented programming)Michael SchroederQualcomm Atheros
Operational data storeNobody (username)Internet Fibre Channel Protocol
Dominating setWANSecure FirewallDECserver
Rubberhose (file system)Google hackingAir gap (networking)
Maximal independent setGlobalHellCANopen
Calling conventionCategory:Free antivirus softwareNetlink
Linear grammarKinsmodFlooding (computer networking)
Charles GoldfarbBlue Pill (software)BIC TCP
Internet studiesFestering HatePrivate IP
Loop optimizationSMS phishingFirewall pinhole
Quadratic probingSysjailQuickTime Streaming Server
Feedback vertex setRobert C. SeacordProvider-independent address space
Feedback arc setDepartment of Defense Information Assurance Certification and Accreditation ProcessJumbo frame
Asynchronous I/OInformation Technology Security AssessmentMobile Computing and Communications Review
Keystroke-level modelWindow SnyderIEEE 802.1ag
IBM Research - AlmadenMixterDynamic synchronous transfer mode
Function composition (computer science)Responsible disclosurePacket crafting
Per Martin-Lأ¶fChild Exploitation Tracking SystemLabel switch router
Clipping (computer graphics)Natas (computer virus)Fair queuing
Proxy re-encryptionExtended Validation CertificateNT LAN Manager
Computational Diffie–Hellman assumptionFilesystem-level encryptionNAT Port Mapping Protocol
In-memory databaseHeuristic analysisEthernet crossover cable
Microsoft Jet Database EngineComparison of firewallsISO/IEC 11801
Dependent typeDan BonehHSTCP
Graph isomorphism problemComputer Security InstitutePacket loss concealment
Database auditRoger R. SchellT/TCP
Null (SQL)BrontokIEEE P802.1p
Pseudorandom binary sequenceSecurity and MaintenanceCategory:Internet self-classification codes
Operator-precedence grammarHost protected areaDevicescape
Bitmap indexChief privacy officerSmith Micro Software
Poly1305System Center Data Protection ManagerLeechModem
ElGamal signature schemeHTTP header injectionVsftpd
P/polyMultiplexed Transport Layer SecurityEthernet extender
Coding by exceptionMd5deepCongestion window
Void typeEmployee monitoring softwareBiModem
POSSE projectChristopher SoghoianLynx (protocol)
IDEA NXTChad DavisTmodem
Pumping lemma for regular languagesOpportunistic TLSReserved IP addresses
CyberinfrastructurePetnameZMax
Cursor (databases)Melih AbdulhayoؤںluIEEE 802.11y-2008
E0 (cipher)Air Force Cyber Command (Provisional)ProCurve
Boomerang attackCategory:Information technology organisationsSuper G (wireless networking)
Quantum programmingExploreZipEnergy Sciences Network
Domain-specific modelingScores (computer virus)Sun SPOT
K-ary treeMacMagExtreme Networks
National DNA databaseMDEFZRTP
Interlock protocolDifferentiated securitySM4 Algorithm
Common Algebraic Specification LanguageDennis Moran (computer criminal)Maximum throughput scheduling
Single event upsetWebsite spoofingEthernet Automatic Protection Switching
Longest common substring problemFile inclusion vulnerabilityMail-sink
Lamport's bakery algorithmCVSSMicrocom Networking Protocol
Ciphertext indistinguishabilityStrationPWE3
Forward secrecyMilestone SystemsAOSS
Futures and promisesKernel Patch ProtectionTCP sequence prediction attack
Jaccard indexIdle scanMichael Silverton
Preemption (computing)4K (computer virus)Host (network)
Arts and Humanities Citation IndexJeremy HammondMetrics (networking)
Lustre (programming language)1260 (computer virus)HyperSCSI
Lock (database)Martأ­n AbadiWireless site survey
OCB modePayment Card Industry Data Security StandardRicochet (Internet service)
CCM modeAntiVerminsConnect:Direct
Authenticated encryptionFile binderSEMCI
Data structure alignmentMovielandJumbogram
