2FA |
Two-Factor Authentication |
AES |
Advanced Encryption Standard |
AIF |
Application Interface Framework (SAP) |
AJAX |
Asynchronous JavaScript & XML |
AMQP |
Advanced Message Queuing Protocol |
ANT |
Another Neat Tool |
AOP |
Aspect Oriented Programming |
API |
Appication Programming Interface |
ARP |
Address Resolution Protocol |
AS |
Application Server |
ASCII |
American Standard Code for Information Interchange |
AMX |
(TIBCO) Active Matrix |
BAM |
Business Activity Monitoring |
BDD |
Behaviour Driven Development |
BFA |
Brute Force Attack |
BI |
Business Integration |
BOM |
Bill of Material |
BPEL |
Business Process Excecution Language |
BPM |
Business Process Modelling |
BPMN |
Business Process Modelling Notation |
BRMS |
Business Rules Management System |
BSI |
Bundesamt für Sicherheit in der Informationstechnik |
BW |
(TIBCO) Business Works |
CA |
Certificate Authority |
CC |
Command & Control |
CDI |
Contexts and Dependency Injection |
CEP |
Complex Event Processing |
CD |
Continuous Delivery |
CD |
Continuous Deployment |
CI |
Continuous Integration |
CIA |
Confidentiality Integrity Availability |
CIFS |
Common Internet File System |
CMDB |
Configuration Management Database |
CMS |
Content Management System |
CORBA |
Common Object Request Broker Architecture |
CORS |
Cross-Origin Resource Sharing |
COTS |
Commercial Off The Shelf |
CRM |
Customer Relationship Management |
CSRF |
Cross-Site Request Forgery |
CSV |
Comma Separated Values |
CVE |
Common Vulnerabilty Enumerator |
CVS |
Concurrent Versions System |
DAC |
Discretionary Access Control |
DAST |
Dynamic Application Security Testing |
DBMS |
Database Management System |
DD |
Deployment Descriptor |
DDoS |
Distributed Denial of Service |
DES |
Data Encryption Standard |
DI |
Dependeny Injection |
DIN |
Deutsche Industrie Norm |
DNS |
Domain Name System |
DOM |
Document Object Model |
DoS |
Denial of Service |
DSL |
Domain Specific Language |
DTD |
Data Type Definition |
EAR |
Enterprise Archive |
EDA |
Event Driven Architecture |
EAI |
Enterprise Application Integration |
EDI |
Electronic Data Interchange |
EIP |
Enterprise Integration Patterns |
EJB |
Enterprise Java Beans |
EMS |
(TIBCO) Enterprise Message Server |
ERM |
Entity Relationship Modelling |
ERP |
Enterprise Resource Planning |
ESB |
Enterprise Service Bus |
FT |
Fault Tolerance |
FTP |
File Transfer Protocol |
FTPS |
FTP over SSL |
HA |
High Availability |
HLK |
Heizung, Lüftung und Klimatisierung |
HTML |
Hypertext Markup Language |
HTTP |
Hypertext Transfer Protocol |
HTTPS |
Hypertext Transfer Protocol Secure |
HVAC |
Heating, Ventilation and Air Conditioning |
IaaS |
Infrastructure as a Service |
IaC |
Infrastructure as Code |
IAM |
Identity & Access Management |
IAST |
Interactive Application Security Testing |
ICMP |
Internet Control Message Protocol |
IDE |
Integrated Development Environment |
IDEA |
International Data Encryption Algorithm |
IDL |
Interface Definition Language |
IDS |
Intrusion Detection System |
IEC |
International Electrotechnical Commission |
IEEE |
Institute of Electrical and Electronics Engineers |
IMAP |
Internet Message Access Protocol |
IP |
Internet Protocol |
IPS |
Intrusion Prevention System |
ISMS |
Information Security Management System |
ISO |
International Organization for Standardization |
ITIL |
IT Infrastructure Library |
ITSM |
IT Service Management |
JAR |
Java Archive |
JAX-B |
Java Architecture for XML Binding |
JAX-RS |
Java-API for RESTful Web Services |
JAX-WS |
Java-API for XML Web Services |
JBI |
Java Business Integration |
JCE |
Java Cryptography Extension |
JDBC |
Java Database Connectivity |
JDK |
Java Development Kit |
JEE |
Java Enterprise Edition |
JMS |
Java Message Service |
JMX |
Java Management Extensions |
JNDI |
Java Naming and Directory Interface |
JPA |
Java Persistence API |
JSON |
