Pages courtes

Aller à la navigation Aller à la recherche

Afficher au maximum 50 résultats du nº 1 au nº 50.

Voir (50 précédentes | ) (20 | 50 | 100 | 250 | 500)

  1. (hist) Faisceau Hertzien [7 octets]
  2. (hist) Alice [8 octets]
  3. (hist) Trace [9 octets]
  4. (hist) SSII - Société de Service et d’Ingénierie Informatique [9 octets]
  5. (hist) Station de base – BTS (Base Transceiver Station) [9 octets]
  6. (hist) Réseau étendu (Wide Area Network – WAN) [9 octets]
  7. (hist) Réseau local (Local Area Network – LAN) [9 octets]
  8. (hist) Réseau local d’entreprise – RLE (Local Area Network – LAN) [9 octets]
  9. (hist) Réseau privé virtuel (Virtual Private Network) [9 octets]
  10. (hist) RTCP - Real-time Transport Control Protocol [9 octets]
  11. (hist) Nœud de raccordement d’abonnés – NRA [9 octets]
  12. (hist) IEC - International Electrotechnical Commission (Commission électrotechnique internationale) [9 octets]
  13. (hist) Global Internet eXchange – GIX [9 octets]
  14. (hist) Déni de service(Denial of service - DOS) [9 octets]
  15. (hist) Centre de commutation radio mobile [9 octets]
  16. (hist) PBX - Private Branch Exchange [10 octets]
  17. (hist) MCC – Mobile Country Code. [10 octets]
  18. (hist) MSIN – Mobile Subscriber Identification Number [10 octets]
  19. (hist) CSIRT - Computer Security Incident Response Team [10 octets]
  20. (hist) Témoin de connexion (Cookie) [12 octets]
  21. (hist) Réseau de zombies (Botnet) [12 octets]
  22. (hist) Pirate informatique (Hacker) [12 octets]
  23. (hist) Gigue (Jitter) [12 octets]
  24. (hist) Passerelle (Gateway) [13 octets]
  25. (hist) Pare-feu (Firewall) [14 octets]
  26. (hist) Porte dérobée (Backdoor) [14 octets]
  27. (hist) Données massives (Big data) [14 octets]
  28. (hist) Coupe-feu (Firewall) [14 octets]
  29. (hist) Tiers de confiance (Trusted third party – TTP) [15 octets]
  30. (hist) Peering (Appairage) [15 octets]
  31. (hist) MNC – Mobile Network Code [15 octets]
  32. (hist) SS7 (Signaling System 7) [16 octets]
  33. (hist) Freeware (Gratuiciel) [17 octets]
  34. (hist) Phishing (Hameçonnage) [18 octets]
  35. (hist) Point de code (Code point) [18 octets]
  36. (hist) Internet Protocol – IP (Protocole IP) [18 octets]
  37. (hist) IT Management (Infogérance) [18 octets]
  38. (hist) SMF (Single Mode Fiber) (Fibre monomode) [19 octets]
  39. (hist) NIC – Network Interface card [19 octets]
  40. (hist) MMF – Multimode Fiber (Fibre Multimode) [19 octets]
  41. (hist) Trojan [21 octets]
  42. (hist) Physique (couche) (Physical layer) [21 octets]
  43. (hist) Informatique dans les nuages, infonuagique [21 octets]
  44. (hist) Fanion [21 octets]
  45. (hist) Social engineering (Ingénierie Sociale) [25 octets]
  46. (hist) Hachage (Hash code) [25 octets]
  47. (hist) Harponnage (Spear Phishing) [25 octets]
  48. (hist) Heartbeat (Balisage) [25 octets]
  49. (hist) Malware (Logiciel malveillant) [26 octets]
  50. (hist) LAC - Location Area Code (Code de zone de localisation) [26 octets]

Voir (50 précédentes | ) (20 | 50 | 100 | 250 | 500)