Destructor (computer programming)Rafail OstrovskyTime Independent Escape Sequence
Microsoft Data Access ComponentsFSA CorporationCommercial Internet eXchange
SQL-92Jim ChristyMTR (software)
Broadcast encryptionQ-CERTHole punching (networking)
Concrete securityObject-capability modelInterconnect bottleneck
Hidden Field EquationsDamballa (company)Content processor
Profiling (computer programming)AOL Active Virus ShieldFreesite
A Symbolic Analysis of Relay and Switching CircuitsAuthenticated Identity BodyVirtual Leased Line
Arrow (computer science)Security controlsNintendo GameCube Broadband Adapter and Modem Adapter
Merge (version control)Factotum (software)Category:Wireless sensor network
Deterministic encryptionTwinge attackJPIP
Oakley protocolLawrie BrownGeocast
Answer set programmingAttack patternsHTTP compression
Block cellular automatonAmbient authorityConstrained Shortest Path First
Rainbow tableSyhuntEthernet over SDH
Declarative Referential IntegrityBot herderLMHOSTS
Semi-Thue systemWebrootHead-of-line blocking
Goldwasser–Micali cryptosystemNorton 360Category:Network addressing
Channel I/OData loss prevention softwareBlack hole (networking)
Full Domain HashHitmanProList of SIP request methods
ADOdb LiteCascade (computer virus)List of SIP response codes
Automatic parallelizationMuffin (proxy)Windows DNA
Concurrent computingLance HoffmanD-Link G604T network adaptor
Station-to-Station protocolCarlisle AdamsCompound TCP
Data element definitionMisuse detectionNetwork Chemistry
Object-oriented analysis and designMacScanComparison of open-source wireless drivers
Higher-order abstract syntaxDead Peer DetectionInternet Control Message Protocol version 6
RecordsetBurt KaliskiDynamic bandwidth allocation
David CheritonNikita BorisovTransPAC2
Herb GroschKaisa NybergEtherCAT
Efficient Probabilistic Public-Key Encryption Scheme5loSpace Communications Protocol Specifications
Salsa20SSH Communications SecurityExterior gateway protocol
Hessian form of an elliptic curvePaul van OorschotTemplate:Routing scheme
DPLL algorithmAlec YasinsacActive queue management
Leftist treeBradley WillmanNasan
Stream (computing)RiskwareAudio over Ethernet
User errorSpy-phishingRollover cable
Trusted Computing GroupSyndieMobile VoIP
Proof complexityJonathan JamesAEGIS SecureConnect
Exact coverMP3ConceptIngress router
Algorithmic information theoryFinjanEthernet physical layer
St-connectivityHacker groupEthernet in the first mile
CBC-MACWARP (information security)Goodput
Karp–Lipton theoremTom BersonWiMedia Alliance
Vantage-point treeSTRIDE (security)AES51
QuickselectEvent dataSplit multi-link trunking
Signed zeroInstitute for Information Infrastructure ProtectionAdvanced Message Queuing Protocol
John GageL. Jean CampGlobal Environment for Network Innovations
Time series databaseOrganisation-based access controlH-TCP
Behavior-driven developmentChris KlausCommitted information rate
Evaluation strategyAuthbindNew API
List of computer science conferencesMonth of bugs6LoWPAN
Collision resistanceCyber forceFully switched network
Cigarette smokers problemComputer security incident managementEAD socket
Unique games conjectureCDP SpoofingTCP window scale option
PCP theoremESafeNetwork monitoring interface card
Cryptomeria cipherServer-Gated CryptographyDuplex mismatch
Business Process Model and NotationEvil twin (wireless networks)TERA
Anonymous recursionWANK (computer worm)N3 (NHS)
D (data language specification)Father Christmas (computer worm)NHSnet
Blum–Goldwasser cryptosystemReverse connectionBuffalo network-attached storage series
R (complexity)OpenCALSID
Fagin's theoremSkype securityIndividual Address Block
