OnlineWoerterBuecher.de
Internes

Free On-line Dictionary of Computing: Search Results


Search Results for: URI



Results in the term's title:

·  A1 security
·  Active Reconfiguring Message
·  Alan M. Turing
·  Alan Turing
·  A Manufacturing Language
·  B1 security
·  B2 security
·  B3 security
·  Bose-Chaudhuri-Hocquenghem Code
·  buried treasure
·  C1 security
·  C2 security
·  Capabilities Maturity Model
·  Capability Maturity Model
·  Computer Integrated Manufacturing
·  computer security
·  creeping featurism
·  creeping featuritis
·  discrete Fourier transform
·  domain maturity
·  Eurisko
·  Fast Fourier Transform
·  feeping creaturism
·  Fourier transform
·  furigana
·  Generic Security Service Application Programming Interface
·  graph colouring
·  heuristic
·  heuristics testing
·  Internet Security Association and Key Management Protocol
·  job security
·  Manufacturing Automation Protocol
·  metaheuristic
·  My Favourite Toy Language
·  Nondeterministic Turing Machine
·  Object-Oriented Turing
·  Purify
·  restructuring
·  RSA Data Security, Inc.
·  Security Administrator' s Integrated Network Tool
·  Security Association
·  Security Association ID
·  security through obscurity
·  Simple Authentication and Security Layer
·  tourist
·  tourist information
·  Transport Layer Security protocol
·  Turing
·  Turing Machine
·  Turingol
·  Turing Plus
·  Turing tar-pit
·  Turing test
·  turist
·  URI
·  Wireless Transport Layer Security


Results in the term's text:

