Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols

b

Acronym(s):

None

Definition(s):

  The width of a KECCAK-p permutation in bits.
Source(s): FIPS 202

  Block size (in bytes) of the input to the Approved hash function.
Source(s): FIPS 198-1

Synonym(s):

None

See Also:
(t + k)-way combination coverage
[a, b]
{, a, b, …}
0xab
64-Bit Intel Itanium Architecture
a || b
a, b, c, …, h
ABAC
Abstract Syntax Notation 1
Abstract Syntax Notation One
Abstract Syntax Notion One
Acceptable
Acceptable Risk
Accountability
Accounting Number
Accreditation Boundary
Accreditation Boundary (C.F.D.)
Active Cyber Defense
Adaptable Antenna Support
Addressable
adj-RIB-In
adj-RIB-Out
Advanced Encryption Standard–Counter With Cbc-Mac
AES-CBC
AES-Cipher Block Chaining
American Registry For Internet Numbers
American Registry Of Internet Numbers
An Object
Anomaly-Based Detection
Application-Based Intrusion Detection And Prevention System
Assembly
Assessment Object
Assessment Objective
Association For Automatic Identification And Mobility
Assurance Of Public Key Validity
Asymptotic Distribution
Attribute
Attribute And Authorization Services Committee
Attribute Authority
Attribute Based Access Control
Attribute Practice Statement
Attribute Protocol
Attribute Value Pair
Attribute-Based Access Control
Attribute-Based Authorization
Attributes
Attribute-Value Pair
Audit And Accountability
Audit And Accountability (NIST SP 800-53 security control family)
Authenticable Entity
Authorization Boundary
Autonomous System Number
Availability
b ≡ a mod n
B2B
BAC
Back Channel
Backdoor
Backhaul
Backscatter Channel
Backtracking Resistance
Backup
Backup (key and/or metadata)
Backup (system)
Backup Facility
Banner
Banner Grabbing
Bare Metal Virtualization
Base Station
Base Station Controller
Base Transceiver Station
Baseline
Baseline Configuration
Baseline Criticality
Baseline Security
Baseline Security Requirement
Baseline Security Requirements
Baselining
Basic Encode Rules
Basic Encoding Rules
Basic Encoding Rules Tag-Length-Value
Basic Input/Output System
Basic Rate
Basic Service Set
Basic Service Set Identifier
Basic Testing
Basis Vector
Bastion Host
Batch Process
BCA
BCD
BCP
BCWP
BCWS
BD
BDB
BDS
Beacon
Bearer Assertion
Behavior Analysis
Behavior Blockers
Behavioral Outcome
Bend
Benign Environment
BER
Bernoulli Random Variable
BER-TLV
BER-TLV Data Object
Best Current Practice
Better Than Nothing Security
BGP
BGP Peer
BGP Session
BGP Speaker
BGP-4
BIA
Biased
Bi-Directional
Binary Coded Decimal
Binary Sequence
Binding
Binding Cache (on HA or CN)
Binding Update
Binding Update Acknowledgement
Binding Update List (on MN)
Binomial Distribution
Biometric
Biometric Data Block
Biometric Information
Biometric Information Template
Biometric Service Provider
Biometrics
BIOS
BIS
Bit
Bit Error
Bit Error Rate
Bit Length
Bit Stream Image
Bit Stream Imaging
Bit String
BITS
Bits Of Security
Bitstring
Bitwise Exclusive-Or
BLACK
Black Box Testing
Black Core
BLACK data
Blacklist
Blacklisting
BLE
Blended Attack
Blinding
Block
Block Cipher
Block Cipher Algorithm
Block Cipher Key
Block Cipher Mode Of Operation
Block Size
BLSR
Blue Team
Bluetooth
Bluetooth Low Energy
Blu-Ray Disc
Body
Body Of Evidence
BoE
Boot Device Selection
Border Gateway Protocol
Border Gateway Protocol 4
Boundary
Boundary Protection
Boundary Protection Device
BPML
BPSS
BR
Bring Your Own Device
BRM
Broad Network Access
Broadcast
Brokered Trust
Browsing
Brute Force Password Attack
BS
BS2I
BSC
BSP
BSS
BSSID
BTNS
BTS
BU
BUA
Budget Cost Of Work Performed
Budget Year
Budgeted Cost Of Work Scheduled
Buffer Overflow
Buffer Overflow Attack
Bulk Encryption
Bump In The API
Bump In The Stack
Business Areas
Business Associate
Business Associate Contract
Business Case Analysis
Business Continuity Plan
Business Impact Analysis
Business Impact Assessment
Business Process Markup Language
Business Process Specification Schema
Business Reference Model
Business-To-Business
BY
BYOD
Byte
Byte String
Byte String To Integer
Bytelen
Call Back
Capability Maturity Model Integration
Card Capability Container
Card Verifiable Certificate
CBC
CBC-MAC
CBEFF
CBSR
CCB
CCRB
CDMA Subscriber Identity Module
CD-Rewritable
CFB
Change Control Board
Channel Binding
Checking Disabled
Cipher Block Chaining
Cipher Block Chaining Message Authentication Code
Cipher Block Chaining-Message Authentication Code
Cipher Feedback
Cipher-based MAC
Cipher-Based Message Authentication Code
Cisco Global Exploiter
CMDB
Code Vocabulary (C.F.D.)
