Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
w
W3C
WAN
WAP
Warm Site
Watering Hole Attack
Wavelet Scalar Quantization
WAYF
WBS
Weakly Bound Credentials
Weapons System
Web Browser
Web Bug
Web Content Filtering Software
Web Distributed Authoring And Versioning
Web Ontology Language For Web Services
Web Portal
Web Server
Web Server Administrator
Web Service
Web Service Interoperability Basic Profile
Web Services
Web Services Description Language
Web Services Interoperability
Web Services Security
Web Services Security For Java
WebDAV
Webmaster
Weight
Well Known X.500 Directory
Well-Formed
WEP
WEP Key
Whaling
Where Are You From?
White Box Testing
White List
White Team
Whitelist
Whitelisting
Whitelisting Programs
Whole Disk Encryption
Wide Area Network
WIDPS
WIDS
Width
WiFi
Wi-Fi
Wi-Fi Multimedia
Wi-Fi Protected Access
Wi-Fi Protected Access Version 2
wi-fi protected access-2
WiMAX
Windows NT File System
Windows Server Update Services
Windows Update Services
Wiping
Wired Equivalent Privacy
Wired Equivalent Privacy Key
Wireless Access Point
Wireless Application Protocol
Wireless Bridge
Wireless Device
Wireless Fidelity
Wireless Intrusion Detection And PRevention System
Wireless Intrusion Detection System
Wireless Local Area Network
Wireless Metropolitan Area Network
Wireless Networking
Wireless Personal Area Network
Wireless Station
Wireless Technology
Wireless Vulnerabilities And Exploits
Wireless Wide Area Network
Witness
WLAN
WMAN
WMM
Word
Work
Work Breakdown Structure
Work Factor
Workcraft Identify
Working State
Workstation
World Wide Web Consortium
Worldwide Interoperability For Microwave Access
Worm
WPA
WPA WiFi
WPA2
WPAN
Wrapping Function
Write
Write Once, Read Many
Write Protection
Write-Blocker
Write-Once Read Many
WS
WSDL
WS-I
WSQ
WSS4J
WS-Security
WSUS
Wt
WUS
WVE
WWAN