User:Rkadchitre/Books/KnowledgeRK
Appearance
The Wikimedia Foundation's book rendering service has been withdrawn. Please upload your Wikipedia book to one of the external rendering services. |
You can still create and edit a book design using the Book Creator and upload it to an external rendering service:
|
This user book is a user-generated collection of Wikipedia articles that can be easily saved, rendered electronically, and ordered as a printed book. If you are the creator of this book and need help, see Help:Books (general tips) and WikiProject Wikipedia-Books (questions and assistance). Edit this book: Book Creator · Wikitext Order a printed copy from: PediaPress [ About ] [ Advanced ] [ FAQ ] [ Feedback ] [ Help ] [ WikiProject ] [ Recent Changes ] |
Knowledge
[edit]- .NET Framework
- 1G
- 2014 Russian hacker password theft
- 2G
- 32-bit computing
- 3D television
- 3G
- 4G
- 4G-LTE filter
- 5G
- 64-bit computing
- Aaron Swartz
- Abductive reasoning
- Accelerometer
- Adamantium
- Address Resolution Protocol
- AdMob
- Adobe Flash
- AdSense
- Advanced Network and Services
- Age of the universe
- Ajax (programming)
- Albert Einstein
- ALGOL
- Alloy
- Alpha particle
- Amancio Ortega Gaona
- Amateur radio
- Amazon.com
- Amplitude modulation
- Analogy
- Analytical chemistry
- Ancient Greek
- Android (operating system)
- Android Lollipop
- Android software development
- Android Wear
- Anonymous (group)
- Anti-pattern
- Antioxidant
- Antivirus software
- AOL
- Apache HBase
- Apache License
- APL (programming language)
- App Inventor for Android
- App Store (iOS)
- Apple Inc.
- Applied mechanics
- Arcade game
- Argument
- ARM architecture
- Artificial intelligence
- ASCII
- ASP.NET
- ASP.NET MVC Framework
- Assembly language
- Asynchronous Transfer Mode
- Attenuation
- Audio forensics
- Augmented reality
- Authentication
- Autopsy (software)
- Autostereoscopy
- Backdoor (computing)
- Band gap
- Bandwidth (computing)
- Base station
- Base station subsystem
- Base64
- Bash (Unix shell)
- BASIC
- BCS theory
- Beaumont–Adams revolver
- Bernard Arnault
- Bhagavad Gita
- Bible
- Big Bang
- Bill & Melinda Gates Foundation
- Bill Gates
- Billion laughs
- BitLocker
- BitTorrent
- Bjarne Stroustrup
- Black hole
- BlackBerry 10
- Bloodstain pattern analysis
- Blu-ray Disc
- BlueHat
- Bluetooth
- Body identification
- Boot sector
- Booting
- Boring (manufacturing)
- Botnet
- Branch (computer science)
- British Bull Dog revolver
- Browser Object Model
- Browser security
- Buffer over-read
- Buffer overflow
- Bureau of Indian Standards
- Business magnate
- C (programming language)
- C (programming language)
- C++
- Cable jetting
- Cable television
- CAN bus
- Capacitor
- Capsa
- Carlos Slim
- Carna botnet
- Cascading Style Sheets
- CD-ROM
- Cell relay
- Cellular frequencies
- Cellular network
- Cellular repeater
- Censorship
- CERN
- CERT Coordination Center
- Certification marks in India
- Chaos Computer Club
- Chemical element
- Chief executive officer
- Chrome OS
- Chromecast
- Chromosome
- Chronology of the universe
- Chroot
- Circuit design
- Circuit switching
- Clickjacking
- Cloud computing
- Cmd.exe
- CNN
- CNO cycle
- Coaxial cable
- Cocaine
- Cocoa Touch
- Code injection
- Common sense
- Common Vulnerabilities and Exposures
- Comparison of boot loaders
- Comparison of C Sharp and Java
- Comparison of command shells
- Comparison of computer viruses
- Comparison of cryptographic hash functions
- Comparison of layout engines (HTML5)
- Comparison of operating system kernels
- Comparison of programming languages
- Comparison of programming languages (array)
- Comparison of programming languages (basic instructions)