Codebook
Common Biometric Exchange Formats Framework
Common Object Request Broker Architecture
Common Vulnerabilities And Exposures
Common Vulnerabilities Scoring System
Common Vulnerability Enumeration
Common Vulnerability Scoring System
Common Vulnerability Scoring System 2.0
Communications Security Establishment
Communications Security Establishment Of The Government Of Canada
Compact Disc Recordable
Compatible Security Domains
Completely Automated Public Turing Test To Tell Computers And Humans Apart
Component Object Model
Computer Abuse
Computer Incident Advisory Capability
Computer Incident Response Capability
Computer Incident Response Center or Computer Incident Response Capability
Computer Security Incident Response Capability
Computer Security Object (C.F.D.)
Computer Security Objects Register
Computer Security Objects Register (C.F.D.)
Computer Security Objects Registry
Computer Security Subsystem (C.F.D.)
Comsec Assembly (C.F.D.)
Comsec Boundary (C.F.D.)
Configurable
Configuration Baseline
Configuration Control Board
Configuration Control Review Board
Configuration Management Database
Consent Banner
controlled cryptographic item (CCI) assembly
Controlled Variable
Conventional BIOS
CORBA
Cost, Benefit, Schedule, And Risk
Counter Mode For A Block Cipher Algorithm
Counter Mode with Cipher Block Chaining Message Authentication Code
Counter Mode with Cipher Block Chaining Message Authentication Protocol
Counter with Cipher Block Chaining-Message Authentication Code
Counter-Mode/CBC-MAC Protocol
Crl Distribution Point
Cross Domain Baseline List
Cross Domain Capabilities
Cross Domain Enabled
Cryptographic Binding
Cryptographic Boundary
Cryptographic Boundary
Cryptographic Module Boundary
CUI categories or subcategories
Cumulative Distribution Function F(X)
Cyber Attack
Cyber Incident
Cyber Incident Response Team
Cyber Red Team
Cyber Security
Cybersecurity
Cyberspace
Cyberspace Attack
Cyberspace Capability
Cyberspace Defense
Cyberspace Operations
Cyberspace Superiority
Data Access Object
Data Blockblock
Data Encryption Standard Electronic Code Book
Data Object
Database
Database Examine/Modify Utility ((PBX))
Database Management System
Database Server
Database Upload/ Download Utility ((PBX))
Date Of Birth
dBm
DBMS
Decibels Referenced To One Milliwatt
Decision Or Branch Coverage
Defense-In-Breadth
Defensive Cyberspace Operation Response Action
Defensive Cyberspace Operations
Deliverable
Deny By Default
DES-ECB
Deterministic Random Bit Generator
deterministic random number generator
Device Distribution Profile
Diffie-Hellmana Key Establishment Algorithm
Digital Subscriber Line
direct BLACK wireline
Distinguishable Information
Distributed Component Object Model
Distributed Computing Environment
Distributed Control System
Distributed Control System(s)
Distributed Denial Of Service
Distributed denial-of-service attack
Distributed Energy Technology Laboratory
Distributed Intrusion Detection System
Distributed Network Protocol
Distributed Plant
Distributed Transaction Coordinator
Distribution
Distribution System
Disturbance
DNSSEC-Aware Stub Resolver
DOB
Domain-Based Message Authentication, Reporting & Conformance
DRBG
DRBG Mechanism Boundary
DVD-Rewritable
Dynamic Link Library
Dynamic Subsystem
EBGP
eBits
EBTS
e-business
ebXML
ECB
Ecordable
Electrically Erasable Programmable Read-Only Memory
Electromagnetic Compatibility
Electronic Biometric Transmission Specification
Electronic Business (C.F.D.)