Simple FeaturesFree Speech FlagODVA (company)
Inverted indexLAIM Working GroupNetwork Access Control
Generalized suffix treeTorpigDynablock
Pseudo-polynomial timeSamhain (software)Equal-cost multi-path routing
Cryptographic Service ProviderJeffrey HunkerPath MTU Discovery
Comparison sortSecurity Protocols Open RepositoryBandwidth allocation
Upper ontologyPERMISUWB Forum
Lamport signatureToxbotCategory:Network time-related software
Attack modelIntel Active Management TechnologyMotorola Canopy
Diffie–Hellman problem2007 cyberattacks on EstoniaVyatta
Conjunctive grammarBackdoor.Win32.IRCBotSIP URI scheme
Cobham's thesisConference on Email and Anti-SpamApplication-level gateway
Ralph KimballSpyvampireGlobal network positioning
Combined Cipher MachineSecurity breach notification lawsNational Energy Research Scientific Computing Center
Asymptotically optimal algorithmUser Interface Privilege IsolationZero-information network
Division algorithmSecure Computing CorporationH.323
Elliptic curve Diffie–HellmanISO/IEC 27002Site Multihoming by IPv6 Intermediation
Distributed algorithmZenuxUltra Network Technologies
GLR parserNorton AntiBotSimple Sensor Interface protocol
Smart environmentMPack (software)Common Hybrid Interface Protocol System
Parametric polymorphismCategory:Social engineering (computer security)SYN cookies
Pairing heap3wPlayerNet-SNMP
Armstrong's axiomsUltimate FixerWANSecure Firewall
Anubis (cipher)Virus LockerMax-min fairness
Push–relabel maximum flow algorithmMoBlockKenya Data Networks
Check constraintWS-FederationBroadview Networks
Christos PapadimitriouCollaboration-oriented architectureIEBus
NTRUSignContraVirusVery high-speed Backbone Network Service
GGH signature schemeWeb Services Security Kerberos BindingFastPath
Approximate string matchingDave AitelResidential gateway
Jack EdmondsWeb Single Sign-On Interoperability ProfileRAD Group
Unit typeWeb Single Sign-On Metadata Exchange ProtocolFully connected network
.onionGpg4winToken ring
OpenBSD security featuresINIT 1984List of Bluetooth profiles
Skew heapSeparation of protection and securityOperations, administration and management
3-D SecureProtection mechanismAlfred Spector
Anonym.OSAngela OrebaughSWITCH Information Technology Services
Brian Reid (computer scientist)Vba32 AntiVirusChipcom
Accuracy paradoxTأµnu SamuelCircuit ID
Plaintext-aware encryptionKWalletList of Internet exchange points by size
Introduction to Automata Theory, Languages, and ComputationCAPICOM64b/66b encoding
Call graphPeter Gutmann (computer scientist)Berkeley Automounter
Where (SQL)Zlob trojanRouter alert label
Boyce–Codd normal formDerek AtkinsCleanfeed (content blocking system)
Fifth normal formStack buffer overflowWeighted fair queueing
Programming language theoryMicrocosm LtdIWARP
Tutte polynomialISO/IEC 27005Multiplexed Transport Layer Security
Fragmentation (computing)Harri HurstiSun Modular Datacenter
Comparison of parser generatorsCategory:Information technology projectsInterop
Deterministic pushdown automatonW32.Myzor.FK@yfScopia
Book embeddingSherwood Applied Business Security ArchitectureProvider Backbone Bridge Traffic Engineering
Transactional memoryComputer trespassIEEE 802.1ah-2008
David EppsteinWicked RoseTransparent LAN Service
Cuckoo hashingComputer Underground DigestTerabeam
Universal hashingMary Ann DavidsonProxim Wireless
Data architectureData breachSource routing
Constraint satisfaction dual problemSAINT (software)Distributed transient network
Category:Technology strategyMemory safetyCheeger constant (graph theory)
Crypt (Unix)Windows Security LogAssociation of Internet Researchers
Stable model semanticsHacking toolDesign of Systems on Silicon
