Pages les moins modifiées
Aller à la navigation
Aller à la recherche
Afficher au maximum 50 résultats du nº 101 au nº 150.
- ITIL – Information Technology Infrastructure Library (Bibliothèque de l’infrastructure des technologies de l’information) (1 version)
- Liaison montante (Uplink) (1 version)
- UML (Unified Modeling Language) (Langage de modélisation unifié) (1 version)
- Brouillage (Jamming) (1 version)
- IPBX - Internet Protocol-Private Branch Exchange (Autocommutateur privé) (1 version)
- AuC - Authentication Center (Centre d'authentification) (1 version)
- SOC (Security Operations Center) (1 version)
- Réseau indépendant (1 version)
- Produit de sécurité (1 version)
- RFC - Request for comment (1 version)
- Emulation (Emulation) (1 version)
- Agent (Agent) (1 version)
- Rabbit (1 version)
- PKI - Public Key Infrastructure (Infrastructure à clés publique - ICP) (1 version)
- X (1 version)
- Handover (Transfert inter-cellulaire) (1 version)
- Accès multiple (Multiple Access) (1 version)
- Modulation (Modulation) (1 version)
- Adresse (Address) (1 version)
- IXP – Internet eXchange Point (Point d’échange Internet) (1 version)
- Transhumanisme (Transhumanism) (1 version)
- Communauté (Community) (1 version)
- Non-répudiation (Non-repudiation) (1 version)
- Hypertexte (Hypertext) (1 version)
- Virus polymorphe (Polymorphic virus) (1 version)
- TETRA (Terrestrial Trunked Radio Access) (1 version)
- PHP – Hypertext Preprocessor (1 version)
- PRI - Primary Rate Interface (1 version)
- Faisceau Hertzien (1 version)
- Adressage (Addressing) (1 version)
- HLR - Home Location Register (1 version)
- NBMA – Non Broadcast Multiple Access (1 version)
- MSIN – Mobile Subscriber Identification Number (1 version)
- ANSSI - Agence Nationale de la Sécurité des Systèmes d’Information (1 version)
- Cellule (Cell) (1 version)
- Moindre privilège (Principe de) (1 version)
- Invitation à recevoir (Selecting) (1 version)
- Phishing (Hameçonnage) (1 version)
- Rootkit (Outils de dissimulation d’activité) (1 version)
- Attaque (Attack) (1 version)
- Suivre, suiveur (Follow/Follower) (1 version)
- Bribe (chip) (1 version)
- LAC - Location Area Code (Code de zone de localisation) (1 version)
- Authentification (Authentication) (1 version)
- Heuristique (Heuristics) (1 version)
- Modulation à spectre étalé (Spread Spectrum modulation) (1 version)
- HIPS – Host-based Intrusion Prevention System (1 version)
- DNSSEC (1 version)
- Adresse MAC (Medium Access Control address) (1 version)
- DSL – Digital Subscriber Line (Ligne d’abonné numérique) (1 version)