🎁 New User? Get 20% off your first purchase with code NEWUSER20 Register Now →
Menu

Categories

IT Glossary & Dictionary

40 terms covering Linux, Python, DevOps, Networking, Databases, and more.

Clear definitions and in-depth explanations for beginners and professionals.

All Cloud Computing (35) Databases (51) DevOps (60) Linux (60) Networking (46) Programming Concepts (40) Python (55) Security (40) Web Development (53)
A-Z: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A

API Security

Security

Practices and mechanisms for protecting APIs from unauthorized access, data breaches, and abuse.

B

Brute Force Attack

Security

An attack method that systematically tries all possible combinations of passwords or keys until the correct one is found.

C

Certificate Pinning

Security

A security technique that associates a host with its expected TLS certificate or public key, preventing man-in-the-middle attacks with fraudulent certificates.

Content Security Policy (CSP)

Security

An HTTP security header that controls which resources a browser is allowed to load for a web page, preventing XSS and data injection.

CORS (Cross-Origin Resource Sharing)

Security

A browser security mechanism that controls which web domains can access resources from another domain via HTTP requests.

Cryptographic Key Management

Security

The practices and procedures for generating, storing, distributing, rotating, and revoking encryption keys securely.

CSRF (Cross-Site Request Forgery)

Security

An attack that tricks authenticated users into submitting unwanted requests to a web application they are logged into.

D

DAST (Dynamic Application Security Testing)

Security

Testing a running application from the outside by sending malicious requests to discover security vulnerabilities.

Data Loss Prevention (DLP)

Security

A strategy and set of tools that detect and prevent unauthorized transmission of sensitive data outside an organization.

DDoS (Distributed Denial of Service)

Security

An attack that floods a target server or network with traffic from multiple sources to overwhelm it and deny service to legitimate users.

E

Encryption

Security

The process of converting readable data into an unreadable format using algorithms, reversible only with the correct key.

F

Firewall Rules

Security

Configuration entries that define which network traffic is allowed or blocked based on source, destination, port, and protocol.

H

Hashing

Security

A one-way function that converts input data into a fixed-size string of characters, used for data integrity and password storage.

I

Input Validation

Security

The process of verifying that user-supplied data meets expected formats, types, and ranges before processing it.

J

JWT (JSON Web Token)

Security

A compact, self-contained token format used for securely transmitting information between parties as a JSON object.

M

Man-in-the-Middle Attack

Security

An attack where the attacker secretly intercepts and potentially alters communication between two parties who believe they are communicating directly.

O

OAuth 2.0

Security

An authorization framework that allows third-party applications to access user resources without sharing passwords.

OWASP Top 10

Security

A regularly updated list of the ten most critical web application security risks, published by the Open Web Application Security Project.

P

Penetration Testing

Security

An authorized simulated cyberattack on a system to evaluate its security defenses and identify vulnerabilities.

Phishing

Security

A social engineering attack that uses fraudulent communications to trick people into revealing sensitive information or installing malware.

PKI (Public Key Infrastructure)

Security

A framework of policies, hardware, and software for creating, managing, distributing, and revoking digital certificates.

Principle of Least Privilege

Security

A security principle where users and programs receive only the minimum access rights needed to perform their specific tasks.

R

Rate Limiting

Security

A technique that controls the number of requests a client can make to a server within a specified time period.

RBAC (Role-Based Access Control)

Security

An access control model where permissions are assigned to roles, and users are assigned to roles rather than getting permissions directly.

S

SAST (Static Application Security Testing)

Security

Automated analysis of source code to find security vulnerabilities without executing the application.

Secret Management

Security

The practice of securely storing, accessing, and rotating sensitive credentials like API keys, passwords, and certificates.

Security Audit

Security

A systematic examination of an information system to assess compliance with security policies, identify vulnerabilities, and verify controls.

Security Hardening

Security

The process of reducing a system's attack surface by disabling unnecessary services, applying patches, and configuring security controls.

Security Headers

Security

HTTP response headers that instruct browsers to enable security features like XSS protection, framing prevention, and content type enforcement.

Session Hijacking

Security

An attack where an adversary takes over a legitimate user session by stealing or predicting the session identifier.

SIEM (Security Information and Event Management)

Security

A platform that collects, correlates, and analyzes security events from across an organization to detect threats and incidents.

SOC (Security Operations Center)

Security

A centralized team and facility responsible for monitoring, detecting, analyzing, and responding to cybersecurity threats 24/7.

SQL Injection

Security

An attack where malicious SQL code is inserted into application queries through user input to access or manipulate the database.

Supply Chain Attack

Security

A cyberattack that targets less-secure elements in the software supply chain to compromise downstream users and organizations.

T

Two-Factor Authentication (2FA)

Security

A security method requiring two different forms of identification before granting access to an account.

V

Vulnerability Scanning

Security

Automated testing that identifies known security weaknesses in systems, applications, and network infrastructure.

W

WAF (Web Application Firewall)

Security

A security solution that filters and monitors HTTP traffic between a web application and the internet, blocking common attacks.

Webhook Signature Verification

Security

A security mechanism that verifies webhook payloads are authentic and unmodified using cryptographic signatures.

X

XSS (Cross-Site Scripting)

Security

An attack that injects malicious scripts into web pages viewed by other users, potentially stealing data or session tokens.

Z

Zero Trust

Security

A security model that requires strict identity verification for every user and device, regardless of their network location.

How Our IT Glossary Helps You

More than just definitions — our glossary is a learning tool that connects concepts to practical resources.

📚 Clear Definitions

Every term has a short definition for quick reference and a detailed explanation for deeper understanding.

🎯 Difficulty Levels

Each term is tagged as Beginner, Intermediate, or Advanced so you know if it matches your current knowledge.

🔗 Linked to eBooks

Terms link to relevant eBooks so you can go from a quick definition to in-depth learning in one click.

🔭 9 Categories

Browse by topic area — filter by category and A-Z letter to find exactly what you need in seconds.

Browse All Books Reading Lists Read Our Blog

Frequently Asked Questions

What is the Dargslan IT Glossary?

The Dargslan IT Glossary is a comprehensive dictionary of 40 information technology terms covering 9 categories including Cloud Computing, Databases, DevOps, Linux, Networking, Programming Concepts. Each term includes a clear definition, an in-depth explanation, difficulty level, and links to related eBooks for further learning.

How many terms does the glossary contain?

The glossary currently contains 40 terms across 9 categories. We regularly add new terms to keep the glossary current with the latest technologies and concepts.

Who is this glossary for?

The glossary is designed for anyone working in or learning about IT — from complete beginners encountering unfamiliar terms to experienced professionals looking for precise definitions. Each term includes a difficulty badge (Beginner, Intermediate, or Advanced) so you can find content at your level.

Can I browse terms by category?

Yes. Use the category pills at the top of the glossary to filter terms by topic such as Cloud Computing, Databases, DevOps, Linux, Networking, Programming Concepts. You can also use the A-Z letter filter to jump to terms starting with a specific letter, or combine both filters.

How are glossary terms linked to eBooks?

Many glossary terms are linked to relevant eBooks in our store. When you read a term definition, you will see recommended books that cover that topic in depth — making it easy to go from a quick definition to comprehensive learning.

Is the glossary free to use?

Yes, the entire IT glossary is completely free. Browse, read, and learn from all 40 terms without any registration or payment required.

How do I find a specific term?

You can use the A-Z letter navigation to jump to terms starting with a specific letter, filter by category to narrow results, or use the search bar in the header to find any term by name. Each term has its own dedicated page with a full explanation.