Catalog Service for the Web1984 Network Liberty AllianceUniversal Powerline Association
CatamorphismLayered securityPort Aggregation Protocol
EAX modePrivacy-invasive softwareCategory:Mid-importance Computer networking articles
Mario SzegedyGateway Anti-VirusCategory:Physical layer protocols
Verifiable secret sharingAccess tokenGeoNet
Declaration (computer programming)Mandatory Integrity ControlCategory:Information technology organisations
SerializabilityFast fluxHome Gateway Initiative
Commitment orderingVirgil D. GligorNetwork booting
SM4 AlgorithmNational Vulnerability DatabaseMAC filtering
Nominal type systemSecurity Content Automation ProtocolCategory:Link access protocols
Structural type systemW32/Storm.wormBroadcast radiation
Complexity of constraint satisfactionAmbulance (computer virus)Cable dressing
Inside–outside algorithmSony malwareNetwork address
LR-attributed grammarNetIQ Access ManagerPassport Carrier Release
ECLR-attributed grammarKenneth P. Weiss100 Gigabit Ethernet
Spatial databaseDual EC DRBGRogue DHCP
Edge coverKiwiconBandwidth equalization
Bibliographic databaseProtected computerIdle scan
Graph stateBluebuggingLink Layer Topology Discovery
Doubly linked listStefan SavageOmniPeek
CMACConsumer alert systemList of network protocol stacks
PostBQPTLS-PSKGeographic routing
Access Control MatrixCryptoRights FoundationMultiservice Switch
Knuth PrizeAkbotEtherloop
YAWLBlacker (security)IEEE 802.1AE
Executable UMLZardoz (computer security)Reciprocity (network science)
Pre-shared keyMicro Bill SystemsUDP-Lite
Color quantizationGlobalSignAlarm filtering
Data domainCESG Claims Tested MarkDynamic Trunking Protocol
Hأ©ctor Garcأ­a-MolinaVirtual security switchATM25
Hasty Pudding cipherPrzemysإ‚aw FrasunekTCP acceleration
Regular tree grammarMacSweeperTCP-Illinois
MAINWAYMylife (computer worm)Link-local address
Network Security ServicesAlcra (computer worm)Comparison of wireless data standards
SQL:2003Human–computer interaction (security)Outline of the Internet
Tacit programmingSwattingVirtual Interface Architecture
Information algebraInformation Networking InstituteCategory:Fiber-optic connectors
Architectural patternCategory:Risk analysis methodologiesMobile broadband
Jim HighsmithJohnny LongHybrid Scheduling
Application virtualizationCyber Storm ExerciseDell PowerConnect
David McGoveranTransaction verificationLocalTalk-to-Ethernet bridge
Nikos LorentzosCold boot attackCaGrid
Grille (cryptography)IT riskGatorBox
Ring signatureSecure codingISCSI Extensions for RDMA
HaxeCenturion guardGlusterFS
W-shinglingSymantec Endpoint ProtectionTail drop
MINIX 3Four Horsemen of the InfocalypseInfomania
Cooperative multitaskingDevice fingerprintGovernment Secure Intranet
Harmony CompilerCyber Storm IIPME Aggregation Function
Enterprise Data ModelingTrust anchorCategory:Bonding protocols
Mathematical Optimization SocietyWindows Search10PASS-TS
Cris KobrynOnline Armor Personal FirewallInter-server
Hopcroft–Karp algorithmHeap sprayingList of Bluetooth protocols
Rabin signature algorithmEC-CouncilList of WiMAX networks
Map (higher-order function)PKCS 1Digital media player
Disaster informaticsNe0hMEF Forum
David E. GoldbergPre-boot authenticationCatalyst 6500
3M computerKraken botnetEthernet over PDH
Anticipatory schedulingCategory:Electronic Frontier FoundationEthernet frame
Benaloh cryptosystemPaywallClydeNET
Naccache–Stern cryptosystemSygate TechnologiesEtherSound
Naccache–Stern knapsack cryptosystemBlacklist (computing)BOINC client–server technology
John Amsden StarkweatherMonoculture (computer science)SSH Communications Security
Strong NP-completenessPeter H. GregoryNetwork agility
