Translation glossary: Computer Secutiry relate

Creator:
Filter
Reset
Showing entries 101-150 of 265
« Prev Next »
 
Incidentà˵ءÒóìÅÐàÁÔ´¤ÇÒÁ»ÅÍ´ÀѤÍÁ¾ÔÇàµÍÃìáÅÐà¤Ã×Í¢èÒÂ:¡ÅØèÁ¢Í§¡ÒÃâ¨ÁµÕ·ÕèÊÒÁÒö¶Ù¡á¡áÂÐÍÍ¡ÁÒ¨Ò¡¡ÒÃâ¨ÁµÕÍ×è¹æà¾ÃÒСÒ÷ÕèÊÒÁÒöàËç¹ä´éªÑ´à¨¹¶Ö§¼Ùéâ¨ÁµÕ,ÇÔ¸ 
English to Thai
Incident NumberËÁÒÂàÅ¢à˵ءÒóì:ËÁÒÂàÅ¢ÍéÒ§ÍÔ§ãªé㹡ÒõԴµÒÁà˵ءÒóìÏ,ËÃ×Íãªé㹡ÒþÔÊÙ¨¹ì·ÃÒº¶Ö§¢éÍÁÙŢͧà˵ءÒóìϹÑé¹ 
English to Thai
Increased Access¡ÒÃà¾ÔèÁ¡ÒÃà¢éÒ¶Ö§:¡ÒÃà¾ÔèÁ¡ÒÃà¢éÒ¶Ö§ domainº¹à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃìËÃ×Íà¤Ã×Í¢èÒÂâ´ÂäÁèä´éÃѺ͹حҵ 
English to Thai
Information Assurance (IA)¡ÒÃÃѺÃͧ¢éÍÁÙÅ:»¯ÔºÑµÔ¡Ò÷ҧ¢éÍÁÙÅ·Õ軡»éͧ¢éÍÁÙÅáÅÐÃкº¢éÍÁÙÅâ´Â·ÓãËéÁÕ¤ÇÒÁàª×èͶ×Íä´éã¹àÃ×èͧ availability, ¤ÇÒÁÊÁºÙóì, authentication, ¤ÇÒÁÅѺ, á 
English to Thai
Information Exchange¡ÒÃáÅ¡à»ÅÕè¹¢éÍÁÙÅ:¡ÒÃãËéä´éÁÒ«Ö觢éÍÁÙÅ ·Ñ駨ҡ¼Ùéâ¨ÁµÕ¤¹Í×è¹ (¼èÒ¹·Ò§ bulletin board ·Ò§ÍÔàÅç¡·Ã͹ԡ) ËÃ×ͨҡºØ¤¤Å·Õèà»ç¹à»éÒËÁÒ¢ͧ¡ÒÃâ¨ÁµÕ(«Ö觶٠
English to Thai
Information Operations (IO)»¯ÔºÑµÔ¡Ò÷ҧ¡ÒâéÍÁÙÅ:¡ÒáÃзÓà¾×èÍ·Õè¨ÐãËéÁռšÃзºµèÍ¢éÍÁÙÅáÅÐÃкº¢éÍÁÙŢͧ½èÒµç¢éÒÁ áÅÐã¹¢³Ðà´ÕÂǡѹ¡ç»¡»éͧ¢éÍÁÙÅáÅÐÃкº¢éÍÁÙŢͧ½èÒµ¹ 
English to Thai
Information Security¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑ·ҧ¢éÍÁÙÅ:¼Å·Õèà¡Ô´¢Ö鹨ҡ¡ÒÃãªéÃкº¢Í§¹âºÒÂáÅÐ/ËÃ×ÍÃÐàºÕº»¯ÔºÑµÔ·Õèãªé㹡ÒþÔÊÙ¨¹ì·ÃÒº,¤Çº¤ØÁ, áÅлéͧ¡Ñ¹¡ÒÃà»Ô´à¼Â¢éÍÁÙÅ (·Õèä´ 
English to Thai
