OnlineWoerterBuecher.de
Navigation
Start
Deutsch-Englisch
Deutsch-Spanisch
Enzyklopädie
Internes
Impressum
Kontakt
Free On-line Dictionary of Computing: Search Results
Search Results for:
URI
Results in the term's title:
·
A1 security
·
Active Reconfiguring Message
·
Alan M. Turing
·
Alan Turing
·
A Manufacturing Language
·
B1 security
·
B2 security
·
B3 security
·
Bose-Chaudhuri-Hocquenghem Code
·
buried treasure
·
C1 security
·
C2 security
·
Capabilities Maturity Model
·
Capability Maturity Model
·
Computer Integrated Manufacturing
·
computer security
·
creeping featurism
·
creeping featuritis
·
discrete Fourier transform
·
domain maturity
·
Eurisko
·
Fast Fourier Transform
·
feeping creaturism
·
Fourier transform
·
furigana
·
Generic Security Service Application Programming Interface
·
graph colouring
·
heuristic
·
heuristics testing
·
Internet Security Association and Key Management Protocol
·
job security
·
Manufacturing Automation Protocol
·
metaheuristic
·
My Favourite Toy Language
·
Nondeterministic Turing Machine
·
Object-Oriented Turing
·
Purify
·
restructuring
·
RSA Data Security, Inc.
·
Security Administrator' s Integrated Network Tool
·
Security Association
·
Security Association ID
·
security through obscurity
·
Simple Authentication and Security Layer
·
tourist
·
tourist information
·
Transport Layer Security protocol
·
Turing
·
Turing Machine
·
Turingol
·
Turing Plus
·
Turing tar-pit
·
Turing test
·
turist
·
URI
·
Wireless Transport Layer Security
Results in the term's text:
·
56 kbps
·
abstract machine
·
accounting management
·
Active Reconfiguring Message
·
Aditi
·
Advanced Micro Devices, Inc.
·
Advanced Research Projects Agency Network
·
Advanced RISC Machines Ltd.
·
AES
·
Alan M. Turing
·
Alan Turing
·
Aldat
·
ALGOL 68-R
·
ALLIANCE
·
Alonzo Church
·
ALPS
·
AM
·
A Manufacturing Language
·
AMD 29000
·
AML
·
Annual Change Traffic
·
applet
·
approximation algorithm
·
ARM
·
Artifex
·
ASCII art
·
ASL+
·
Association Control Service Element
·
Atari
·
authentication
·
AUTOEXEC.BAT
·
automation
·
backbone cabal
·
back door
·
Bad Thing
·
banana problem
·
batch processing
·
best first search
·
BHC Code
·
BiCMOS
·
Big Room
·
Bird-Meertens Formalism
·
bit bucket
·
BITNET
·
biz-core stability
·
black art
·
BlackIce
·
Bletchley Park
·
blivet
·
bogometer
·
bootstrap
·
bounce
·
Brainfuck
·
branch coverage testing
·
break-even point
·
breath-of-life packet
·
B-Toolkit
·
bucky bits
·
bug-for-bug compatible
·
buried treasure
·
Busy Beaver
·
byte
·
CAD/CAM
·
callback
·
CAM
·
Cancelpoodle
·
Canonical Encoding Rules
·
can' t happen
·
Capabilities Maturity Model
·
capability
·
Capability Maturity Model
·
cargo cult programming
·
Carl Friedrich Gauss
·
carrier scanner
·
cascade
·
case based reasoning
·
cepstrum
·
Challenge-Handshake Authentication Protocol
·
channel
·
Chip Scale Packaging
·
Christmas tree
·
CIM
·
CMM
·
Cocol/R
·
Coco/R
·
Colossus
·
Comdex
·
comment out
·
Commodore Business Machines
·
Commodore SX64
·
COmmon Business Oriented Language
·
compile time
·
computability theory
·
Computer Aided Design
·
Computer Aided Engineering
·
computer confetti
·
Computer Emergency Response Team
·
computer security
·
Concrete Data Structure
·
concrete syntax
·
Concurrent Oberon
·
CONNIVER
·
constraint satisfaction
·
Constructive Cost Model
·
consultant
·
context-free
·
cookie
·
cookie jar
·
copybroke
·
cost control callback
·
cracker
·
crack root
·
crayola books
·
creeping elegance
·
creeping featurism
·
creeping featuritis
·
critical mass
·
Crypt Breakers Workbench
·
cryptography
·
CSK Software
·
CSMA/CD
·
Customer Relationship Management
·
cut a tape
·
Cyc
·
Darwin
·
Data Address Generator
·
database chefistrator
·
Data Communication Equipment
·
Data Terminal Equipment
·
decidability
·
decision theory
·
DECmate I
·
Demon Internet Ltd.
