User:Platinum713/Books/Telecommunications

Telecommunications

 * Telecom Act of 1996
 * 003 (UN M.49 code)
 * 360 Safeguard
 * 3G-324M
 * 9P
 * ACARM-ng
 * Ad Hoc Configuration Protocol
 * Administrative division codes of the People's Republic of China
 * Administrative domain
 * Advanced Message Queuing Protocol
 * AEGIS SecureConnect
 * Aggregate Level Simulation Protocol
 * Airport code
 * Amateur radio satellite
 * Anomaly-based intrusion detection system
 * Anti-pharming
 * Anti-worm
 * Apache Avro
 * Apache Thrift
 * Application layer
 * Application-level gateway
 * Architecture for Control Networks
 * Armitage (computing)
 * ARP spoofing
 * ARPA Host Name Server Protocol
 * ArpON
 * Asprox botnet
 * Attack tree
 * Authenticated Identity Body
 * Authentication server
 * Bagle (computer worm)
 * BartVPN
 * Bastion host
 * BC Geographical Names
 * BitTorrent
 * BitTorrent tracker
 * Black hole (networking)
 * Blacker (security)
 * Boot Service Discovery Protocol
 * Botnet
 * BredoLab botnet
 * Browser security
 * Byzantine Foothold
 * C-squares
 * Call Admission Control
 * CAMEL Application Part
 * Captive portal
 * Capture the flag
 * CCSO Nameserver
 * Chapman code
 * Character Generator Protocol
 * Check Point GO
 * Check Point VPN-1
 * CimTrak
 * Cipher suite
 * Cisco Global Exploiter
 * Cisco PIX
 * Cisco Security Agent
 * Cisco Systems VPN Client
 * Classification of objects of the administrative-territorial system of Ukraine
 * Clear channel assessment attack
 * Client Puzzle Protocol
 * Client–server model
 * CLLI code
 * Cloudvpn
 * Communications satellite
 * Community Identification Number
 * Computer security
 * Context-based access control
 * ContraVirus
 * Countermeasure (computer)
 * Country code
 * Cracking of wireless networks
 * CubeSat
 * Cutwail botnet
 * CVSS
 * Cyber security and countermeasure
 * CyberCIEGE
 * D-Bus
 * Daytime Protocol
 * DDoS mitigation
 * Deep content inspection
 * Deep packet inspection
 * Defense in depth (computing)
 * Device fingerprint
 * DHCP snooping
 * DHCPv6
 * DHIPDS
 * DICOM
 * Differentiated security
 * Digital Postmarks
 * Direct Save Protocol
 * Directory Access Protocol
 * Discard Protocol
 * Distributed Codec Engine
 * Distributed Data Protocol
 * Distributed firewall
 * Distributed Interactive Simulation
 * Distributed Social Networking Protocol
 * Distributed Universal Number Discovery
 * DMZ (computing)
 * Domain Name System
 * Donbot botnet
 * Dual-homed
 * Dynamic Host Configuration Protocol
 * E2eTechnology
 * EAIF
 * Earth observation satellite
 * Echo Protocol
 * EGL (API)
 * Egress filtering
 * End node problem
 * Etch (protocol)
 * Evil bit
 * Extranet
 * Fail2ban
 * Fake AP
 * Faraday tent
 * Federal Geographic Data Committee
 * Federal Information Processing Standard state code
 * Festi botnet
 * File Access Listener
 * File Transfer Protocol
 * Financial Information eXchange
 * Firewalk (computing)
 * Firewall (computing)
 * Firewall pinhole
 * Firewalls and Internet Security
 * Forward-confirmed reverse DNS
 * FTAM
 * FTP servlet
 * FTPS
 * Gazetteer of Australia
 * Generalized TTL security mechanism
 * Geo URI
 * Geo-imputation
 * Geocoding
 * Geographic coordinate system
 * Geographic Names Information System
 * Geographical Names Board of Canada
 * Geohash
 * Geohash-36
 * GeoNames
 * GEOnet Names Server
 * Geoparsing
 * GeoSMS
 * Geotagging
 * Global Telecoms Exploitation
 * Gnutella
 * Google Safe Browsing
 * Gopher (protocol)
 * Greynet
 * Grid (spatial index)
 * Grum botnet
 * Guided tour puzzle protocol
 * Gumblar
 * H.248
 * H.323
 * Hacker (computer security)
 * High-Tech Bridge
 * Hole punching
 * Honeyd
 * HoneyMonkey
 * Honeynet Project
 * Honeypot (computing)
 * Honeytoken
 * Hookflash
 * Host Identity Protocol
 * HTTP 2.0
 * HTTP body data
 * Hyper geocode
 * Hyper Text Coffee Pot Control Protocol
