Pages les moins modifiées
Aller à la navigation
Aller à la recherche
Afficher au maximum 50 résultats du nº 1 au nº 50.
- CTR - Common Technical Regulation (1 version)
- Bitcoin (1 version)
- TRANSPAC (1 version)
- NAT- PT - Network Address Translation - Protocol Trans¬lator (1 version)
- Critère d’audit (1 version)
- LAN - Local Area Network (Réseau Local) (1 version)
- Nom de domaine (Domain name) (1 version)
- UCS (Universal Character Set) (Jeu de caractères universel) (1 version)
- Station de base – BTS (Base Transceiver Station) (1 version)
- Certification de sécurité (1 version)
- PAN – Personal Area Network (1 version)
- FEC - Forwarding Equivalence Class (1 version)
- Réseau de zombies (Botnet) (1 version)
- Internet des objets (Internet Of Things - IOT) (1 version)
- SOA (Service Oriented Architecture) (Architecture Orientée Service) (1 version)
- SSH (Secure Shell) (1 version)
- ETCD - Equipement de Terminaison de Circuits de Données (DCE – Data Communication Equipement) (1 version)
- IT Management (Infogérance) (1 version)
- Table de routage (Routing table) (1 version)
- Cyberdéfense (Cyber defense, Cyberdefence) (1 version)
- Numérisation de l’espace de bataille - NEB (1 version)
- BSS – Base Station Subsystem (Sous-système des stations de base) (1 version)
- MMS - Multimedia Messaging Service (Service de Messagerie MultiMedia) (1 version)
- Confiance, tiers de confiance (Trust – trusted third party TTP) (1 version)
- Homologation de sécurité (Security accreditation) (1 version)
- Barrière (1 version)
- EGP - Exterior Gateway Protocol (1 version)
- ITU - International Telecommunication Union (1 version)
- Brute force (attaque par force brute) (brute-force – brute-force attack) (1 version)
- Adware (Publiciels) (1 version)
- DEFCON - DEFense CONdition (1 version)
- Action de lutte informatique défensive – LID (Computer Network Defense - CND) (1 version)
- Fast Ethernet (1 version)
- Qualification (1 version)
- Décrypter (Decipher) (1 version)
- SMTP (Simple Mail Transfer Protocol) (1 version)
- Code malveillant (Malware) (1 version)
- Contournement de la politique de sécurité (1 version)
- Botnet (botnet) (1 version)
- NFC - Near Field Communication (Communication dans un champ proche) (1 version)
- POP3 - Post Office Protocol 3 (1 version)
- IGP - Interior Gateway Protocol (1 version)
- HTTP - Hyper Text Transmission Protocol (1 version)
- IAB – Internet Activities Board – Internet Architecture Board (1 version)
- Liaison commutée (Circuit switched connection) (1 version)
- Point à point (Point to point) (1 version)
- SCADA (Supervisory Control And Data Acquisition) (1 version)
- URN (Uniform Ressource Name) (1 version)
- SMB (Server Message Block) (1 version)
- Infrastructure (Infrastructure) (1 version)