Topics Archive

Topics Archive News

Topics Archive Get Started

Bring yourself up to speed with our introductory content

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt data. Continue Reading

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a login process. Continue Reading

  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold. Continue Reading

Evaluate Topics Archive Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Manage Topics Archive

Learn to apply best practices and optimize your operations.

Problem Solve Topics Archive Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

SearchCloudSecurity
SearchNetworking
SearchCIO
SearchEnterpriseDesktop
SearchCloudComputing
ComputerWeekly.com
Close