Lagrangian relaxationVirtual BouncerNick McKeown
Fold (higher-order function)RunasNemo Systems
Linear programming relaxationYersinia (computing)Category:LAN messengers
Computational complexity of mathematical operationsWebsite reputation ratingsSimple API for Grid Applications
Tree sortComputer Online Forensic Evidence ExtractorGordon Stitt
Cryptography lawKak wormPacket transfer delay
Ronald FedkiwKoKo (computer virus)Internet number
Outline of artificial intelligenceMichael SchearerCopper cable certification
Generalized algebraic data typeCategory:BotnetsNMEA 2000
Letter frequencyEinstein (US-CERT program)T-MPLS
Secure Hash StandardDan KaminskyCobraNet
End-user developmentVLAN hoppingRouting protocol
Minimum-cost flow problemRobert SladeService data point
Blob detectionTwelve TricksNetwork delay
A-normal formCategory:British computer criminalsKiwi Advanced Research and Education Network
Web of KnowledgeCategory:Computer criminals by nationalityNetwork for Earthquake Engineering Simulation
Damgأ¥rd–Jurik cryptosystemCategory:Russian computer criminalsProposed top-level domain
Threshold cryptosystemCategory:German computer criminalsTaxonomy of congestion control
Domain-key normal formProofpoint, Inc.Category:Computer networking articles needing expert attention
Column-oriented DBMSJon CallasCognio
DemzillaMeredith L. PattersonApplication delivery network
ZINC databaseMarcus J. RanumBoston MXP
Application streamingNational Cybersecurity CenterEMBnet
Order byCurve25519Category:Start-Class Computer networking articles
Feige–Fiat–Shamir identification schemeQualified Security AssessorCategory:Low-importance Computer networking articles
Filesystem-level encryptionLynisWindows Vista networking technologies
Thomsen DiagramsSafeNetDimension Data
Symposium on Principles of Programming LanguagesXSS wormInter-domain
Variable-length codeCommittee on National Security SystemsFuture Internet Research and Experimentation
Dijkstra PrizeShankar's VirusBerkeley Packet Filter
Computer programming in the punched card eraMartin RoeschLeader election
Hadamard codeDaniel B. CidConnection-oriented Ethernet
KeeLoqEvgeniy GabrilovichWindows Rally
Adaptive grammarHacking at RandomANT (network)
Okamoto–Uchiyama cryptosystemZorp firewallACSI-CORBA mapping
Fractional cascadingMan-in-the-browserForwarding information base
Parity gameNeil DaswaniEduroam
Circuit complexitySwitzerland (software)C-DOT
Hutter PrizeBohmini.AISO/IEEE 11073
Terminal and nonterminal symbolsMassachusetts Bay Transportation Authority v. AndersonSkype security
SQL AnywhereUncomplicated FirewallUnisphere Networks
Opportunistic TLSBugtraqTechNet (computer network)
Bozo bitKillbitNamed data networking
Quantum finite automataBargain BuddyBlueArc
Public key fingerprintDNSCurvePulse~Link
Deterministic context-free languageW32.Gammima.AGMulti-link trunking
Weak NP-completenessTriGeo Network SecurityInternet layer
Adaptive quadratureDavid BrumleyRed Swoosh
TypeScriptInternational Journal of Private LawDANTE
Anomaly detectionSusan LandauHP OpenCall
Competitive analysis (online algorithm)Web threatSource route bridging
Information-based complexityCookiemonster attackIBM WebSphere DataPower SOA Appliances
Chan's algorithmJeanson James AnchetaLoop Management System
Kotok-McCarthyRF monitor softwareIGMP snooping
HierocryptNull sessionSensor node
Key encapsulationFake APTZSP
Pairing-based cryptographyRogue systemNetwork allocation vector
Link timeYascaMulti-user MIMO
Automated proof checkingClickjackingMP101
List of online databasesGary McGrawEthernet over PDH over SONET/SDH
John Alan RobinsonCharlie Miller (security researcher)Virtual Link Aggregation Control Protocol
