Show Summary Details

Quick Reference

1 Pretending to be another user, usually in order to make an illegal access to a computer network.

2 Used to describe the process whereby a piece of hardware such as a telephone or a client computer is configured to appear as a different telephone or client.

Subjects: Computing.

Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.