User:Mca12/Books/MC Encyclopedia

Good to know

 * Computer Science
 * Big data
 * Cloaking
 * Create, read, update and delete
 * Data scraping
 * DevOps
 * Portable Executable
 * Regular expression
 * Shim (computing)
 * Software-defined data center
 * Software-defined storage
 * Software versioning
 * Universally unique identifier


 * Programming
 * Base64
 * Eclipse (software)
 * Git (software)
 * JavaScript
 * JQuery
 * JSON
 * Lua (programming language)
 * Node.js
 * Pastebin
 * Perl Compatible Regular Expressions
 * Protocol Buffers
 * Punycode
 * Python (programming language)
 * Ruby (programming language)
 * Scrum (software development)
 * Wheel (Unix term)


 * Networking
 * 6in4
 * Bandwidth throttling
 * DHCPv6
 * Direct Client-to-Client
 * DNS-based Authentication of Named Entities
 * DNS Sinkhole
 * Domain Name System Security Extensions
 * Extension mechanisms for DNS
 * Generic Routing Encapsulation
 * Google Public DNS
 * Interactive Connectivity Establishment
 * Internet Relay Chat
 * IP Flow Information Export
 * IPv6
 * IPv6 address
 * List of DNS record types
 * List of TCP and UDP port numbers
 * Looking Glass server
 * Neighbor Discovery Protocol
 * NetFlow
 * Network Functions Virtualization
 * OpenFlow
 * Pcap
 * QUIC
 * Real Time Messaging Protocol
 * Real Time Streaming Protocol
 * Real-time Transport Protocol
 * Rich Communication Services
 * Route analytics
 * Simple Network Management Protocol
 * Simple Service Discovery Protocol
 * Software-defined networking
 * STUN
 * TCP Fast Open
 * Teredo tunneling
 * Traversal Using Relays around NAT
 * Tunneling protocol
 * Universal Plug and Play
 * Wireshark


 * HTTP/HTML/Web
 * Akamai Technologies
 * Content delivery network
 * Do Not Track
 * Hypertext Transfer Protocol
 * HTTP 2.0
 * HTTP cookie
 * HTTP ETag
 * Pingback
 * Polyfill
 * SPDY
 * Steam (software)
 * Web bug
 * WebRTC


 * Exploits/Malware
 * Blackhole exploit kit
 * Botnet
 * Cross-site request forgery
 * Cross-site scripting
 * Domain Generation Algorithm
 * Dropper (malware)
 * Exploit (computer security)
 * Fast flux
 * Fraggle attack
 * Heap spraying
 * HTTP tunnel
 * ICMP tunnel
 * Kali Linux
 * Malware
 * NSTX
 * Null session
 * Pharming
 * Phishing
 * Shellcode
 * Shodan (website)
 * SMS phishing
 * Smurf attack
 * Vulnerability (computing)
 * Windows Metafile vulnerability
 * Zero-day attack


 * APT
 * Advanced persistent threat
 * Cyberweapon
 * Duqu
 * Flame (malware)
 * Stuxnet
 * Wiper (malware)


 * Cyber Defence
 * Computer network operations
 * Cyberwarfare
 * Proactive Cyber Defence
 * Tallinn Manual


 * Information Security
 * Anonymizer
 * Business continuity planning
 * Computer forensics
 * Content Security Policy
 * CVSS
 * Data Execution Prevention
 * Data loss prevention software
 * Digital forensics
 * Disaster recovery plan
 * EICAR test file
 * Indicator of compromise
 * Information security
 * Memory protection
 * Microsoft-specific exception handling mechanisms
 * Network Behavior Anomaly Detection
 * Network forensics
 * Security Content Automation Protocol
 * Security information and event management
 * Sender Policy Framework
 * Taint checking
 * Unified threat management


 * Cryptography
 * Cryptographic nonce
 * Kerberos (protocol)
 * Perfect forward secrecy
 * Off-the-Record Messaging
 * OAuth
 * Online Certificate Status Protocol
 * Salt (cryptography)
 * Transport Layer Security


 * Reverse Engineering
 * Address space layout randomization
 * NOP slide
 * Obfuscation (software)
 * Return-oriented programming
 * X86 calling conventions