- Comparison of programming languages (strings)
- Comparison of programming languages (syntax)
- Compiler
- Complex metallic alloys
- Computational criminology
- Computer and network surveillance
- Computer architecture
- Computer crime
- Computer engineering
- Computer forensics
- Computer network
- Computer security
- Computer virus
- Computer worm
- Conficker
- Confused deputy problem
- Connection-oriented communication
- Connection-oriented communication
- Connectionless communication
- Control flow
- Core network
- Counterinduction
- CPU cache
- Cracking of wireless networks
- Crime
- Crime lab
- Crimeware
- Criticism of Microsoft
- Criticism of Windows XP
- Cross-platform
- Cross-site request forgery
- Cross-site scripting
- Cross-zone scripting
- Cryptanalysis
- Cryptographic hash function
- Cryptovirology
- Cult of the Dead Cow
- CVSS
- Cyber spying
- Cyber Storm Exercise
- Cyberterrorism
- Cyberwarfare
- Dangling pointer
- Data corruption
- Data Execution Prevention
- Data integrity
- Data validation
- Database forensics
- Dazzler (weapon)
- Decocidio
- Deductive reasoning
- DEF CON
- Defensive programming
- Dempster–Shafer theory
- Denial-of-service attack
- Dennis Ritchie
- Derp (hacker group)
- Detection of fire accelerants
- Device driver
- Digital electronics
- Digital forensics
- Digital rights management
- Digital subscriber line
- Direct manipulation interface
- Directory traversal attack
- Disassembler
- Disk enclosure
- DNA
- DNA nanotechnology
- DNA profiling
- DNA repair
- DNA sequencing
- DNA-encoded chemical library
- DNS hijacking
- DNS spoofing
- Document Object Model
- Domain Name System
- DoubleClick
- Drill
- Dual mode mobile
- Dual SIM
- DVD
- Dynamic Host Configuration Protocol
- Dynamic-link library
- Dynamical system
- EarthLink
- Eavesdropping
- EFI System partition
- Electrical conductor
- Electron
- Email injection
- Emergency Management Services
- Encapsulation (networking)
- End-to-end principle
- Endianness
- Endoscopy
- Engineering
- Enhanced Data Rates for GSM Evolution
- Ericsson
- Ethernet
- Evaluation strategy
- Exclusive or
- Executable
- Exploit (computer security)
- F Sharp (programming language)
- Femtocell
- Fiber laser
- Fiddler (software)
- File Allocation Table
- File system
- File Transfer Protocol
- Fingerprint
- Fire investigation
- Firefox
- Firefox OS
- Firewall (computing)
- Flame (malware)
- Flowchart
- Forbes
- Forensic archaeology
- Forensic arts
- Forensic biology
- Forensic chemistry
- Forensic data analysis
- Forensic engineering
- Forensic identification
- Forensic materials engineering
- Forensic photography
- Forensic profiling
- Forensic science
- Forensic toxicology
- Forensic video analysis
- Fortran
- Fortune (magazine)
- Four-dimensional space
- Fragging
- Framing (World Wide Web)
- FreeBSD jail
- Freedom of information
- Frequency modulation
- FTP bounce attack
- Functional programming
- Functional programming
- FuseNet
- Gate array
- General Packet Radio Service
- Genetic engineering
- Germany
- GetAdmin
- Global Internet usage
- Global kOS
- Global Positioning System
- GlobalHell
- Glove prints
- Gmail
- GNU GRUB
- Go (programming language)
- Goatse Security
- Google Analytics
- Google Apps for Work
- Google Chrome
- Google Doodle
- Google Energy
- Google Nexus
- Google Play
- Google Search Appliance
- Google TV
- Google Voice
- Google Wallet
- Google.org
- Goto
- Grammar induction
- Greek language
- Grenade launcher
- Grey hat
- Grid computing
- GSM
- Guinness World Records
- Gyroscope
- Hack (programming language)
- Hacker (computer security)
- Hacker (hobbyist)
- Hacker (programmer subculture)