Information Superiority¤ÇÒÁà˹×Í¡ÇèÒ·Ò§¡ÒâéÍÁÙÅ:¢Õ´¤ÇÒÁÊÒÁÒö㹡ÒÃÃǺÃÇÁ, ´Óà¹Ô¹¡ÃÃÁÇÔ¸Õ,áÅÐᨡ¨èÒ¢éÍÁÙÅä´éÍÂèÒ§µèÍà¹×èͧ áÅÐã¹¢³Ðà´ÕÂǡѹ¡ç¨Ó¡Ñ´ËÃ×Í·ÓÅÒ¢մ¤ÇÒÁÊÒÁÒö¹Õ颠
English to Thai
Integrity¤ÇÒÁÊÁºÙóì:¡ÒÃÃѺÃͧÇèÒ¢éÍÁÙŨÐäÁè¶Ù¡à»ÅÕè¹á»Å§ËÃ×Í·ÓÅÒ äÁèÇèÒ¨Ðà»ç¹â´ÂÍغѵÔà˵ØËÃ×Íâ´Âਵ¹ÒÃéÒ 
English to Thai
Internet Wormâ»Ãá¡ÃÁ worm ·Õè¶Ù¡»ÅèÍÂŧº¹ Internet àÁ×èÍ»Õ 1988 Robert T. Morris à»ç¹¼Ùéà¢Õ¹â»Ãá¡ÃÁ¹Õéâ´ÂááàÃÔèÁà»ç¹¡Ò÷´ÅͧáµèµèÍÁÒäÁèÊÒÁÒö¤Çº¤ØÁÁѹä´éÍÂèÒ§àËÁ 
English to Thai
Internetworkà¤Ã×Í¢èÒ¢ͧà¤Ã×Í¢èÒ 
English to Thai
Intrusion¡ÒúءÃØ¡:¡ÒáÃзÓã´æ·Õè¾ÂÒÂÒÁ·Õè¨Ð compromise ¤ÇÒÁÊÁºÙóì, ¤ÇÒÁÅѺ, ËÃ×Íavailability ¢Í§·ÃѾÂҡà
English to Thai
Intrusion Detection¡ÒõÃǨ¨Ñº¡ÒúءÃØ¡:à·¤¹Ô¤·Õèãªé㹡ÒõÃǨ¨Ñº¡ÒúءÃØ¡à¢éÒä»Âѧà¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃìËÃ×Íà¤Ã×Í¢èÒÂâ´Â¡ÒÃÊѧࡵءÒáÃзÓ,¡Òô٠security logs ËÃ×Í¢éÍÁÙÅ¡Òà a 
English to Thai
IP Splicing/Hijacking¡ÒáÃзӫÖè§ÁÕ¡Òôѡ¨ÑºáÅÐãªéÃèÇÁ¡Ñ¹¢Í§ session ·Õè¶Ù¡¨Ñ´µÑé§áÅéÇáÅСÓÅѧ´Óà¹Ô¹ÍÂÙè â´Â¼Ùéãªé·ÕèäÁèä´éÃѺ͹حҵà»ç¹¼Ùé¡ÃзӡÒÃâ¨ÁµÕẺ¹ÕéÍÒ¨à¡Ô´¢Öé¹ËÅ 
English to Thai
IP Spoofing¡ÒÃâ¨ÁµÕ«Öè§ÃкºË¹Ö觾ÂÒÂÒÁ·Õè¨ÐáÊ´§µÑÇÇèÒà»ç¹ÍÕ¡ÃкºË¹Öè§â´ÂÁԪͺâ´Â¡ÒÃãªé IP Network Address 
English to Thai
Key¡Ø­á¨:ÊÑ­ÅѡɳìËÃ×ÍÅӴѺ¢Í§ÊÑ­Åѡɳì(ËÃ×Í¡Åä¡ËÃ×ÍÊÑ­­Ò³ä¿¿éÒ·Õèà¡ÕèÂÇà¹×èͧ¡ÑºÊÑ­Åѡɳì)·Õè¹ÓÁÒà¢éÒËÃ×ͶʹÃËÑÊÅѺ¡Ñº¢éͤÇÒÁ 
English to Thai
Key EscrowÃкº·ÕèÁÕ¡ÒÃãËéªÔé¹Êèǹ˹Ö觢ͧ¡Ø­á¨Ë¹Ö觪Ôé¹µèͼÙé·Õèä´éÃѺÁͺËÁÒÂ˹Ö觤¹ ´Ñ§¹Ñ鹨Ðä´éÁÒ«Ö觵ÑǡحᨡçµèÍàÁ×èͼÙéä´éÃѺÁͺËÁÒ·ء¤¹ÁÒÃèÇÁ¡Ñ¹ 
English to Thai