Electronic Business Xml
Electronic Code Book
Electronic Codebook
Electronic Serial Number
Electronically Erasable Programmable Read-Only Memory
Electronically-Erasable Programmable Read-Only Memory
Embedded Computer (C.F.D.)
Embedded IPv4 Unicast
Embedded Universal Integrated Circuit Card
Enclave Boundary
Enterprise Subsystem
Erasable Programmable Read-Only Memory
European Article Number
Exercise Briefing
Exploitable Channel
Extendable-Output
Extended Sequence Number
Extended Unique Identifier 64 Bit Addresses
Extensibility
Extensible Access Control Markup Language
Extensible Authentication Protocol
Extensible Authentication Protocol Flexible Authentication Via Secure Tunneling
Extensible Authentication Protocol Over LAN
Extensible Authentication Protocol Over LAN Key Confirmation Key
Extensible Authentication Protocol Over LAN Key Encryption Key
Extensible Authentication Protocol-Transport Layer Security
Extensible Authentication Protocol-Tunneled Transport Layer Security
Extensible Configuration Checklist Description Format
Extensible Configuration Checklist Description Format 1.1.4
Extensible Firmware Interface
Extensible Markup Language
Extensible Mark-Up Language
Extensible Rights Markup Language
Extensible Stylesheet Language Transformation
Exterior Border Gateway Protocol
FBCA
FBCA Operational Authority
FBI
Federal Agency Smart Credential Number
Federal Bridge Certificate Authority
Federal Bridge Certification Authority
Federal Bridge Certification Authority Membrane
Federal Bureau Of Investigation
Federal Communications Commission Identification Number
Federal Information Processing Standards Publications
Federal Information Processing
Standards

Federal Public Key Infrastructure Policy Authority
FIB
Fieldbus
Field-programmable gate array
File Allocation Table
FIPS PUB
FIPS Publication
First Byte Of A Two-Byte Status Word
Flow Label (IPv6 Field)
Focused Observation
Forbidden PLMNs
Forwarding Information Base
Frame Body
Garbled
GB
Gbps
GCD (a, b)
GCD(a, b)
General Accountability Office
Generic Attribute Protocol
Geometric Random Variable
Gigabits Per Second
Gigabyte
GLBA
Global
Global Information Grid
Global Information Grid (C.F.D.)
Global Positioning System
Global Standards One
Global Structure/Global Value
Global System For Mobile Communications
Global Unique Identification Number
Globally Unique Identifier
Government Accountability Office
Government Smart Card Interoperability Specification
Gramm-Leach-Bliley Act
Gray Box Testing
Group Policy Object
GUID Partition Table
Hash-Based Key Derivation Function
Hash-Based Message Authentication Code
Health Information Portability And Accountability Act
Health Insurance Portability And Accountability Act
High Assurance Internet Protocol Encryptor Interoperability Specification
High Availability
Hop-By-Hop Option Header (IPv6 extension header)
Host Vulnerability Scanners
Host-Based Firewall
Host-Based Intrusion Detection And Prevention System
Host-Based Security
Hub
Hybrid Cloud
Hybrid Control
Hybrid Entity
Hybrid Security Control
I2BS
IAB
IA-enabled information technology product
IA-enabled product
IAVB
IBAC
IBC
IBGP
IBSS
ICB
Idaho National Laboratory
Ideal Random Bitstring
Identity Based Access Control
Identity Web Services Framework
Identity, Credential, And Access Management Subcommittee
Identity-Based Access Control
Identity-Based Authentication
Identity-Based Security Policy
IKEv2 Mobility and Multihoming Protocol
Independent Basic Service Set
Individual Accountability
Individually Identifiable Health Information
Industrial Control Systems - Cyber Emergency Response Team