·  56 kbps
·  abstract machine
·  accounting management
·  Active Reconfiguring Message
·  Aditi
·  Advanced Micro Devices, Inc.
·  Advanced Research Projects Agency Network
·  Advanced RISC Machines Ltd.
·  AES
·  Alan M. Turing
·  Alan Turing
·  Aldat
·  ALGOL 68-R
·  ALLIANCE
·  Alonzo Church
·  ALPS
·  AM
·  A Manufacturing Language
·  AMD 29000
·  AML
·  Annual Change Traffic
·  applet
·  approximation algorithm
·  ARM
·  Artifex
·  ASCII art
·  ASL+
·  Association Control Service Element
·  Atari
·  authentication
·  AUTOEXEC.BAT
·  automation
·  backbone cabal
·  back door
·  Bad Thing
·  banana problem
·  batch processing
·  best first search
·  BHC Code
·  BiCMOS
·  Big Room
·  Bird-Meertens Formalism
·  bit bucket
·  BITNET
·  biz-core stability
·  black art
·  BlackIce
·  Bletchley Park
·  blivet
·  bogometer
·  bootstrap
·  bounce
·  Brainfuck
·  branch coverage testing
·  break-even point
·  breath-of-life packet
·  B-Toolkit
·  bucky bits
·  bug-for-bug compatible
·  buried treasure
·  Busy Beaver
·  byte
·  CAD/CAM
·  callback
·  CAM
·  Cancelpoodle
·  Canonical Encoding Rules
·  can' t happen
·  Capabilities Maturity Model
·  capability
·  Capability Maturity Model
·  cargo cult programming
·  Carl Friedrich Gauss
·  carrier scanner
·  cascade
·  case based reasoning
·  cepstrum
·  Challenge-Handshake Authentication Protocol
·  channel
·  Chip Scale Packaging
·  Christmas tree
·  CIM
·  CMM
·  Cocol/R
·  Coco/R
·  Colossus
·  Comdex
·  comment out
·  Commodore Business Machines
·  Commodore SX64
·  COmmon Business Oriented Language
·  compile time
·  computability theory
·  Computer Aided Design
·  Computer Aided Engineering
·  computer confetti
·  Computer Emergency Response Team
·  computer security
·  Concrete Data Structure
·  concrete syntax
·  Concurrent Oberon
·  CONNIVER
·  constraint satisfaction
·  Constructive Cost Model
·  consultant
·  context-free
·  cookie
·  cookie jar
·  copybroke
·  cost control callback
·  cracker
·  crack root
·  crayola books
·  creeping elegance
·  creeping featurism
·  creeping featuritis
·  critical mass
·  Crypt Breakers Workbench
·  cryptography
·  CSK Software
·  CSMA/CD
·  Customer Relationship Management
·  cut a tape
·  Cyc
·  Darwin
·  Data Address Generator
·  database chefistrator
·  Data Communication Equipment
·  Data Terminal Equipment
·  decidability
·  decision theory
·  DECmate I
·  Demon Internet Ltd.
·  DFT
·  Difference Engine
·  digital computer
·  Digital Lempel Ziv 1
·  Digital Multimeter
·  Digital Signature Standard
·  Digital Versatile Disc
·  discrete cosine transform
·  discrete Fourier transform
·  disk drive
·  Dissociated Press
·  domain architecture
·  Donald Knuth
·  dongle
·  down-time
·  Dragon Book
·  drop-ins
·  drop-outs
·  Duff' s device
·  dumpster diving
·  dynamic database management system
·  Ecash
·  EDP auditor
·  eigenvector
·  eighty-column mind
·  Electrically Erasable Programmable Read-Only Memory
·  electronic commerce
·  Electronic Commerce Dictionary
·  electronic mail
·  elevator controller
·  elite
·  English
·  Enigma
·  Enterprise JavaBeans
·  Enterprise Resource Planning
·  Erlang
·  error detection and correction
·  es
·  escrow
·  ET++
·  Ethernet
·  Eurisko
·  exception handler
·  Execute Channel Program
·  exploit
·  exponential-time algorithm
·  extranet
·  failure-directed testing
·  farming
·  fascist
·  Fast Fourier Transform
·  feature
·  feature creature
·  feature creep
·  Federal Information Processing Standards
·  feeping creature
·  feeping creaturism
·  fence
·  FFP
·  FFT
·  Fibre Channel-Arbitrated Loop
·  FileMaker, Inc.
·  filk
·  Financial Information eXchange
·  Finite State Machine
·  firewall code
·  firewall machine
·  flame
·  flash
·  FMS
·  foobar
·  for values of
·  four colour map theorem
·  Fourier transform
·  FP
·  FUD wars
·  Function Point Analysis
·  furigana
·  fweep
·  gamma correction
·  garbage collection
·  Generic Security Service Application Programming Interface
·  Geographic Information System
·  George Boole
·  gonkulator
·  Grace Hopper
·  graph coloring
·  GSS-API
·  gweep
·  hack mode
·  hairy
·  HAL
·  heuristic
·  Hewlett-Packard
·  hiragana
·  HTTP cookie
·  humma
·  HyperNeWS
·  HyperText Transmission Protocol, Secure
·  HyTime
·  ICAM
·  ICE
·  icebreaker
·  ICMP Router Discovery Protocol
·  idempotent
·  I didn' t change anything!
·  incantation
·  Information Innovation
·  installer
·  integrated circuit
·  IntelDX4
·  Internet Foundation Classes
·  Internet Group Management Protocol
·  Internet Protocol version 6
·  Internet Security Association and Key Management Protocol
·  Internet Worm
·  interrupt handler
·  Intrusion Countermeasure Electronics
·  Intrusive Testing
·  intuitionistic probability
·  IPsec
·  IP Telephony
·  IrDA Control
·  ISAKMP
·  Ivan Sutherland
·  IYFEG
·  Java Message Service
·  job security
·  joe
·  John von Neumann
·  Joint Test Action Group
·  kanji
·  Kerberos
·  kernel
·  key escrow
·  kiosk
·  KISS Principle
·  kludge
·  kluge
·  kremvax
·  L0pht
·  Lawrence Livermore National Laboratory
·  lazy evaluation
·  learning curve
