SQL injection attack
Attacks against a Web site that take advantage
of vulnerabilities in poorly coded SQL (a standard and common
database software application) applications in order to introduce
malicious program code into a company's systems and networks.
star topology
A network topology in which all computers and other
devices are connected to a central host computer. All
communications between network devices must pass through the
host computer.
storage area network (SAN)
A high-speed network dedicated to
storage that connects different kinds of storage devices, such as
tape libraries and disk arrays so they can be shared by multiple
servers.
storage technology
Physical media and software governing the
storage and organization of data for use in an information system.
stored value payment systems
Systems enabling consumers to
make instant on-line payments to merchants and other
individuals based on value stored in a digital account.
Do'stlaringiz bilan baham: |