career or certification training by format and location.
ransport Layer Security. A layer providing encryption and authentication services that can be negotiated during the startup phase of many Internet protocols (eg SMTP, LDAP, IMAP, POP3).
is a password that is difficult to detect by humans and computer programs. A strong password consists of at least six characters including a combination of upper and lower case letters, numbers and symbols.
computer software that obtains information from a user's computer without the user's knowledge or consent

s
oftware that monitor activities over the network (private or public).
Server Side Include; Supplemental Security Income
(Running Status Table). An optional DVB SI table that contains data on the current program.

pu
blic-key cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. Unlike symmetric key algorithms, it does not require a secure initial exchange of one or more secret keys to both sender and receiver.
A Private Key is (1) the key of a signature key pair used to create a digital signature or (2) the key of an encryption key pair used to decrypt confidential information. In both cases, this key must be kept secret.
Keylogger is a device or program that captures activities from an input device. Malicious people can make use of keyloggers to capture personal information being input into a computer system.
Eine externe (Netzwerk- oder Hardware-) Firewall (von engl. firewall [] „die Brandmauer“) stellt eine kontrollierte Verbindung zwischen zwei Netzen her. Das könnten z. B.
common usage, a hacker is a person who breaks into computers, usually by gaining access to administrative controls. The subculture that has evolved around hackers is often referred to as the computer underground.
a brute force attack is a strategy used to break the encryption of data. It involves traversing the search space of possible keys until the correct key is found.
A browser hijacker is a form of malware or spyware that replaces the existing internet browser home page, error page, or search page with its own. These are generally used to force hits to a particular website.
employment at home while communicating with the workplace by phone or fax or modem
Education that occurs online via computer.
A remote keyless system is a system designed to remotely permit or deny access to premises or automobiles This system was invented by mechanical engineer A.B. Makkar. There are several RKE systems on the market, including but not limited to KeeLoq by Microchip, HITAG by Philips, and AVR411 by Atmel.
Electronic commerce, commonly known as (electronic marketing) e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks.
Electronic money (also known as e-currency, e-money, electronic cash, electronic currency, digital money, digital cash or digital currency) refers to money or scrip which is exchanged only electronically.
Critical thinking involves determining the meaning and significance of what is observed or expressed, or, concerning a given inference or argument, determining whether there is adequate justification to accept the conclusion as true.
Denotes online communication between business entities and government.
Business-to-consumer (B2C, sometimes also called Business-to-Customer) describes activities of businesses serving end consumers with products and/or services.
Business-to-business (B2B) describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer. Contrasting terms are business-to-consumer (B2C) and business-to-government (B2G).
The term wildcard character has the following meanings: In telecommunications, a wildcard character is a character that may be substituted for any of a defined subset of all possible characters.
A wiki ( ) is a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text editor.
A trademark or trade mark is a distinctive sign or indicator used by an individual, business organization, or other legal entity to identify that the products or services to consumers with which the trademark appears originate from a unique source, and to distinguish its products or services

u
se the same Annotea framework to create and maintain cooperative community indices grouping Web documents
A search engine is an information retrieval system designed to help find information stored on a computer system. The search results are usually presented in a list and are commonly called hits.
ervice can provide suggestions for more than 90% of search
he public domain is an intellectual property designation for the range of content that is not owned or controlled by anyone. These materials are public property, and available for anyone to use freely (the "right to copy") for any purpose.
A podcatcher, or podcast client is a computer program used to download various media via an rss or xml feed.
piece of writing that has been copied from someone else and is presented as being your own work
A search engine may provide an option to search a set of words as a phrase, either by typing in quotation marks (""), by using a command, or by clicking a button.
P2P (Peer-To-Peer) is a way of networking computers over the internet so they can exchange files directly. P2P became more widely known through the use of filesharing systems and applications such as the original Napster and Kazaa in the late 1990s and early 2000s.
A web feed (or news feed) is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed, thereby allowing users to subscribe to it.
his is a listing of common symbols found within all branches of mathematics. Each symbol is listed in both HTML, which depends on appropriate fonts to be installed, and in , as an image.
A link exchange is a confederation of websites that operates similarly to a web ring. Webmasters register their web sites with a central organization, that runs the exchange, and in turn receive from the exchange HTML code which they insert into their web pages.
false and malicious publication printed for the purpose of defaming a living person
An index term, subject term, subject heading, or descriptor, in information retrieval, is a term that captures the essence of the topic of a document. Index terms make up a controlled vocabulary for use in bibliographic records.
index - a numerical scale used to compare variables with one another or with some reference number
is a commonly-used protocol for managing the security of a message transmission on the Internet
Attack of the Show! (commonly referred to as AOTS) is an American live television program shown weeknights on G4, G4 Tech TV in Canada and Fuel TV in Australia. The program is hosted by Kevin Pereira and Olivia Munn. Attack of the Show!
Directory - In computer software, specifically the command line interface of the OpenVMS operating system, the DIRECTORY command (often abbreviated as DIR) is used to list the files inside a directory. It is analogous to the DOS dir and Unix ls commands.
Copyright is the set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work. These rights can be licensed, transferred and/or assigned.

b
oolean is a logic system. Using the "AND" operator between terms retrieves documents containing both terms. "OR" retrieves documents containing either term. "NOT" excludes the retrieval of terms from your search. Use "NOT" with caution.
ead, write, or edit a shared on-line journal
Wiki software (also known as a wiki engine or wiki application) is software that runs a wiki, or a website that allows users to collaboratively create and edit web pages using a web browser. A wiki system is usually a web application that runs on one or more web servers.
In software engineering, a web application is an application that is accessed via a web browser over a network such as the Internet or an intranet.
A website (also spelled Web site) is a collection of related web pages, images, videos or other digital assets that are addressed relative to a common Uniform Resource Locator (URL), often consisting of only the domain name, or the IP address, and the root path ('/') in an Internet Protocol
Web caching is the caching of web documents (e.g., HTML pages, images) to reduce bandwidth usage, server load, and perceived lag. A web cache stores copies of documents passing through it; subsequent requests may be satisfied from the cache if certain conditions are met.
the term "Web 2.0" (2004-present) is commonly associated with web applications that facilitate interactive information sharing, interoperability, user-centered design, and collaboration on the World Wide Web.
the address of a web page on the world wide web
A social network service focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities.