Dictionaries, Glossaries and Other Resources

Your source for dictionaries, glossaries and other computing technology and cybersecurity resources.

This page lists online: Dictionaries, Encyclopedias, Glossaries, Specialized Resources, and Topical Series Listings in Wikipedia.


Dictionary: a reference source in print or electronic form containing words usually alphabetically arranged along with information about their forms, pronunciations, functions, etymologies, meanings, and syntactic and idiomatic uses.

National Institute of Standards and Technology: Dictionary of Algorithms and Data Structures – “This is a dictionary of algorithms, algorithmic techniques, data structures, archetypal problems, and related definitions. Algorithms include common functions, such as Ackermann’s function. Problems include traveling salesman and Byzantine generals. Some entries have links to implementations and more information. Index pages list entries by area and by type. The two-level index has a total download 1/20 as big as this page. Don’t use this site to cheat. Teachers, contact us if we can help. Currently we do not include algorithms particular to business data processing, communications, operating systems or distributed algorithms, programming languages, AI, graphics, or numerical analysis: it is tough enough covering ‘general’ algorithms and data structures.”

Free On-Line Dictionary of Computing (“FOLDOC”) – “FOLDOC is a computing dictionary. It includes definitions of acronyms, jargon, programming languages, tools, architecture, operating systems, networking, theory, standards, mathematics, telecoms, electronics, institutions and companies, projects, history, in fact any of the vocabulary you might expect to find in a computer dictionary.”

Sideways Dictionary – Offers a different spin on defining technical terms with a sense of humor. “It’s like a dictionary, but using analogies instead of definitions. Use it as a tool for finding and sharing helpful analogies to explain technology. Because if everyone understands technology better, we can make technology work better for everyone.” [As of 2/18/22 their CA is expired…] (A project of The Washington Post and Jigsaw. Read about it in WIRED: “Don’t Know What a Honeypot Is? Try This Analogy on for Size“)

Tech Terms Computer Dictionary – Look up definitions of computer and Internet terms. (General level tech terms.)

Urban Dictionary – While not a technical dictionary, it does nonetheless provide interesting insights particularly for terms with heavier or newer social meanings.


Encyclopedia: a work that contains information on all branches of knowledge or treats comprehensively a particular branch of knowledge usually in articles arranged alphabetically often by subject.

PaloAlto Networks Cyberpedia – Cyberpedia includes articles that provide a foundational understanding for multiple components of cybersecurity including: Cloud security, Compliance, Cybersecurity, Network security, SecOps and Endpoint security, and Threats.

PCMag Encyclopedia – The PCMag Encyclopedia contains definitions on common technical and computer-related terms.


Glossary: a collection of specialized terms with their meanings.

BleepingComputer Glossary – Find definitions for various computer terms that you may encounter.

Georgetown University, Center for Security and Emerging Technology – CSET Glossary defines four key terms related to CSET’s work: artificial intelligence, machine learning, deep learning, and neural networks. Also suggests other glossaries that define related terms.

Examples of Cyber Reconnaissance Techniques – From CACM article “Cyber Reconnaissance Techniques.” Focused on Social engineering, Internet intelligence, Network information gathering, and Side-channels.

CyberWire Glossary – Terms often used in discussions of cyber security, briefly defined.

Google Developers Machine Learning Glossary – This glossary defines general machine learning terms, plus terms specific to TensorFlow.

Google Developers Web Fundamentals Glossary

The Jargon Lexicon Glossary – From “ABEND” to “zorkmid” it’s The Jargon File glossary. (What? You’ve never heard of The Jargon File? Well then, by all means, check it out! There’s a good chance you’ll be intrigued.)

Juniper Networks Tech Library Glossary – Core and edge router, and IT security technologies.

Malwarebytes Glossary – Malwarebytes Labs’ glossary listing items A-Z in general computing and cybersecurity domains.

Microsoft Excel Glossary – Excel for Microsoft 365 Excel for Microsoft 365 for Mac Excel for the web Excel 2021

Microsoft Word Glossary – Lists the open specs terms for office file formats.

Mozilla Development Network Web Docs Glossary – Definitions of Web-related terms. This glossary provides definitions of words and abbreviations you need to know to successfully understand and build for the web.

National Security Agency – Basic Cryptologic Glossary (PDF) (Declassified and approved for release by NSA on 01-09-2014.)

National Institute of Standards and Technology, Computer Security Resource Center: Glossary – This Glossary consists of terms and definitions extracted verbatim from NIST’s cybersecurity- and privacy-related Federal Information Processing Standards (FIPS), NIST Special Publications (SPs), and NIST Internal/Interagency Reports (IRs), as well as from Committee on National Security Systems (CNSS) Instruction CNSSI-4009. Only terms that are defined in final publications—not drafts—are included here.