- Hacker (term)
- Hacker ethic
- Hacker Manifesto
- Hacking of consumer electronics
- Hacktivism
- Hackweiser
- Hand grenade
- Haptic technology
- Hash function
- Haskell
- Head-mounted display
- Header (computing)
- Heap overflow
- Hexadecimal
- High Level Assembly
- High Speed Packet Access
- High-bandwidth Digital Content Protection
- High-definition television
- High-level programming language
- High-Speed Downlink Packet Access
- High-temperature superconductivity
- Hinduism
- Home network
- Honker Union
- Host protected area
- HTC
- HTC Dream
- HTML
- HTML attribute
- HTML element
- HTML scripting
- HTTP cookie
- HTTP Debugger
- HTTP header injection
- HTTP response splitting
- Hydrochloric acid
- Hyperlink
- Hypertext Transfer Protocol
- IBM
- ICANN
- Identity theft
- IEEE 802.11
- IEEE 802.11u
- IEEE P1906.1
- IEEE Standards Association
- Illegal number
- Index Corporation
- India
- Inductive logic programming
- Inductive programming
- Inductive reasoning
- Information Processing Language
- Infrared
- Input/output
- Instant messaging
- Instruction unit
- Integer overflow
- Integrated circuit
- Integrated circuit design
- Integrated Services Digital Network
- Intel
- Intelligence quotient
- Intelligence Quotient (IQ) and Browser Usage
- Inter-process communication
- Intermetallic
- International Mobile Station Equipment Identity
- International Organization for Standardization
- International Union of Pure and Applied Chemistry
- Internet Architecture Board
- Internet area network
- Internet Assigned Numbers Authority
- Internet Control Message Protocol
- Internet Engineering Task Force
- Internet Explorer
- Internet Explorer 6
- Internet Explorer 9
- Internet layer
- Internet Message Access Protocol
- Internet privacy
- Internet Protocol
- Internet protocol suite
- Internet Relay Chat
- Internet Society
- Internet traffic
- Internetworking
- Interrupt
- Intrusion detection system
- Intrusion prevention system
- IOS
- IOS jailbreaking
- IP forwarding algorithm
- IP forwarding algorithm
- IPhone
- IPsec
- IPv4
- IPv6
- ISI mark
- Island of stability
- Jabber.org
- Jabber.org
- Jack the Ripper
- Japan
- Java (programming language)
- JavaScript
- Kernel (operating system)
- Kernel Transaction Manager
- Key stretching
- Keyhole, Inc
- Keystroke logging
- L0pht
- Lakshmi Mittal
- Large Hadron Collider
- Larry Ellison
- Larry Page
- Laser
- Lateral thinking
- Latin
- Latitude
- LED-backlit LCD display
- Legal aspects of computing
- Level Seven (hacking group)
- Li-Fi
- Life (magazine)
- Light tank
- Light-emitting diode
- Lightweight Directory Access Protocol
- Like button
- Line number
- Linker (computing)
- Linux
- Linux kernel
- Linux malware
- Lisp (programming language)
- List of alloys
- List of brazing alloys
- List of cocktails
- List of computer criminals
- List of computer worms
- List of countries by IPv4 address allocation
- List of countries by number of broadband Internet subscriptions
- List of countries by number of Internet hosts
- List of domestic submarine communications cables
- List of educational programming languages
- List of elements
- List of features removed in Windows XP
- List of Google hoaxes and easter eggs
- List of international submarine communications cables
- List of IP protocol numbers
- List of nuclides
- List of programming language researchers
- List of songs recorded by Michael Jackson
- List of superconductors
- List of WLAN channels
- LiveCode
- Local shared object
- Logic
- Logical conjunction
- Logical consequence
- Logical disjunction
- Logical positivism
- Logical reasoning
- Logtalk
- Longitude
- Low-level programming language
- LTE (telecommunication)
