.NET Frameworks
The Microsoft .NET Framework
is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming
problems and a virtual machine that manages the execution of programs
written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by
most new applications created for the Windows platform.
Programs written for the .NET Framework
execute in a software environment that manages the program's runtime requirements. Also part of the .NET Framework, this runtime
environment is known as the Common Language Runtime (CLR). The CLR provides the appearance of an application virtual machine so that programmers need not consider the capabilities of the
specific CPU that will execute the program. The CLR also provides other
important services such as security, memory management, and exception handling. The class library and the CLR together compose the .NET Framework.
ASP - Active Server Pages
Access
Microsoft Office
Access, previously known as Microsoft Access, is a relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software development tools. It is a member of the Microsoft Office suite of applications and is included in the Professional and
higher versions for Windows and also sold separately. There is no version for MacOS or for Microsoft Office Mobile.
Access stores data in its own format
based on the Access Jet Database Engine. It can also import or link directly to data stored in other Access databases, Excel, SharePoint lists,
text, XML, Outlook, HTML, dBase, Paradox, Lotus 1-2-3, or any ODBC-compliant data container including Microsoft SQL Server, Oracle, MySQL and PostgreSQL. Software developers and data architects can use it to develop application software and non-programmer "power users" can use it to build simple
applications. It supports some object-oriented techniques but falls short of being a fully object-oriented
development tool.
Access privileges
Determine which portal objects
a user can browse or edit, which objects appear in search results, and which can be added to My Pages and community pages.
Active Hyperlink
A hyperlink is considered to be an active hyperlink from the time
a user presses and releases the mouse button when clicking on the hyperlink. When designing a Web page, you can choose a font color to represent active hyperlinks.
Administrator (as an IT resource)
IT Resource Management allows organizations
to analyze, monit IT Resource Management allows organizations to analyze, monitor and anticipate the utilization and performance
of the IT infrastructure by providing an enterprisewide view of IT services and resources. The solution ensures delivery of
IT services and resources in an efficient, cost-effective manner while demonstrating measurable value to business incentives.or
and anticipate the utilization and performance of the IT infrastructure by providing an enterprisewide view of IT services
and resources. The solution ensures delivery of IT services and resources in an efficient, cost-effective manner while demonstrating
measurable value to business incentives.
Authentication
(From Greek: αυθεντικός;
real or genuine, from authentes; author). Authentication is the act of establishing or confirming something (or
someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the
identity of a person, the origins of an artifact, or assuring that a
computer program is a trusted one.
Data administrator
The
role responsible for the enterprise’s data resources and for the administration, control, and coordination of all data
related analysis activities. The DA has the responsibility for planning and defining the conceptual framework for the overall
data environment. The functions of the DA typically include requirements definition, logical data modeling, data definitions,
logical to physical mapping, maintenance of inventory of the current system, data analysis, and the meta data repository.
Encryption
Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed
to protect the integrity and authenticity of a message; for example, verification of a message authentication code (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but
successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution
can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption.
Information Technology
Information technology
(IT), as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation,
support or management of computer-based information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.
Information Technology
Resource (IT Resource)
ITR (Information Technology Resources) is a Veteran owned Technical consulting and recruiting firm focused on the Information
Technology Industry.
Intellectual property rights (IPR)
Intellectual property rights (IPR), very broadly, are rights granted to creators and owners of works that are the result of human intellectual
creativity. These works can be in the industrial, scientific, literary or artistic domains. They can be in the form of an
invention, a manuscript, a suite of software, or a business name, as examples.
ISO
ISO 17799
is a 'code of practise', meaning that it lists a substantial number of specific security controls that may be applicable to
an IT environment. Selection from these controls is normally performed via risk assessment, and the methods outlined within
ISO 27001.
Malicious code
Malicious code ( is also called
vandals) is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone.
In contrast to viruses that require a user to execute a program in order to cause damage, vandals are auto-executable applications.
Malware (virus) Detection Software
Malware,
a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system
without the owner's informed consent. The expression is a general term used by computer professionals
to mean a variety of forms of hostile, intrusive, or annoying software or program code. The term "computer virus" is sometimes used as a catch-all phrase to include all types
of malware, including true viruses.
Software is considered malware
based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of several U. S. states, including California and West Virginia.
Malware is not the same as
defective software, that is, software which has a legitimate purpose but contains harmful bugs.
Patch
Patch is a Unix program that updates text files according to instructions contained
in a separate file, called a patch file. The patch file (also called a patch for short) is a text file that
consists of a list of differences and is produced by running the related different program with the original and updated
file as arguments. Updating files with patch is often referred to as applying the patch or simply patching the
files.
Purge
In history and political science, a purge is the removal of people who are considered
undesirable by those in power from a government, from another organisation, or from society as a whole. Purges
can be peaceful or violent; many will end with the imprisonment or exile of those purged, but in some cases they will simply be removed
from office. Restoring people who have been purged is known as rehabilitation.
Remote Access
Social Engineering
Social engineering is the
act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the
purpose of information gathering, fraud or computer system access; in most cases the attacker never comes face-to-face with
the victim.
Spoofing
Spoofing is the creation of TCP/IP packets using somebody
else's IP address. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the
"source IP" address. That address is only used by the destination machine when it responds back to the source.
Strong Encryption
Strong Encryption an
encryption method that uses a very large number as its cryptographic key. The larger the key, the longer it takes to unlawfully
break the code. Today, 256 bits is considered strong encryption. As computers become faster, the length of the key must be
increased.
|