·
DFT
·
Difference Engine
·
digital computer
·
Digital Lempel Ziv 1
·
Digital Multimeter
·
Digital Signature Standard
·
Digital Versatile Disc
·
discrete cosine transform
·
discrete Fourier transform
·
disk drive
·
Dissociated Press
·
domain architecture
·
Donald Knuth
·
dongle
·
down-time
·
Dragon Book
·
drop-ins
·
drop-outs
·
Duff' s device
·
dumpster diving
·
dynamic database management system
·
Ecash
·
EDP auditor
·
eigenvector
·
eighty-column mind
·
Electrically Erasable Programmable Read-Only Memory
·
electronic commerce
·
Electronic Commerce Dictionary
·
electronic mail
·
elevator controller
·
elite
·
English
·
Enigma
·
Enterprise JavaBeans
·
Enterprise Resource Planning
·
Erlang
·
error detection and correction
·
es
·
escrow
·
ET++
·
Ethernet
·
Eurisko
·
exception handler
·
Execute Channel Program
·
exploit
·
exponential-time algorithm
·
extranet
·
failure-directed testing
·
farming
·
fascist
·
Fast Fourier Transform
·
feature
·
feature creature
·
feature creep
·
Federal Information Processing Standards
·
feeping creature
·
feeping creaturism
·
fence
·
FFP
·
FFT
·
Fibre Channel-Arbitrated Loop
·
FileMaker, Inc.
·
filk
·
Financial Information eXchange
·
Finite State Machine
·
firewall code
·
firewall machine
·
flame
·
flash
·
FMS
·
foobar
·
for values of
·
four colour map theorem
·
Fourier transform
·
FP
·
FUD wars
·
Function Point Analysis
·
furigana
·
fweep
·
gamma correction
·
garbage collection
·
Generic Security Service Application Programming Interface
·
Geographic Information System
·
George Boole
·
gonkulator
·
Grace Hopper
·
graph coloring
·
GSS-API
·
gweep
·
hack mode
·
hairy
·
HAL
·
heuristic
·
Hewlett-Packard
·
hiragana
·
HTTP cookie
·
humma
·
HyperNeWS
·
HyperText Transmission Protocol, Secure
·
HyTime
·
ICAM
·
ICE
·
icebreaker
·
ICMP Router Discovery Protocol
·
idempotent
·
I didn' t change anything!
·
incantation
·
Information Innovation
·
installer
·
integrated circuit
·
IntelDX4
·
Internet Foundation Classes
·
Internet Group Management Protocol
·
Internet Protocol version 6
·
Internet Security Association and Key Management Protocol
·
Internet Worm
·
interrupt handler
·
Intrusion Countermeasure Electronics
·
Intrusive Testing
·
intuitionistic probability
·
IPsec
·
IP Telephony
·
IrDA Control
·
ISAKMP
·
Ivan Sutherland
·
IYFEG
·
Java Message Service
·
job security
·
joe
·
John von Neumann
·
Joint Test Action Group
·
kanji
·
Kerberos
·
kernel
·
key escrow
·
kiosk
·
KISS Principle
·
kludge
·
kluge
·
kremvax
·
L0pht
·
Lawrence Livermore National Laboratory
·
lazy evaluation
·
learning curve
·
level-sensitive scan design
·
line noise
·
Linux Network Administrators' Guide
·
Lisp-Linda
·
literal
·
live data
·
locale
·
localisation
·
Loebner Prize
·
logic bomb
·
logic variable
·
log in
·
Loglan
·
log out
·
luser
·
machine
·
macro
·
Magma2
·
magnetic disk
·
magneto-optical disk
·
mainframe
·
mall
·
Manufacturer Resource Planning
·
Manufacturers Automation Protocol
·
MAP
·
Maple
·
mark-sweep garbage collection
·
Material Requirements Planning
·
MATLAB
·
measurement
·
memetic algorithm
·
metaheuristic
·
MFTL
·
Micro Channel Architecture
·
microprocessor
·
minimax
·
mode bit
·
Modula/R
·
Modulex
·
monitor
·
MONSTR
·
Mosaic
·
Motorola 68000
·
mr
·
mu
·
mudhead
·
munching
·
mung
·
Mutation Testing
·
naive
·
name capture
·
nasal demons
·
nastygram
·
netdead
·
.NET framework
·
Network Administrator
·
network management
·
New Storage System
·
noddy
·
noise shaping
·
Nominal Semidestructor
·
non-algorithmic procedure
·
nondeterministic automaton
·
nondeterministic polynomial time
·
Nondeterministic Turing Machine
·
NP-complete
·
NSA line eater
·
Oberon
·
Oberon-V
·
Object-code Buffer Overrun Evaluator