- LTE Advanced
- LulzSec
- Luxembourg
- Lynis
- Mac OS
- Machine code
- Magnetic levitation
- Mahabharata
- Mahamrityunjaya Mantra
- Malware
- Man-in-the-browser
- Marcus Hutter
- Markup language
- Maser
- Massachusetts Institute of Technology
- Master boot record
- Masters of Deception
- Mathematica
- Mathematical beauty
- Mathematical game
- Mathematical induction
- Mathematical model
- Mathematics of general relativity
- MATLAB
- MD5
- Md5sum
- Mechanics
- Media access control
- Memory management
- Memory safety
- Memristor
- Merit Network
- Metamorphic code
- Metasploit Project
- Metropolitan area network
- Michael Jackson
- Microkernel
- Microsoft
- Microsoft Windows
- Microsoft Windows library files
- Milw0rm
- Mobile app
- Mobile device forensics
- Mobile phone signal
- Mobile radio telephone
- Mobile secure gateway
- Mobile television
- Modern Greek
- Moore's law
- Morphine
- MOSFET
- Motherboard
- Mount Olympus
- MPEG-2
- Mukesh Ambani
- Multimedia Messaging Service
- Mutation
- Mutator method
- Myspace
- MySQL
- Near field communication
- Negation
- Nessus (software)
- Netscape
- Network access point
- Network Crack Program Hacker Group
- Network forensics
- Network packet
- Network security
- Neutron source
- Newbie
- Next-generation network
- Nikto Web Scanner
- Nmap
- Nokia
- Ntdetect.com
- NTFS
- NTLDR
- Nuclear and radiation accidents and incidents
- Nuclear engineering
- Nuclear fission
- Nuclear fuel cycle
- Nuclear fusion
- Nuclear matter
- Nuclear physics
- Nuclear reactor physics
- NX bit
- Objective-C
- Odyssey
- Online banking
- Open Handset Alliance
- Open Shortest Path First
- Open source
- Open standard
- Open-world assumption
- OpenVAS
- Opera (web browser)
- Operating system
- Optical amplifier
- Optical communication
- Optical fiber
- Optical fiber connector
- Optical microscope
- Oracle Database
- Orthogonal frequency-division multiple access
- Orthogonality
- Orthography
- OS X Mavericks
- Outline of the Internet
- Overclocking
- P.H.I.R.M.
- Packet analyzer
- Packet loss
- Packet switching
- PageRank
- Paging
- Pakistan
- Panzerfaust 3
- Parsing
- Pascal (programming language)
- Password cracking
- Patch (computing)
- Path MTU Discovery
- Payload (computing)
- Pcap
- Peer-to-peer
- Penetration test
- Periodic table
- Perl
- Phase modulation
- Philanthropy
- Photon
- PHP
- Phreaking
- Planner (programming language)
- PlayStation 3
- PlayStation Jailbreak
- Plug and play
- Plug-in (computing)
- Point-to-Point Protocol
- Pointer (computer programming)
- Polymorphic code
- Polymorphic engine
- Pop-up ad
- Post Office Protocol
- PreScheme
- Prices of elements and their compounds
- Privilege escalation
- Probability
- Problem of induction
- Process management (computing)
- Processor register
- Profiling (information science)
- Programming language
- Programming language theory
- Programming languages used in most popular websites
- Programming paradigm
- Programming style
- Promethium
- Proprietary software
- Prostate cancer
- Protected procedure call
- Protocol (object-oriented programming)
- Proximity sensor
- Pseudocode
- Public Interest Registry
- Public key certificate
- Pyramid
- Python (programming language)
- P–n junction
- Qualcomm
- Quantum mechanics
- Questioned document examination
- Quickoffice
- Quran
- Race condition
- Radio frequency
- Radio masts and towers
- Rama
- Ramayana
- Real-time operating system
- Real-time Transport Protocol
- RedHack
- Remote Installation Services
- Responsible disclosure
- Return-oriented programming
- Return-to-libc attack
- Rifle grenade
- RNA
- Rocket-propelled grenade
- Roman Seleznev
- Rooting (Android OS)
- Rootkit