JavaScript Object Notation |
JVM |
Java Virtual Machine |
KPI |
Key Performance Indicators |
LAMP |
Linux Apache MySQL PHP |
LAN |
Local Area Network |
LDAP |
Lightweight Directory Access Protocol |
MAC |
Mandatory Access Control |
MAC |
Media-Access-Control |
MD |
Modular Design |
MD |
Message Digest |
MDA |
Model Driven Architecture |
MDB |
Message Driven Bean |
MDM |
Master Data Management |
MEP |
Message Exchange Pattern |
MFA |
Multi Factor Authentication |
MIME |
Multipurpose Internet Mail Exchange |
MitM |
Man-in-the-Middle |
MOM |
Message Oriented Middleware |
MQ |
Message Queue |
MVN |
Maven |
NIC |
Network Interface Card |
NIST |
National Institute of Standards and Technology |
NPE |
Null Pointer Exception |
NFS |
Network File System |
OOA |
Object Oriented Analysis |
OOD |
Object Oriented Design |
OMG |
Object Management Group |
OOP |
Object Oriented Programming |
ORM |
Object Relational Mapping |
OSGi |
Open Serives Gateway Initiative |
OTP |
One Time Pad |
OWASP |
Open Web Application Security Project |
PaaS |
Platform as a Service |
PDF |
Portable Document Format |
PGP |
Pretty Good Privacy |
PID |
Process Identifier |
PII |
Personally Identifiable Information |
PKI |
Public Key Infrastructure |
POJO |
Plain Old Java Object |
POP3 |
Post Office Protocal Version 3 |
PHP |
Hypertext Preprocessor |
POM |
Project Object Model |
PU |
Processing Unit |
RBAC |
Role Based Access Control |
RCE |
Remote Code Execution |
REST |
REpresentational State Transfer |
RDBMS |
Relational Database Management System |
RMI |
Remote Method Innvocation |
RPC |
Remote Procedure Call |
ROOM |
Realtime Object Oriented Modelling |
RSA |
Rivest–Shamir–Adleman |
RT |
Realtime |
RTC |
Run To Completion |
RUP |
Rational Unified Process |
RV |
(TIBCO) Rendezvous |
SA |
Structured Analysis |
SaaS |
Software as a Service |
SAN |
Storge Area Network |
SAST |
Static Application Security Testing |
SBoM |
Software Bill od Material |
SCA |
Service Component Architecture |
SCA |
Software Composition Analysis |
SCM |
Source Code Management |
SCM |
Supply Chain Management |
SCP |
Secure Copy |
SDK |
Software Development Kit |
SDLC |
Software Development Lifecycle |
SDN |
Software Defined Network |
SEDA |
Staged Event Driven Architecture |
SFTP |
SSH File Transfer Protocol |
SIEM |
Security Information and Event Management |
SLA |
Service Level Agreement |
SHA |
Secure Hash Algorithm |
SMB |
Server Message Block |
SMTP |
Simple Mail Transfer Protocol |
SNMP |
Simple Network Management Protocol |
SOA |
Service Oriented Architecture |
SOAP |
Simple Object Access Protocol (SOA Protocol) |
SQL |
Structured Query Language |
SSH |
Secure Shell |
SSL |
Secure Sockets Layer |
SVN |
Subversion |
TLS |
Transport Layer Security |
TCP |
Transmission Control Protocol |
TDD |
Test Driven Development |
TIBCO |
The Information Bus Company |
TRA |
(TIBCO) Runtime Agent |
UDP |
User Datagam Protocol |
UML |
Unified Modelling Language |
UPS |
Uninteruptible Power Supply |
URI |
Uniform Resource Identifier |
URL |
Uniform Resource Locator |
USB |
Universal Serial Bus |
USV |
Unterbrechungsfreie Stromversorgung |
UTF |
Unicode Transformation Format |
VM |
Virtual Machine |
VPN |
Virtual Private Network |
VSFTPD |
Very Secure File Transfer Protocol Daemon |
WADL |
Web Application Description Language |
WAF |
Web Application Firewall |
WAN |
Wide Area Network |
WAR |
Web Archive |
WLAN |
Wireless Local Area Network |
WSDL |
Web Services Definition / Description Language |
XAMPP |
Linux/Windows Apache MySQL SQLite Perl PHP |
XMI |
XML Metadata Interchange |
XML |
Extensible Markup Language |
XP |
Extreme Programming |
XPath |
XML Path Language |
XSD |
XML Schema Definition |
XSL |
Extensible Stylesheet Language |
XSLT |
XSL Transformation |
XSS |
Cross-Site-Scripting |
XXE |
XML External Entities |
YAML |
Yet Another Markup Language |