Gadget (computer science)AS4Operating system Wi-Fi support
AntiPatternsMega-D botnetR-SMLT
Cosine similarityIT Baseline Protection CatalogsInterSwitch Trunk
ARIA (cipher)Template:SymantecDistributed Multi-Link Trunking
CIPHERUNICORN-EAgent.AWFDistributed Split Multi-Link Trunking
CIPHERUNICORN-AMebrootMetro Ethernet Routing Switch 8600
Dutch national flag problemSUPERAntiSpywareGrid-oriented storage
Alex BiryukovCategory:Computer security qualificationsNational Transportation Communications for Intelligent Transportation System Protocol
Deniable authenticationCategory:Computer security accreditationsLockstep protocol
Heinz ZemanekHDDeraseWS-Federation
COCONUT98CyberArkKerrie Holley
Interface-based programmingDouglas ThomasAvaya ERS 8600
Gerhard WeikumJBoss SSO6in4
Muller automatonManaged security serviceNexus Hawk
Davies' attackCategory:Australian computer criminalsIEC 61883
Michael McRobbieGraugon AntiVirusWhite spaces (radio)
Implicit certificateWarzappingIP fragmentation attack
Frame (artificial intelligence)McColoAtlantaIX
Tom BersonKoobfaceCategory:IEEE 802.11
Dynamic loadingTemplate:Intel technologyAnonymizer
Data aggregationAACS encryption key controversyMod qos
Integrity constraintsForm grabbingInternalnet
Hirsch conjectureSOAtestEtherNet/IP
Graph cuts in computer visionJustin Tanner PetersenIPv6 transition mechanism
String operationsBigFix IncBREN
Arthur SamuelVirusBusterForce10
Tony HeyTemplate:Firewall softwareAdisak Mekkittikul
CoinductionTemplate:WikiProject Computer SecurityMetroFi
Server-Gated CryptographyCategory:Start-Class Computer Security articlesMultiwavelength optical networking
Agent-based computational economicsCategory:Stub-Class Computer Security articlesList of DNS record types
Shamir's Secret SharingCategory:Mid-importance Computer Security articlesIEEE Communications Society
Mean shiftCategory:WikiProject Computer Security articlesCategory:Information technology projects
Encyclopedia of Reagents for Organic SynthesisCategory:WikiProject Computer SecurityWireless repeater
IntroselectCategory:Computer Security articles by qualityUnique local address
Rule 184Category:Computer Security articles by importanceCooperative MIMO
BD+Alexander SotirovControlNet
Abstract family of languagesCyberwarfare by RussiaDHCP snooping
Instrumentation (computer programming)Virus Information AllianceFixed wireless
Government databaseCategory:FA-Class Computer Security articlesPrivate VLAN
Usage share of operating systemsArcSightISO/IEC JTC 1
Data warehouse applianceIn-session phishingOpenSimulator
2-EXPTIMEComodo Internet SecurityLink-Local Multicast Name Resolution
SQL Server CompactTor-ramdiskDaintree Networks
Karger's algorithmHappy99IEEE 802.11 (legacy mode)
Edmonds' algorithmAhnLab, Inc.Cube-connected cycles
Distinguishing attackCategory:Computer security companies specializing in botnetsIEEE 802.11a-1999
Gio WiederholdFireEyeIEEE 802.11b-1999
SLD resolutionCategory:Screenshots of spyware removalIEEE 802.11g-2003
Total functional programmingMirar ToolbarTemplate:Gnutella
SQL/PSMNorton InsightAvaya ERS 5500 Series
Hybrid cryptosystemCategory:B-Class Computer Security articlesTechnology stack
Global serializabilityNorton Safe WebTransmission delay
Circular bufferShred (Unix)Category:Top-importance Computer networking articles
Graph partitionMelissa HathawayAudio over IP
SafetyLitZone-HFederal Networking Council
Back-end databaseOpen securityNetwork speaker
List decodingCameron LacroixRMI Corporation
Delimited continuationFederal Desktop Core ConfigurationNetwork-centric emergency notification