Industrial Security Incident Database
Information Assurance Vulnerability Alert
Information Assurance Vulnerability Bulletin
Information In Identifiable Form
Information System Boundary
Information Systems Security Boundary
Information Technology Infrastructure Library
Information Technology Laboratory
Information Technology Laboratory ((of NIST))
Information Technology Laboratory (NIST)
Initial Counter Block
Input Block
Inspectable Space
Instantiation Of An RBG
Institutional Review Board
Interagency Advisory Board
Inter-Enterprise Subsystem
Internal Border Gateway Protocol
International Mobile Equipment Identity
International Mobile Subscriber Identity
Internet Architecture Board
Internet Assigned Number Authority
Internet Assigned Numbers Authority
Internet Corporation For Assigned Names And Numbers
Interoperability
Interoperability Test
Intrusion Detection System Load Balancer
Investment Review Board
InvSubBytes()
IPsec Web Based Interoperability Tester
IRB
IT Security Basics
IT Security Body of Knowledge Topics and Concepts
IT security objective
Iterated Block Cipher
Job Function
KAS1-basic
KAS2-basic
KAS2-bilateral-confirmation
KB
KBA
kbit/s
KBits
Kbps
KECCAK-f [b]
KECCAK-p[b, nr]
Kerberized Internet Negotiation Of Keys
Kerberos
Key Attribute
Key Bundle
Key Distribution
Key Distribution Center
Key Establishment
Key Generation And Distribution
Key Label
Keyblock Cipher Key
Keyed Hash-Based Message Authentication Code
Key-Establishment
Key-Establishment Key Pair
Key-Establishment Transaction
Kilobit Per Second
Kilobits / Second
Kilobits Per Second
Kilobyte
Knowledge Based Authentication
Knowledge, Skills, And Abilities
Knowledge-based authentication
KTS-KEM-KWS-basic
KTS-OAEP-basic
kwkBits
Label
Labeled Security Protections
Laboratory Attack (C.F.D.)
Land Mobile Radio
Last Mile Broadband Access
Last Numbers Dialed
Latin America And The Caribbean Network Information Centre
Latin American And Caribbean Ip Address Regional Registry
L-bit Hash Function
LCM (a, b)
LCM(a, b)
Learning Objective
Least Significant Bit
Least Significant Bit(s)
Legacy BIOS
Length In Bits Of A Non-Negative Integer X
Length in bytes of a non-negative integer, x
Line Of Business
Linear Feedback Shift Register
Lines Of Business
Linkable Information
Loadable Kernel Module
loc-RIB
Logic Bomb
Logical Backup
Logical Object
Loop-Back Mode
Low Probability Of Detection
Low Probability Of Intercept
Low Probability Of Positioning
LSB
Machine Readable Travel Document
Malicious Cyber Activity
Management Information Base
Manipulated Variable
Master Boot Record
MATLAB
Maximum Allowable Outage
Maximum Tolerable Downtime
MB
Mbps
MBR
MBSA
Media Library
Megabit Per Second
Megabits Per Second
Megabyte
Metaattributes
MIB
Microsoft Baseline Security Analyzer
Microsoft Knowledge Base
min (a, b)
Mission/Business Segment
MOBIKE
Mobile Application Management
Mobile Code
Mobile Code Risk Categories
Mobile Code Technologies
Mobile Data Terminal
Mobile Device
Mobile Device Management
Mobile Devices
Mobile Equipment Identifier
Mobile Ipv4
Mobile Ipv6
Mobile Node
Mobile Prefix Advertisement
Mobile Prefix Solicitation
Mobile Software Agent
Mobile Subscriber
Mobile Subscriber Integrated Services Digital Network
Mobile Switching Center
Mobile Topology
Mobility Header
Mobility Header (IPv6 extension header)
Most Significant Bit
Most Significant Bit(s)
MSB
MSKB
Multi-Hop Problem
Multiprotocol Label Switching
Multi-Releasable
National Cyber Security Division
National Cybersecurity And Communications Integration Center
National Scada Testbed
National Software Reference Library
National Strategy for Trusted Identities in Cyberspace