Keystroke MonitoringSoftware ª¹Ô´¾ÔàÈÉ·Õèãªé㹡Òà audit trail ËÃ×Íà¤Ã×èͧÁ×Í·Õèä´éÃѺ¡ÒÃÍ͡Ẻ¾ÔàÈÉ·ÕèºÑ¹·Ö¡¡Òá´»ØèÁ·Ø¡»ØèÁ¢Í§¼ÙéãªéáÅСÒõͺʹͧ·Ø¡ÍÂèÒ§·ÕèÃкº¢éÍÁÙÅÍѵ 
English to Thai
Leapfrog Attack¡ÒÃãªé¢éÍÁÙÅ userid áÅÐÃËÑʼèÒ¹·Õèä´éÁÒâ´ÂÁԪͺ¨Ò¡ host ˹Öè§ä» compromise host Í×蹡Òà TELNET ¼èÒ¹ host ˹Öè§ËÃ×ÍËÅÒ host à¾×èÍ·Õè¨ÐäÁèãËéÁÕÃèͧÃÍÂ( 
English to Thai
Letterbombemail ·ÕèÁÕ¢éÍÁÙÅ·Õè execute ä´é«Öè§ÁÕਵ¹ÒÃéÒµèÍà¤Ã×èͧËÃ×Í terminal ¢Í§¼ÙéÃѺã¹Ãкº UNIX µÑÇ e-mail ¹ÕéÍÒ¨¾ÂÒÂÒÁãËéÊèǹ˹Ö觢ͧÁѹ¡ÅÒÂà»ç¹ shell com 
English to Thai
Logic Bombà»ç¹·Õè·ÃÒºÍÕ¡ª×èÍ˹Öè§ÇèÒ Fork Bomb à»ç¹ program ¤ÍÁ¾ÔÇàµÍÃì·Õè½Ñ§ÍÂÙèã¹ memory «Öè§àÁ×èÍ execute áÅéǨеÃǨÊͺËÒÊÀÒ¾ËÃ×ÍʶҹзÕèµéͧ¡Òà áÅÐàÁ×è;ºÊÀ 
English to Thai
MailbombMail ·Õè¡ÃеØé¹ãËé¼ÙéÍ×è¹Êè§ e-mail ¨Ó¹Ç¹ÁÒ¡ä»ÊÙèÃкºÃкºà´ÕÂÇËÃ×ͤ¹¤¹à´ÕÂÇ â´ÂÁÕਵ¹Ò·Õè¨Ð·ÓãËéÃкº¢Í§¼ÙéÃѺ crash Mailbomb ¹Ñ鹶×͡ѹÇèÒà»ç¹¡ÒáÃз 
English to Thai
Malicious CodeHardware, software, ËÃ×Í firmware·ÕèÁÕ¡ÒõÑé§ã¨ãÊèà¢éÒä»ã¹Ãкºà¾×èͨش»ÃÐʧ¤ì·ÕèäÁèä´éÃѺ͹حҵµÑÇÍÂèÒ§àªè¹ Trojan Horse 
English to Thai
MetricµÑÇá»ÃÊØèÁ (random varible) x«Öè§ãªéá·¹»ÃÔÁҳ˹Ö觷ÕèÁÕ¡ÒÃÊÐÊÁÀÒÂ㹪èǧÃÐÂÐàÇÅÒ˹Öè§Mimicking 
English to Thai
Misuse Detection Model¡ÒõÃǨ¨Ñº¡ÒúءÃØ¡â´Â¡ÒÃÁͧËÒ¡Ô¨¡ÃÃÁà¡ÕèÂǡѺ෤¹Ô¤¡ÒúءÃØ¡·Õè·ÃÒºËÃ×Í¡Ô¨¡ÃÃÁà¡ÕèÂǡѺ¤ÇÒÁÅèÍáËÅÁ¢Í§Ãкº à»ç¹·Õè·ÃÒºã¹ÍÕ¡ª×èÍ˹Öè§ÇèÒ Rules Based De 
English to Thai
Mockingbirdâ»Ãá¡ÃÁ¤ÍÁ¾ÔÇàµÍÃìËÃ×Í process ·Õè·Ó·Õà»ç¹ÇèÒ»¯ÔºÑµÔ˹éÒ·Õè·ÕèµÒÁ»¡µÔã¹Ãкºáµè¨Ð·Ó¡Ô¨¡ÃÃÁ·ÕèÁÕਵ¹ÒÃéÒ·ѹ·Õ·Õè¼ÙéãªéÊÑ觠