Jenkins–Traub algorithmCategory:Unknown-importance Computer Security articlesByte serving
DNA databaseNetScreen TechnologiesGlenn Ricart
Collection (abstract data type)MalwarebytesMC-LAG
Gpg4winDREAD (risk assessment model)Eirpac
And–or treeCategory:NA-importance Computer Security articlesFlexCAN
Blom's schemeCategory:NA-Class Computer Security articlesSun Neptune
Quantum walkCategory:Unassessed Computer Security articlesPSNEXT
KeYCategory:List-Class Computer Security articlesNational Grid Service
Trellis (graph)Category:GA-Class Computer Security articlesCeph (software)
Naked objectsCategory:FL-Class Computer Security articlesCertified Wireless Network Administrator
Crypto phoneTemplate:Cult of the Dead CowPanasas
Decision Linear assumptionNetwork forensicsFencing (computing)
CMN-GOMSHack trapperNetgear SC101
List of academic computer science departmentsPete HerzogNetwork Direct Attached Storage
Distributed concurrency controlGhostNetKarn's algorithm
International Symposium on Graph DrawingKaspersky Anti-HackerAurora (protocol)
ATLA Religion DatabaseCA/Browser ForumNetwork equipment provider
Jim BellSwizzorCorporation for Research and Educational Networking
Helmut SchreyerX.1035Zardoz (computer security)
Aspect-oriented software developmentDoD Cyber Crime CenterData rate units
74181Hacker HaltedCategory:Internet-based works
Computers and IntractabilityCategory:Computer security conferencesSemaphore Flag Signaling System
FlashsortDr Solomon's AntivirusBackbone cabling
Scott AmblerUnited States Cyber CommandBuffalo AirStation
Analytical Sciences Digital LibraryPrivacy piracyLanstar
Activation functionOffensive Security Certified ProfessionalVirtual output queueing
Operational systemSean HastingsOpenFabrics Alliance
One-way quantum computerJake KounsVirtual security switch
Cluster stateObfuscated TCPGigE Vision
Dual EC DRBGRaphael GrayAirPort Time Capsule
Artificial bee colony algorithmLeonard Rose (hacker)TCP hole punching
Comparison of database toolsMulti-factor authenticationPeer-to-peer SIP
TLS-PSKBotHunterTTP/A
Three-pass protocolBanner grabbingInternet in Ukraine
KernelizationIvan Krstiؤ‡Carrier Ethernet
B*Little SnitchHigh Performance Storage System
Embedded databaseVulnerability managementTemplate:Infobox Internet exchange point
David S. H. RosenthalTom Van VleckInformation Networking Institute
Transaction dataImprivataSytek Inc
Asymptotic computational complexityAnna Kournikova (computer virus)Stream Reservation Protocol
Average-case complexityBillion laughsLive Communications Server 2003
Mogensen–Scott encodingMalware BellZ-SAN
Bees algorithmSlowloris (computer security)Network block device
Quantum digital signatureNftablesDSL Rings
Applications of artificial intelligenceSoftware forensicsFixed–mobile convergence
Cold boot attackGumblarRTP audio video profile
SQL:2008Antisec MovementSpider Systems
Boneh–Franklin schemeNeurosecurityCategory:Audio network protocols
Cocks IBE schemeMark LudwigBlue (queue management algorithm)
Multivariate cryptographyMobile device forensicsPKCS 1
Computational creativityComputer security conferenceItalian Grid Infrastructure
Job shop schedulingBadbunnyFibre Channel over Ethernet
Artificial stupidityOne-time authorization codeMagicJack
Monoculture (computer science)Heap feng shuiIP exchange
Tomaso PoggioCategory:Privilege escalation exploitsWorldwide LHC Computing Grid
DFA minimizationKYPSSoftware flow control
Blum–Micali algorithmReturn-oriented programmingARPA Host Name Server Protocol
Topological data analysisOpenCandyAirborne Networking
TorChatOffer AssistantStackable switch
Dantzig–Wolfe decompositionGreen Antivirus 2009TM Forum
لتطوير الويكيبيديا العربية