National Voluntary Laboratory Accreditation Program
National Vulnerabilities Database
National Vulnerability Database
National Vulnerability Databaseformerly Known As I-Cat
Nationwide Public Safety Broadband Network
Nb
NBA
NBAD
nBits
Neighbor Advertisement
Neighbor Discovery
Neighbor Solicitation; Name Server
Neighbor Unreachability Detection
Neighbors
NetBEUI
NetBIOS
Netbios Extended User Interface
NetBIOS over TCP/IP
NetBT
Network Basic Input/Output System
Network Behavior Analysis
Network Behavior Analysis System
Network Behavior Anomaly Detection
Network Vulnerability Scanners
Network-Based Intrusion Detection And PRevention System
Nist Special Publication
Non-Deterministic Random Bit Generator
Non-Deterministic Random Bit Generatornon-Deterministic Rbgnrbg
Non-deterministic RBG
Non-Public Personal Information
Nonvalidating DNSSEC-Aware Stub Resolver
Nonvalidating Stub Resolver
North American Electric Reliability Council
NPSBN
NRBG
NSS baselines
NSTB
Object
Object Identifier
Object Linking And Embedding
Object Linking And Embedding For Process Controlopc
Object Naming Service
Object Reuse
Obligation
Obscured Data
ODBC
OFB
Offensive Cyberspace Operations
Office Of Management And Budget
OMB
On-Card Biometric Comparison
OOB
Open Database Connectivity
Open Vulnerability And Assessment Language
Open Vulnerability And Assessment Language 5.8
Open Vulnerability Assessment Language
Open Web Application Security Project
Operation Card Verifiable
Out Of Band
Out-Of-Band
Output Block
Output Feed Back
Output Feedback
Over-The-Air Key Distribution
Packet Fragmentation And Reassembly
Packet Number
Parity Bit
Parity Bit (C.F.D.)
Password Unblocking Key
Password-Based Key Derivation Function
PBA
PBAC
PBE
PBKDF
PBX
Peer Authorization Database
Performance-Based
Perishable Data
Per-Message Secret Number
Personal Accountability
Personal Identification Number
Personal Identity Verification-Interoperable
Personally Identifiable Information
Pin Unblocking Key
Poisson Distribution
Policy Based Access Control
Portable Data File
Portable Electronic Device
Portable Network Graphics
Portable Storage Device
Pre-Boot Authentication
Pre-Boot Environment
Preboot Execution Environment
Prime Number
Prime Number Generation Seed
Privacy Capability
Private Branch Exchange
Privilege Attribute Certificate
Proactive Cyber Defense
Probabilistic Signature Scheme
Probability Density Function
Probability Distribution
Probability Of Occurrence
Probable Prime
Probative Data
Probe
Probe Request
Probe Response
Programmable Logic Controller
Programmable Read-Only Memory
Proscribed Information
Protected Distribution System
Protected Extensible Authentication Protocol
Protective Distribution System
Provable Prime
Pseudo Random Number Generator
Pseudorandom Number Generator
Pseudo-Random Number Generator
PUB
PubKeyU, PubKeyV
Public Cloud
Public Credentials
Public Domain Software
Public Information
Public Internet Registry
Public Key
Public Key Certificate
Public Key Cryptographic Algorithm
Public Key Cryptographic Algorithm (asymmetric)
Public Key Cryptographic Standards
Public Key Cryptography
Public Key Cryptography Standard
Public Key Enabling
Public Key Infrastructure
Public Key Infrastructure for X.509 Certificates
Public Key/Public Signature Verification Key
Public Law
Public Reviewer
Public Seed
Publication
Public-Key
Public-Key Algorithm
Public-Key Certificate
Public-Key Cryptographic Algorithm
Public-Key Cryptography
Public-Key Cryptography Standards
Public-Key Infrastructure
Public-Key Validation
Qubit
Random Binary Sequence
Random Bit
Random Bit Generator
Random Bit Generator.