 * Hypertext Transfer Protocol
 * IBM Advanced Program-to-Program Communication
 * ICMP hole punching
 * Identity driven networking
 * IEC 62351
 * IEEE 802.1X
 * IF-MAP
 * INAP
 * Ingress filtering
 * Integrated Windows Authentication
 * Inter-Asterisk eXchange
 * Inter-protocol exploitation
 * International Air Transport Association airport code
 * Internet
 * Internet Communications Engine
 * Internet Message Access Protocol
 * Internet Open Trading Protocol
 * Internet Relay Chat
 * IntruShield
 * Intrusion prevention system
 * IPFilter
 * Ipfirewall
 * IpTTY
 * ISCSI
 * ISCSI Boot Firmware Table
 * ISDN User Part
 * ISP redirect page
 * Java Naming and Directory Interface
 * Java Remote Method Protocol
 * Jingle (protocol)
 * KAME project
 * Kaspersky Anti-Virus
 * Kelihos botnet
 * Kerberos (protocol)
 * Kerio Control
 * Key distribution center
 * Key ring file
 * Knowledge-based authentication
 * Kraken botnet
 * Lethic botnet
 * Lightweight Directory Access Protocol
 * Link-local Multicast Name Resolution
 * List of cyber attack threat trends
 * List of geocoding systems
 * List of IATA-indexed railway stations
 * List of postal codes
 * List of products that support SMB
 * List of SIP request methods
 * List of SIP response codes
 * List of telecommunications encryption terms
 * List of web service protocols
 * Lorcon
 * M0n0wall
 * MAC flooding
 * Mail Transfer Protocol
 * Man-in-the-middle attack
 * Man-on-the-side attack
 * Managed security service
 * Managed VoIP Service
 * Mariposa botnet
 * Marsden square
 * Media Gateway Control Protocol
 * Media Gateway Control Protocol architecture
 * Media Resource Control Protocol
 * Mega-D botnet
 * Message Oriented Text Interchange Systems
 * Message send protocol
 * Message Session Relay Protocol
 * Messaging security
 * Metasploit Project
 * Metulji botnet
 * Microsoft Media Server
 * Microsoft SmartScreen
 * Middlebox
 * Military satellite
 * MIME
 * MIMIC Simulator
 * MiNET
 * Miredo
 * MMS Architecture
 * Mobile Application Part
 * Mobile virtual private network
 * Monoculture (computer science)
 * Mosh (software)
 * MQ Telemetry Transport
 * Multicast DNS
 * MySecureCyberspace
 * NAT traversal
 * National Cyber Range
 * National Information Standards Organization Circulation Interchange Protocol
 * National Strategy for Trusted Identities in Cyberspace
 * National Transportation Communications for Intelligent Transportation System Protocol
 * Natural Area Code
 * Net-SNMP
 * NETCONF
 * Netsniff-ng
 * NetStumbler
 * Network Access Control
 * Network Admission Control
 * Network Based Application Recognition
 * Network encryption cracking
 * Network File System
 * Network intelligence
 * Network Interface Layer Security
 * Network intrusion detection system
 * Network News Transfer Protocol
 * Network security
 * Network security policy
 * Network Security Toolkit
 * Network Time Protocol
 * Network Voice Protocol
 * Network-based Call Signaling
 * Nfront security
 * NIST RBAC model
 * Nitol botnet
 * Nomenclature of Territorial Units for Statistics
 * NT LAN Manager
 * Null session
 * OCML
 * OFTP
 * OKATO
 * ONS coding system
 * Open Control Architecture
 * Open Phone Abstraction Library
 * Open proxy
 * Open Settlement Protocol
 * OpenConnect
 * OpenVPN
 * Operation Cyber Condition Zebra
 * Operation: Bot Roast
 * OSSEC
 * Outbound content compliance
 * OWASP
 * Packet analyzer
 * Packet capture appliance
 * Packet Storm
 * PacketFence
 * Pass the hash
 * Password length parameter
 * Penetration test
 * People Finder Interchange Format
 * Persistent Shared Object Model
 * Personal firewall
 * Phoning home
 * Phreaking
 * Populated place
 * Port forwarding
 * Port knocking
 * Port triggering
 * Portal:Telecommunication
 * POSITIF (project)
 * Precision Time Protocol
 * Prelude Hybrid IDS