English to Thai
Multihost Based Auditing¢éÍÁÙÅ¡Òà audit ·ÕèÁÒ¨Ò¡ËÅÒÂæ host·ÕèÍÒ¨¹ÓÁÒãªéµÃǨ¨Ñº¡ÒúءÃØ¡ä´é 
English to Thai
Nak (Negative Acknowledgement) Attackà·¤¹Ô¤¡ÒÃà¨ÒзÕè¶×ÍàÍÒ¤ÇÒÁÍè͹áͧ͢ operating system ·ÕèäÁèÊÒÁÒö¨Ñ´¡ÒáѺ asynchronous interrupt ä´é´Õ¾Í¤×ÍàÁ×èÍÁÕ¡Òà interrupt 
English to Thai
National Computer Security Center (NCSC)à´ÔÁª×èÍÇèÒ DoD (Department of Defense – ¡ÃзÃǧ¡ÅÒâËÁ (ÊËÃÑ°Ï)) Computer Security Center NCSC ÁÕ˹éÒ·ÕèÃѺ¼Ô´ªÍºã¹¡ÒÃÊè§àÊÃÔÁãËéÁÕÃкº¤ÍÁ¾ÔÇàµÍÃì·Õèà 
English to Thai
National Information Infrastructure(NII)â¤Ã§ÊÃéÒ§¾×é¹°Ò¹·Ò§¢éÍÁÙÅáËè§ªÒµÔ (ÊËÃÑ°Ï):¡ÒÃàª×èÍÁµè͡ѹ¢Í§à¤Ã×Í¢èÒÂÊ×èÍÊÒÃ, ¤ÍÁ¾ÔÇàµÍÃì, °Ò¹¢éÍÁÙÅ,áÅÐà¤Ã×èͧãªéä¿¿éÒ·ÑèÇ»ÃÐà·È «Ö觷ÓãËéÁÕ¢éÍÁÙŻà
English to Thai
Network Based¢éÍÁÙÅà¡ÕèÂǡѺ traffic ¢Í§à¤Ã×Í¢èÒÂáÅТéÍÁÙÅ audit ¨Ò¡ host ·Õè¹ÓÁÒãªé㹡ÒõÃǨ¨Ñº¡ÒúءÃØ¡ 
English to Thai
Network Level FirewallFirewallª¹Ô´·ÕèÁÕ¡ÒõÃǨÊͺ traffic ·Õè packetã¹ÃдѺ network protocol (IP) 
English to Thai
Network Security¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑÂà¤Ã×Í¢èÒÂ:¡Òû¡»éͧà¤Ã×Í¢èÒÂáÅкÃÔ¡ÒõèÒ§æ¢Í§à¤Ã×Í¢èÒ¨ҡ¡ÒÃà»ÅÕè¹á»Å§, ·ÓÅÒÂ,ËÃ×Íà»Ô´à¼Ââ´ÂäÁèä´éÃѺ͹حҵáÅÐãËé¤ÇÒÁÃѺÃͧÇèÒà¤Ã× 
English to Thai
Network Security Officerà¨éÒ˹éÒ·ÕèÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑÂà¤Ã×Í¢èÒÂ:¼Ùé«Öè§ä´éÃѺÁͺËÁÒÂÍÂèÒ§à»ç¹·Ò§¡Òèҡ¼Ùé«Öè§ÁÕÍӹҨ˹éÒ·ÕèãËéÁÕ¡Òû¯ÔºÑµÔÍÂèÒ§¶Ù¡µéͧã¹àÃ×èͧ·Õèà¡ÕèÂÇ¢éͧÀÒÂã¹Ã 