Random Number
Random Number Generator
Random Variable
RBAC
RBG
RBG Seed
RDBMS
Recovery Point Objective
Recovery Time Objective
Red Optical Fiber Line
Red Team/Blue Team Approach
RED/BLACK concept
Regenerative Cyber Defense
Regional Computer Forensics Laboratory
Relational Database Management System
Reliability, Maintainability, And Availability
Removable Cover
Removable Media
Removable Media Device
Removable User Identity Module
Repeatability
Reproducibility
Responsibility To Provide
Responsible Individual
Responsible Person
RF Subsystem
RIB
Risk Adaptable Access Control
Risk Adaptiveadaptable Access Control
Risk-Adaptable Access Control
Robust Security Network
Robust Security Network Association
Robust Security Network Information Element
Robustness
Role Based Access Control
Role-Based
Role-Based Access Control
Role-Based Authentication
Roles And Responsibilities
Routing Information Base
Rule-Based Event Correlation
Rule-Based Security Policy
rv[0…b]
SaaS E-mail and Collaboration Solution
Sandbox
Sandboxing
Sandia National Laboratories
Sarbanes-Oxley
Sarbanes-Oxley Act
SBH
S-Box
Scalability
Scalability Testing
SCBA
Scrambling
Second Byte Of A Two-Byte Status Word
Secure Communications Interoperability Protocol Product
Secure Neighbor Discovery
Security Association Database
Security Attribute
Security Authorization Boundary
Security Banner
Security Capability
Security Control Baseline
Security Controls Baseline
Security Label
Security Management Dashboard
Security Objective
Security Objectives
Security Policy Database
Security Requirements Baseline
Security Requirements Traceability Matrix
Security Tool Distribution
select (V, a, b)
Self-Contained Breathing Apparatus
Semantic Web Services Architecture
Semiblock
Semiblock String
Server Message Block
Setting The Bar
Signature Block Header
Signature Scheme With Appendix - Probabilistic Signature Schemersassa-Pss
Signature-Based Detection
Simple Object Access Protocol
Simple Object Access Protocol (originally)
Simple t -way combination coverage
Single-Hop Problem
Site Multihoming By Ipv6 Intermediation
Smart Card Enabled Physical Access Control System
SMB
Social Security Number
Software Debugger/ Update Utility ((PBX))
Software Vulnerability
Special Publication
Special Publication (NIST)
Strongly Bound Credentials
Structured Product Labeling
Subaccount
Subassembly
SubBytes()
Subdirectory
Sub-Functions
Sub-Hand Receipt
Subject
Subject Certification Authority
Subject Matter Expert
Subkey
Subkey Generation
Subordinate CA
Subordinate Certificate Authority
Subscriber
Subscriber Identity Module
Subscriber Station
Subsystem
SubWord()
Suite B
Suite B Compatible
Syllabary (C.F.D.)
System Or Subsystem Under Test
Systems Security Engineering - Capability Maturity Model®
Tabletop Exercise
Tailored Security Control Baseline
Target Vulnerability Validation Techniques
TB
TbitLen(X)
TCB
TDEA Electronic Codebook
TECB
Technical Review Board
Technical Vulnerability Information
Terabytes
Testability
The Biometrics Standardization Subcommittee Under Iso/Iec Joint Technical Committee
Time Bomb
TMacTagBits(X)
Traceable
Transfer Of Accountability
TRB
Treasury Agency Symbol
Trusted Computing Base
Tunnel-Based Eap Method
UBR
Ultra Wideband
Ultrawideband
UMTS Subscriber Identity Module
Unbiased
Unbiased Bit
Unified Extensible Firmware Interface
Uninterruptable Power Supply
Uninterruptible Power Supply
United Nations Centre For Trade Facilitation And Electronic Business
United States Government Configuration Baseline
Universal Business Registry
Universal Mobile Telecommunications System
Universal Serial Bus
Unlinkability
Unobservability
Unpredictable
USB
USGCB
UWB
Variable Frequency Drive
Variable-Value Configuration
Variable-Value Configuration Coverage
VB
VB.NET
VBS
VBScript
Virtual Mobile Infrastructure
Visibility
Visual Basic
Visual Basic For .Net
Visual Basic Script
Vulnerability
Vulnerability Analysis
Vulnerability Assessment
Vulnerability Naming Scheme
Vulnerability Scanning
WBS
Weakly Bound Credentials
Web Browser
Web Bug
Web Content Filtering Software
Web Distributed Authoring And Versioning
Web Ontology Language For Web Services
Web Portal
Web Server
Web Server Administrator
Web Service
Web Service Interoperability Basic Profile
Web Services
Web Services Description Language
Web Services Interoperability
Web Services Security
Web Services Security For Java
WebDAV
Webmaster
White Box Testing
Wireless Bridge
Wireless Vulnerabilities And Exploits
Work Breakdown Structure
World Wide Web Consortium
Worldwide Interoperability For Microwave Access
Write-Blocker
X.509 public key certificate
X.509 public-key certificate
XCBC
XOR Cipher Block Chaining