National Security Commission on Artificial Intelligence (NSCAI), 2021 Final Report, Appendix A: Technical Glossary (PDF) – This glossary covers 3D Chip Stacking and Additive Manufacturing through Unsupervised Machine Learning and Virtual Reality, with a whole lot in between. You can read the final report, review the table of contents, list of appendices and learn more here.

SANS Glossary of Security Terms (A through Z) – SANS offers much that is useful in the domain of cybersecurity. Find out more on my SANS page.

SentinelOne’s Sentinel101 is a glossary that outlines important topics and threats across Cybersecurity.

WIRED Glossary of the many technologies, terms and acronyms of the web.

Specialized Resources & Knowledge Bases:

FileInfo The file extensions database. “Search over 10,000 file extensions and software programs.”

Cloudflare Learning Center – Resources on cyber security and how the Internet works from Cloudflare. Including sections on: DDoS attacks, CDNs, DNS, Web application security, Performance, Serverless, SSL, Bots, The Cloud, Access managment, The Network layer, Privacy, and Video streaming.

CISA Cybersecurity Framework – U.S. Cybersecurity & Infrastructure Security Agency helps organizations use the Cybersecurity Framework to improve cyber resilience.

CISA Cybersecurity Quick Links – U.S. Cybersecurity & Infrastructure Security Agency leads the Nation’s strategic and unified work to strengthen the security, resilience, and workforce of the cyber ecosystem to protect critical services and American way of life.

CISA Nation State Cyber Threats – Listing threat overviews and advisories for the four biggies: China, Russia, North Korea & Iran.

MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. the knowledge Base includes sections on: Matrices, Tactics, Techniques, Data Sources, Mitigations, Groups, Software, Resources, and a Blog.

Vulnerabilities – Carnegie Mellon University, Software Engineering Institute, CERT Coordination Center: Vulnerability Notes Database (VND) – The Vulnerability Notes Database provides information about software vulnerabilities. Vulnerability notes include summaries, technical details, remediation information, and lists of affected vendors. Most vulnerability notes are the result of private coordination and disclosure efforts.

Vulnerabilities – MITRE Common Vulnerabilities and Exposures (CVE) – CVE® is a list of entries—each containing an identification number, a description, and at least one public reference—for publicly known cybersecurity vulnerabilities. CVE Entries are used in numerous cybersecurity products and services from around the world, including the U.S. National Vulnerability Database (NVD). [As of Feb. 18, 2022 there are 170,209 CVE entries.]

Vulnerabilities – National Institute of Standards and Technology, Information Technology Laboratory: National Vulnerability Database (NVD) – The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, misconfigurations, product names, and impact metrics. Search U.S. government vulnerability resources for information about vulnerabilities on your systems.

Wikipedia Computing and Information Technology Categories: Computing TerminologyComputing and IT AbbreviationsGlossary of Computer ScienceGlossary of Computer Hardware TermsTerms Relating to Algorithms and Data StructuresGlossary of Artificial IntelligenceGlossary of Machine VisionGlossary of Internet-Related TermsInternet SlangGlossary of Blogging

Topical Series Listings in Wikipedia

Information Security:

Information Security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks.

Categories within the Information Security Series include:
Computer securityAutomotive securityCybercrime: Cybersex trafficking & Computer fraudCybergeddonCyberterrorismCyberwarfareElectronic warfareInformation warfareInternet securityMobile securityNetwork securityCopy protectionDigital rights management.

Threats within the Information Security Series include:
AdwareAdvanced persistent threatArbitrary code executionBackdoorsHardware backdoorsCode injectionCrimewareCross-site scriptingCryptojacking malwareBotnetsData breachDrive-by downloadbrowser helper objectsComputer crimeVirusesData scrapingDenial of serviceEavesdroppingEmail fraudEmail spoofingExploitsKeyloggersLogic bombsTime bombsFork bombsZip bombsFraudulent dialersMalwarePayloadPhishingPolymorphic enginePrivilege escalationRansomwareRootkitsBootkitsScarewareShellcodeSpammingSocial engineering (security)Screen scrapingSpywareSoftware bugsTrojan horsesHardware TrojansRemote access trojansVulnerabilityWeb shellsWiperWormsSQL injectionRogue security softwareZombie.

Defenses within the Information Security Series include:
Application security: Secure coding & Secure by default & Secure by design; Misuse caseComputer access control: Authentication; Multi-factor authentication, AuthorizationComputer security software: Antivirus software & Security-focused operating systemData-centric securityCode obfuscationData maskingEncryptionFirewallIntrusion detection system: Host-based intrusion detection system (HIDS) & Anomaly detectionSecurity information and event management (SIEM) – Mobile secure gatewayRuntime application self-protection.