English to Thai
Network WeavingÍÕ¡ª×èÍ˹Ö觢ͧ Leapfrogging Non-Discretionary Security¹âºÒ¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑ¢ͧ¡ÃзÃǧ¡ÅÒâËÁ(ÊËÃÑ°Ï) ·Õè¨Ó¡Ñ´¡ÒÃà¢éÒ¶Ö§â´ÂãªéÃдѺ¢Í§ªÑ鹤ÇÒÁÅѺ ª 
English to Thai
Non-RepudiationÇÔ¸Õ¡ÒÃÊ×èÍÊÒëÖ觼ÙéÊ觢éÍÁÙÅä´éÃѺËÅÑ¡°Ò¹ÇèÒä´éÁÕ¡ÒÃÊ觢éÍÁÙÅáÅéÇáÅмÙéÃѺ¡çä´éÃѺ¡ÒÃÂ×¹ÂѹÇèÒ¼ÙéÊè§à»ç¹ã¤Ã ´Ñ§¹Ñé¹ã¹ÀÒÂ˹éÒ·Ñ駼ÙéÊè§áÅмÙéÃѺ¨ÐäÁè 
English to Thai
Open SecurityÊÔè§áÇ´ÅéÍÁ·ÕèäÁèä´éÁÕ¡ÒÃÃѺÃͧ·Õèà¾Õ§¾ÍÇèÒÍØ»¡Ã³ìáÅÐ application µèÒ§æä´éÃѺ¡Òû¡»éͧ¨Ò¡¤ÇÒÁਵ¹ÒÃéÒ ·Ñ駡è͹áÅÐÃÐËÇèÒ§¡Òû¯ÔºÑµÔ§Ò¹¢Í§Ãкº 
English to Thai
Open Systems Security¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑÂã¹Ãкºà»Ô´:à¤Ã×èͧÁ×͵èÒ§æ·ÕèãªéÊÓËÃѺ·ÓãËé¡ÒÃàª×èÍÁµèͧ͢à¤Ã×Í¢èÒ¢ͧÃкºà»Ô´(open systems) µèÒ§æÁÕ¤ÇÒÁ»ÅÍ´ÀÑ 
English to Thai
Operational Data Security¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑ¢ͧ¢éÍÁÙÅ¡Òû¯ÔºÑµÔ¡ÒÃ:¡Òû¡»éͧ¢éÍÁÙŨҡ¡ÒÃà»ÅÕè¹á»Å§, ·ÓÅÒÂ,ËÃ×Íà»Ô´à¼Ââ´ÂäÁèä´éÃѺ͹حҵ·Ñé§â´ÂÍغѵÔà˵ØáÅÐâ´Âਵ¹Òã¹ÃÐËÇèÒ§¡Ò 
English to Thai
Operations Security¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑÂ㹡Òû¯ÔºÑµÔ¡ÒÃ:¤ÇÒÁËÁÒ ñ)¡Ãкǹ¡Ò÷ÕèäÁèÂÍÁãËé½èÒµç¢éÒÁä´éÃѺ¢éÍÁÙÅà¡ÕèÂǡѺ¢Õ´¤ÇÒÁÊÒÁÒöáÅÐਵ¹Ò¢Í§½èÒÂàÃÒâ´Â¡ÒþÔÊÙ¨¹ì·ÃÒº,¤Ç 
English to Thai
Operations Security (OPSEC)»¯ÔºÑµÔ¡ÒäÇÒÁ»ÅÍ´ÀÑÂ:¡Ãкǹ¡ÒþÔÊÙ¨¹ì·ÃÒº¢éÍÁÙÅÊӤѭáÅСÒÃÇÔà¤ÃÒÐËì¡ÒáÃзӢͧ½èÒÂàÃÒ·Õèà¡ÕèÂÇ¢éͧ¡Ñº»¯ÔºÑµÔ¡Ò÷ҧ·ËÒà
English to Thai