- Router (computing)
- Ruby (programming language)
- Ruby on Rails
- Rust (programming language)
- S60 (software platform)
- Salt (cryptography)
- Samsung
- Sanskrit
- Sanskrit literature
- Satchel charge
- Schrödinger equation
- Script kiddie
- Secure by design
- Secure coding
- Secure Shell
- Security bug
- Sega
- Segmentation fault
- Selective file dumper
- Self-modifying code
- Semiconductor
- Semiconductor characterization techniques
- Series 40
- Session fixation
- Seven-segment display
- Shared source
- Shellcode
- Sherlock Holmes
- Shiva
- Shoulder-fired missile
- Silicon Valley
- Simple Mail Transfer Protocol
- Singapore
- Skeleton (computer programming)
- SOCKS
- Softswitch
- Software
- Software defect indicator
- Software-defined protection
- Sonic Team
- Sony
- South Korea
- Spacetime
- Spain
- Spoofing attack
- Spyware
- SQL injection
- Sri Lanka
- Stack buffer overflow
- Stack Overflow
- Stanford University
- Star
- Statement (computer science)
- Stereoscopy
- Storage area network
- String (computer science)
- Strong and weak typing
- Structured programming
- Stun grenade
- Style sheet (web development)
- Submarine communications cable
- Subnetwork
- Sun Microsystems
- Super-heavy tank
- Superconductivity
- Superuser
- Sweden
- Swift (programming language)
- Switch statement
- Switched-mode power supply applications
- Switzerland
- Symbian
- Symbol (chemistry)
- Syrian Electronic Army
- System programming language
- Taiwan
- TeaMp0isoN
- Technology assessment
- Telnet
- TeslaTeam
- TESO
- Texas Instruments
- Texas Instruments signing key controversy
- The Atlantic
- The Coroner's Toolkit
- The Sleuth Kit
- The Unknowns
- Three Laws of Robotics
- Tim Berners-Lee
- Time of check to time of use
- Timeline of chemical element discoveries
- Timeline of computer security hacker history
- Timeline of computer viruses and worms
- Timeline of Internet conflicts
- TippingPoint
- Toxicology
- Trace evidence
- Transistor
- Transistor count
- Transistor model
- Transmission Control Protocol
- Transport Layer Security
- Tritium
- Trojan horse (computing)
- Tunneling protocol
- Two-body problem in general relativity
- Type inference
- Type system
- UGNazi
- UMTS frequency bands
- Uncontrolled format string
- Unicode and HTML
- Uniform resource locator
- United Arab Emirates
- United Kingdom
- United States
- United States Copyright Office
- Universal Mobile Telecommunications System
- Universe
- Unix shell
- Unsigned code
- Uranium
- USB
- USB flash drive
- User Datagram Protocol
- User interface
- User operation prohibition
- Utility software
- Valmiki
- Victim blaming
- Virtual private network
- Visual Basic
- Visual Basic (.NET)
- Voice over IP
- Voltage
- Volume boot record
- Vulnerability (computing)
- Vulnerability assessment
- Vulnerability scanner
- Vyasa
- W-CDMA (UMTS)
- W3af
- Warren Buffett
- Web browser
- Web bug
- Web colors
- Web server
- Web storage
- Webley Revolver
- Website defacement
- White hat (computer security)
- White hole
- Wi-Fi
- Wide area network
- Wikipedia
- WiMAX
- Windows 2000
- Windows 7
- Windows 8
- Windows 8.1
- Windows 98
- Windows Fundamentals for Legacy PCs
- Windows ME
- Windows NT
- Windows NT 4.0
- Windows PowerShell
- Windows Registry
- Windows Runtime
- Windows Server 2003
- Windows startup process
- Windows Store
- Windows Task Manager
- Windows Vista
- Windows Vista startup process
- Windows XP
- Windows XP editions
- World Wide Web
- Wormhole
- Write buffer
- X.25
- X86
- X86-64
- Xbox (console) modchips
- Xbox 360
- XHTML
- XML
- XMPP
- XSS worm
- Zero-day attack
- Zero-day virus
- ZeroAccess botnet
- Zeus
- Zeus (Trojan horse)
- Zombie cookie