Pages courtes
Aller à la navigation
Aller à la recherche
Afficher au maximum 50 résultats du nº 1 au nº 50.
- (hist) Faisceau Hertzien [7 octets]
- (hist) Alice [8 octets]
- (hist) Trace [9 octets]
- (hist) SSII - Société de Service et d’Ingénierie Informatique [9 octets]
- (hist) Station de base – BTS (Base Transceiver Station) [9 octets]
- (hist) Réseau étendu (Wide Area Network – WAN) [9 octets]
- (hist) Réseau local (Local Area Network – LAN) [9 octets]
- (hist) Réseau local d’entreprise – RLE (Local Area Network – LAN) [9 octets]
- (hist) Réseau privé virtuel (Virtual Private Network) [9 octets]
- (hist) RTCP - Real-time Transport Control Protocol [9 octets]
- (hist) Nœud de raccordement d’abonnés – NRA [9 octets]
- (hist) IEC - International Electrotechnical Commission (Commission électrotechnique internationale) [9 octets]
- (hist) Global Internet eXchange – GIX [9 octets]
- (hist) Déni de service(Denial of service - DOS) [9 octets]
- (hist) Centre de commutation radio mobile [9 octets]
- (hist) PBX - Private Branch Exchange [10 octets]
- (hist) MCC – Mobile Country Code. [10 octets]
- (hist) MSIN – Mobile Subscriber Identification Number [10 octets]
- (hist) CSIRT - Computer Security Incident Response Team [10 octets]
- (hist) Témoin de connexion (Cookie) [12 octets]
- (hist) Réseau de zombies (Botnet) [12 octets]
- (hist) Pirate informatique (Hacker) [12 octets]
- (hist) Gigue (Jitter) [12 octets]
- (hist) Passerelle (Gateway) [13 octets]
- (hist) Pare-feu (Firewall) [14 octets]
- (hist) Porte dérobée (Backdoor) [14 octets]
- (hist) Données massives (Big data) [14 octets]
- (hist) Coupe-feu (Firewall) [14 octets]
- (hist) Tiers de confiance (Trusted third party – TTP) [15 octets]
- (hist) Peering (Appairage) [15 octets]
- (hist) MNC – Mobile Network Code [15 octets]
- (hist) SS7 (Signaling System 7) [16 octets]
- (hist) Freeware (Gratuiciel) [17 octets]
- (hist) Phishing (Hameçonnage) [18 octets]
- (hist) Point de code (Code point) [18 octets]
- (hist) Internet Protocol – IP (Protocole IP) [18 octets]
- (hist) IT Management (Infogérance) [18 octets]
- (hist) SMF (Single Mode Fiber) (Fibre monomode) [19 octets]
- (hist) NIC – Network Interface card [19 octets]
- (hist) MMF – Multimode Fiber (Fibre Multimode) [19 octets]
- (hist) Trojan [21 octets]
- (hist) Physique (couche) (Physical layer) [21 octets]
- (hist) Informatique dans les nuages, infonuagique [21 octets]
- (hist) Fanion [21 octets]
- (hist) Social engineering (Ingénierie Sociale) [25 octets]
- (hist) Hachage (Hash code) [25 octets]
- (hist) Harponnage (Spear Phishing) [25 octets]
- (hist) Heartbeat (Balisage) [25 octets]
- (hist) Malware (Logiciel malveillant) [26 octets]
- (hist) LAC - Location Area Code (Code de zone de localisation) [26 octets]