OSI – Open Systems InterconnectionÁҵðҹªØ´Ë¹Ö觷Õèä´éÃѺ¡ÒÃÂÍÁÃѺã¹ÃдѺ¹Ò¹ÒªÒµÔáÅÐä´éÃѺ¡ÒþѲ¹ÒÍÂèÒ§à»Ô´à¼Â â´Âà»ç¹Áҵðҹ·ÕèµÃ§µÒÁ¤ÇÒÁµéͧ¡Òâͧ¡ÒúÃÔËÒ÷ÃѾÂÒ¡Ãã¹à¤Ã×Í¢èÒÂáÅТͧ¡ 
English to Thai
Packet¢éÍÁÙÅ block ˹Ö觫Ö觶١Êè§ä»º¹à¤Ã×Í¢èÒ «Ö觢éÍÁÙŹÕé¨Ð»ÃСͺ´éÇÂidentity ¢Í§¼ÙéÊè§áÅмÙéÃѺ, ¢éÍÁÙŤǺ¤ØÁ¤ÇÒÁ¼Ô´¾ÅÒ´, áÅеÑÇ¢éͤÇÒÁ 
English to Thai
Packet Filterà»ç¹µÑǵÃǨÊͺáµèÅÐ packet à¾×èÍÁͧËÒÊÔ觷Õè¼Ùéãªé¡Ó˹´ãËéËÒáµè¨ÐäÁè track ʶҹТͧ sessionà»ç¹ firewall ·ÕèÁÕ¤ÇÒÁ secure ¹éÍ·ÕèÊØ´ª¹Ô´Ë¹Ö觠
English to Thai
Packet Filtering¤Ø³ÅѡɳзÕèà¾ÔèÁà¢éÒä»ã¹ router ËÃ×Í bridgeà¾×èÍ·Õè¨Ð¨Ó¡Ñ´¡ÒÃäËŢͧ¢éÍÁÙŵÒÁ¢éÍ¡Ó˹´·Õ赡ŧ¡Ñ¹äÇé¡è͹ àªè¹ áËÅè§Êè§, áËÅè§ÃѺ, ËÃ×ͪ¹Ô´¢Í§ºÃÔ¡Ò÷Õèठ
English to Thai
Packet SnifferÍØ»¡Ã³ìËÃ×Í program·Õèà½éÒ´Ù¢éÍÁÙÅ·ÕèäËÅä»ÁÒÃÐËÇèÒ§¤ÍÁ¾ÔÇàµÍÃìã¹à¤Ã×Í¢èÒ 
English to Thai
Passive Attack¡ÒÃâ¨ÁµÕẺ Passive:¡ÒÃâ¨ÁµÕ·ÕèäÁè·ÓãËéà¡Ô´¡ÒÃà»ÅÕè¹ʶҹÐâ´ÂäÁèä´éÃѺ͹حҵàªè¹¡ÒÃâ¨ÁµÕ·Õèà¾Õ§áµè¡ÒÃà½éÒ´ÙáÅÐ/ËÃ×ͺѹ·Ö¡¢éÍÁÙÅ 
English to Thai
Passive Threat¡Òäء¤ÒÁ㹡ÒÃà»Ô´à¼Â¢éÍÁÙÅâ´ÂäÁèä´éÃѺ͹حҵâ´ÂäÁèÁÕ¡ÒÃà»ÅÕè¹ʶҹТͧÃкºà»ç¹ª¹Ô´¢Í§¡Òäء¤ÒÁ·Õèà¡ÕèÂÇ¢éͧ¡Ñº¡Òôѡ¨Ñº¢éÍÁÙÅáµèäÁèà¡ÕèÂǡѺ¡ÒÃà»ÅÕè 
English to Thai
Peirod (Full Stop)Generally,There is no full-stop for Thai grammar. Only use with abbreviation 
English to Thai
PEM (Privacy Enhanced Mail)Áҵðҹ¢Í§ IETF ·Õèãªé㹡Òà secure ¡ÒÃáÅ¡à»ÅÕè¹ mail ·Ò§ÍÔàÅç¡·Ã͹ԡ 
English to Thai
« Prev Next »
All of ProZ.com
  • All of ProZ.com
  • Term search
  • Jobs
  • Forums
  • Multiple search