·
Object-Oriented Turing
·
ogg
·
One-Time Password
·
On-Line Analytical Processing
·
ontology
·
Opal
·
OpenBSD
·
OpenInsight
·
open source
·
operational semantics
·
Oracle Co-operative Applications
·
Orange Book
·
OS/390
·
OTP
·
P6
·
padded cell
·
PAP
·
password
·
PCI Configuration Utility
·
P-code
·
PCTE+
·
Pentium Pro
·
Persistent Functional Language
·
Personal Identification Number
·
phacker
·
phreaking
·
PIP
·
plan file
·
Pluggable Authentication Module
·
polynomial-time algorithm
·
PowerPC 601
·
PRECCX
·
precedence lossage
·
precharge
·
pre-sales support rep
·
Pretty Good Privacy
·
Programmable Read-Only Memory
·
Project Guardian
·
Proxy Server
·
PSL/PSA
·
Public-Key Cryptography Standards
·
public-key encryption
·
punt
·
purple wire
·
quality assurance
·
race condition
·
rainbow series
·
Random Access Memory Digital-to-Analog Converter
·
raster
·
Rate monotonic scheduling
·
RC4
·
real number
·
redundancy
·
register allocation
·
register assignment
·
relevance
·
Request For Comments
·
requirements
·
Requirements Engineering
·
Resource Access Control Facility
·
Resource Description Framework
·
RFC 1334
·
RFC 1446
·
RFC 1508
·
RFC 1509
·
RFC 1760
·
RFC 1825
·
RFC 1938
·
RFC 2298
·
RFC 2408
·
Richard Hamming
·
Rigel
·
Riordan' s Internet Privacy Enhanced Mail
·
robot
·
rococo
·
RSA
·
RSA encryption
·
rubi
·
Run Length Limited
·
run time
·
SAID
·
SAINT
·
sample
·
sanity check
·
SASL
·
SATAN
·
Saturday-night special
·
SC/MP
·
scratch monkey
·
screen saver
·
second-system effect
·
Secure Multipurpose Internet Mail Extensions
·
Security Administrator' s Integrated Network Tool
·
Security Association
·
security through obscurity
·
semaphore
·
sendmail
·
Sequential Parlog Machine
·
service
·
session layer
·
SET
·
Seymour Cray
·
shared memory
·
shell
·
Simple Network Management Protocol version 2
·
SIMulation ANalysis
·
single sign-on
·
SkipJack
·
SL
·
Slingshot
·
Smartdrive
·
snark
·
social engineering
·
SOCKS
·
software bloat
·
Somar DumpAcl
·
SORCERER
·
SPEC
·
spiffy
·
spod
·
spyware
·
sr
·
SSLeay
·
Stack Environment Control Dump machine
·
stack puke
·
@stake
·
statistical time division multiplexing
·
steganography
·
Stephen Kleene
·
STFT
·
su
·
SYMPL
·
Syntax/Semantic Language
·
SyQuest Technology, Inc.
·
SYSKEY
·
System Account Manager
·
system chefistration
·
systems programmer
·
T
·
TCB
·
TECO
·
ten-finger interface
·
Test coverage
·
texture
·
The Cuckoo' s Egg
·
theory
·
This time, for sure!
·
Thumb
·
tiger team
·
time bomb
·
time T
·
time zone
·
TL/I
·
TLS
·
TM
·
to a first approximation
·
toasternet
·
TOPS-10
·
tourist
·
tourist information
·
toy language
·
TPS
·
trap-door function
·
troglodyte
·
Trojan horse
·
Turing
·
Turing Machine
·
Turingol
·
Turing Plus
·
Turing tar-pit
·
Turing test
·
turist
·
TZ
·
Uniform Resource Citation
·
Uniform Resource Name
·
Universal Resource Identifier
·
University of Durham
·
Unix conspiracy
·
unwind the stack
·
URL redirection
·
user name
·
USG Unix
·
usr
·
V.34
·
VAL
·
Vannevar Bush
·
VAX
·
Vint Cerf
·
virtual address
·
Virtual Machine
·
Virtual Memory System
·
Virtual Private Network
·
virtual server
·
virus
·
Visual Interface
·
von Neumann architecture
·
wango
·
warchalk
·
wardialer
·
wardriving
·
warez
·
wavelet
·
WDASM
·
Weeble
·
What' s a spline?
·
wheel wars
·
Windows 95
·
Windows NT
·
wireless local area network
·
Wireless Transport Layer Security
·
wizard
·
working set
·
worm
·
wrapper
·
write-only memory
·
WTLS
·
XMODEM
·
Y
·
yoyo mode
·
Z3
·
ZFC
·
Zork
·
ZX-81
[
Return to Free On-line Dictionary of Computing
]
[
Go Back
]
All logos and trademarks in this site are property of their respective owner.
Page Generation in 0.0584 Seconds, with 15 Database-Queries