 * Protected computer
 * Proxy list
 * Pseudoserver
 * QDGC
 * QOTD
 * Qwest
 * RADIUS
 * RadSec
 * Real Data Transport
 * Real Time Streaming Protocol
 * Real-time adaptive security
 * Real-time Transport Protocol
 * Realtek Remote Control Protocol
 * Reconnaissance satellite
 * Registration, Admission and Status
 * Remote Desktop Protocol
 * Remote procedure call
 * Reverse geocoding
 * RF shielding of buildings
 * RF shielding paint
 * RFB protocol
 * Robust random early detection
 * Rogue access point
 * Rogue DHCP
 * Rtelnet
 * RTP audio video profile
 * RTP Control Protocol
 * Rustock botnet
 * RVU protocol
 * Safe@Office
 * Sality
 * Same-origin policy
 * Science DMZ Network Architecture
 * Screened-subnet firewall
 * Screening router
 * SDEP
 * Secure Password Authentication
 * Secure Service Network
 * Secure Shell
 * Security Attribute Modulation Protocol
 * Security controls
 * Security Protocols Open Repository
 * Security service (telecommunication)
 * Security Task Manager
 * Semantic URL attack
 * Server Message Block
 * Server Routing Protocol
 * Service discovery
 * Service layer
 * Service scan
 * Session hijacking
 * Session Initiation Protocol
 * Sguil
 * Shared Dictionary Compression Over HTTP
 * Shared resource
 * Shell shoveling
 * Signaling Compression
 * SIMPLE
 * SIMPLE (military communications protocol)
 * Simple Gateway Control Protocol
 * Simple Mail Transfer Protocol
 * Simple Network Management Protocol
 * Simple Sensor Interface protocol
 * Simple Symmetric Transport Protocol
 * Simple Update Protocol
 * SIP Trunking
 * Skinny Call Control Protocol
 * Skype protocol
 * Slenfbot
 * Smart card management system
 * SOAP
 * SoftEther VPN
 * Software Upgrade Protocol
 * SPDY
 * SPICE (protocol)
 * Split tunneling
 * Spoofing attack
 * Spyware
 * Srizbi botnet
 * SSL-Explorer
 * SSL-Explorer: Community Edition
 * Standard Geographical Classification code (Canada)
 * Standard Interchange Format
 * Stateful firewall
 * Stealth wallpaper
 * Stepping stone (computer security)
 * Storm botnet
 * Streaming Text Oriented Messaging Protocol
 * StrongSwan
 * STUN
 * Sybil attack
 * SYN cookies
 * T.37
 * T.38
 * Tabular Data Stream
 * TACACS
 * TACLANE
 * Tarpit (networking)
 * TCP Cookie Transactions
 * TCP Gender Changer
 * TCP hole punching
 * TCP reset attack
 * Tcpcrypt
 * TDL-4
 * Telecommunications Act of 1996
 * Telnet
 * Threat (computer)
 * Threenix
 * Ticket (IT security)
 * Time Protocol
 * TimeML
 * Timestamping (computing)
 * Transaction verification
 * Transport Layer Security
 * Transverse Mercator projection
 * Transverse Mercator: Bowring series
 * Transverse Mercator: Redfearn series
 * Traversal Using Relays around NAT
 * Trusted Network Connect
 * Trusted path
 * UBIGEO
 * UDP hole punching
 * UN M.49
 * UN/LOCODE
 * Unified threat management
 * Unique Feature Identifier
 * UNIStim
 * United States Board on Geographic Names
 * User:Awesomekatrina/3
 * User:Dbabbitt/Sandbox/Draft Distributed Autonomous Organization Article
 * User:Timtempleton/sandbox
 * UT-VPN
 * Variant object
 * Verisys
 * Video Acceleration API
 * Virtual private network
 * Virtual private server
 * Virut
 * VLAN hopping
 * VPN-1 VSX NGX
 * VPNBook
 * Vulnerability management
 * VyOS
 * W3af
 * Waledac botnet
 * Warchalking
 * Wardriving
 * Warflying
 * WarVOX
 * Warzapping
 * Web application security
 * Web application security scanner
 * Web threat
 * WebNFS
 * WebScarab
 * WebSocket
 * Wi-Fi Protected Access
 * Wire protocol
 * Wireless Communications Transfer Protocol
 * World Meteorological Organization squares
 * X Image Extension
 * X video extension
 * X Window System
 * X Window System protocols and architecture
 * X-Video Bitstream Acceleration
 * X-Video Motion Compensation
 * X.400
 * X.500
 * XML
 * XML Configuration Access Protocol
 * XMPP
 * Z39.50