·  level-sensitive scan design
·  line noise
·  Linux Network Administrators' Guide
·  Lisp-Linda
·  literal
·  live data
·  locale
·  localisation
·  Loebner Prize
·  logic bomb
·  logic variable
·  log in
·  Loglan
·  log out
·  luser
·  machine
·  macro
·  Magma2
·  magnetic disk
·  magneto-optical disk
·  mainframe
·  mall
·  Manufacturer Resource Planning
·  Manufacturers Automation Protocol
·  MAP
·  Maple
·  mark-sweep garbage collection
·  Material Requirements Planning
·  MATLAB
·  measurement
·  memetic algorithm
·  metaheuristic
·  MFTL
·  Micro Channel Architecture
·  microprocessor
·  minimax
·  mode bit
·  Modula/R
·  Modulex
·  monitor
·  MONSTR
·  Mosaic
·  Motorola 68000
·  mr
·  mu
·  mudhead
·  munching
·  mung
·  Mutation Testing
·  naive
·  name capture
·  nasal demons
·  nastygram
·  netdead
·  .NET framework
·  Network Administrator
·  network management
·  New Storage System
·  noddy
·  noise shaping
·  Nominal Semidestructor
·  non-algorithmic procedure
·  nondeterministic automaton
·  nondeterministic polynomial time
·  Nondeterministic Turing Machine
·  NP-complete
·  NSA line eater
·  Oberon
·  Oberon-V
·  Object-code Buffer Overrun Evaluator
·  Object-Oriented Turing
·  ogg
·  One-Time Password
·  On-Line Analytical Processing
·  ontology
·  Opal
·  OpenBSD
·  OpenInsight
·  open source
·  operational semantics
·  Oracle Co-operative Applications
·  Orange Book
·  OS/390
·  OTP
·  P6
·  padded cell
·  PAP
·  password
·  PCI Configuration Utility
·  P-code
·  PCTE+
·  Pentium Pro
·  Persistent Functional Language
·  Personal Identification Number
·  phacker
·  phreaking
·  PIP
·  plan file
·  Pluggable Authentication Module
·  polynomial-time algorithm
·  PowerPC 601
·  PRECCX
·  precedence lossage
·  precharge
·  pre-sales support rep
·  Pretty Good Privacy
·  Programmable Read-Only Memory
·  Project Guardian
·  Proxy Server
·  PSL/PSA
·  Public-Key Cryptography Standards
·  public-key encryption
·  punt
·  purple wire
·  quality assurance
·  race condition
·  rainbow series
·  Random Access Memory Digital-to-Analog Converter
·  raster
·  Rate monotonic scheduling
·  RC4
·  real number
·  redundancy
·  register allocation
·  register assignment
·  relevance
·  Request For Comments
·  requirements
·  Requirements Engineering
·  Resource Access Control Facility
·  Resource Description Framework
·  RFC 1334
·  RFC 1446
·  RFC 1508
·  RFC 1509
·  RFC 1760
·  RFC 1825
·  RFC 1938
·  RFC 2298
·  RFC 2408
·  Richard Hamming
·  Rigel
·  Riordan' s Internet Privacy Enhanced Mail
·  robot
·  rococo
·  RSA
·  RSA encryption
·  rubi
·  Run Length Limited
·  run time
·  SAID
·  SAINT
·  sample
·  sanity check
·  SASL
·  SATAN
·  Saturday-night special
·  SC/MP
·  scratch monkey
·  screen saver
·  second-system effect
·  Secure Multipurpose Internet Mail Extensions
·  Security Administrator' s Integrated Network Tool
·  Security Association
·  security through obscurity
·  semaphore
·  sendmail
·  Sequential Parlog Machine
·  service
·  session layer
·  SET
·  Seymour Cray
·  shared memory
·  shell
·  Simple Network Management Protocol version 2
·  SIMulation ANalysis
·  single sign-on
·  SkipJack
·  SL
·  Slingshot
·  Smartdrive
·  snark
·  social engineering
·  SOCKS
·  software bloat
·  Somar DumpAcl
·  SORCERER
·  SPEC
·  spiffy
·  spod
·  spyware
·  sr
·  SSLeay
·  Stack Environment Control Dump machine
·  stack puke
·  @stake
·  statistical time division multiplexing
·  steganography
·  Stephen Kleene
·  STFT
·  su
·  SYMPL
·  Syntax/Semantic Language
·  SyQuest Technology, Inc.
·  SYSKEY
·  System Account Manager
·  system chefistration
·  systems programmer
·  T
·  TCB
·  TECO
·  ten-finger interface
·  Test coverage
·  texture
·  The Cuckoo' s Egg
·  theory
·  This time, for sure!
·  Thumb
·  tiger team
·  time bomb
·  time T
·  time zone
·  TL/I
·  TLS
·  TM
·  to a first approximation
·  toasternet
·  TOPS-10
·  tourist
·  tourist information
·  toy language
·  TPS
·  trap-door function
·  troglodyte
·  Trojan horse
·  Turing
·  Turing Machine
·  Turingol
·  Turing Plus
·  Turing tar-pit
·  Turing test
·  turist
·  TZ
·  Uniform Resource Citation
·  Uniform Resource Name
·  Universal Resource Identifier
·  University of Durham
·  Unix conspiracy
·  unwind the stack
·  URL redirection
·  user name
·  USG Unix
·  usr
·  V.34
·  VAL
·  Vannevar Bush
·  VAX
·  Vint Cerf
·  virtual address
·  Virtual Machine
·  Virtual Memory System
·  Virtual Private Network
·  virtual server
·  virus
·  Visual Interface
·  von Neumann architecture
·  wango
·  warchalk
·  wardialer
·  wardriving
·  warez
·  wavelet
·  WDASM
·  Weeble
·  What' s a spline?
·  wheel wars
·  Windows 95
·  Windows NT
·  wireless local area network
·  Wireless Transport Layer Security
·  wizard
·  working set
·  worm
·  wrapper
·  write-only memory
·  WTLS
·  XMODEM
·  Y
·  yoyo mode
·  Z3
·  ZFC
·  Zork
·  ZX-81


  


Return to Free On-line Dictionary of Computing ]

Go Back ]
All logos and trademarks in this site are property of their respective owner.

Page Generation in 0.0584 Seconds, with 15 Database-Queries
Zurück zur Startseite