Pages les moins modifiées
		
		
		
		Aller à la navigation
		Aller à la recherche
		
Afficher au maximum 50 résultats du nº 401 au nº 450.
- Transfert de zone (DNS) (Zone transfer) (1 version)
- Corruption (Corruption) (1 version)
- Hot Spot (Borne WiFi publique) (1 version)
- OTP – One Time Pad (Masque jetable) (1 version)
- SCADA (Supervisory Control And Data Acquisition) (1 version)
- Cryptologie (Cryptology) (1 version)
- Gigabit Ethernet (1 version)
- NIC – Network Interface card (1 version)
- Shannon (Shannon) (1 version)
- Cyberespionnage (Cyber espionage, Cyber spying) (1 version)
- Fast Packet Switching – FPS (Commutation de paquets rapide) (1 version)
- SIM (Subscriber Identity Mobile) (1 version)
- Banque de données (Data bank) (1 version)
- Firewall (Pare-feu) (1 version)
- MAN - Metropolitan Area Network (Réseau métropolitain) (1 version)
- Sonde de détection d’attaque (1 version)
- Bimode (Dual mode) (1 version)
- Fréquence (Frequency) (1 version)
- MIC - Modulation par Impulsions Codées (PCM - Pulse Code Modulation) (1 version)
- Stéganographie (Steganography) (1 version)
- Bribe (chip) (1 version)
- Emulation (Emulation) (1 version)
- Mode de transmission synchrone (1 version)
- Rabbit (1 version)
- Adresse (Address) (1 version)
- Evanouissement (Fading) (1 version)
- MTA - Message Transfer Agent (1 version)
- Registre (Register) (1 version)
- Algorithme (1 version)
- Débit (Flow – rate) (1 version)
- Large bande (Broadband) (1 version)
- Réseau d’infrastructure (Core network – infrastructure network) (1 version)
- ANFR - Agence Nationale des Fréquences (1 version)
- Détournement de DNS (DNS Tunneling) (1 version)
- LiFi (Light Fidelity - LiFi) (1 version)
- Ligne de défense (Ligne of défense) (1 version)
- ROM – Read Only Memory (1 version)
- Accès multiple (Multiple Access) (1 version)
- Article Contrôlés de la Sécurité des Systèmes d’Information – ACSSI (1 version)
- Données massives (Big data) (1 version)
- Keylogger – keystroke loger (Enregistreur de frappe) (1 version)
- Pair à pair (Peer to peer – P2P) (1 version)
- WAP (Wireless Application Protocol) (1 version)
- Authentification (Authentication) (1 version)
- Duplex (Duplex) (1 version)
- Identification (Identification) (1 version)
- PHP – Hypertext Preprocessor (1 version)
- Virus polymorphe (Polymorphic virus) (1 version)
- Cartographie de menace numérique de l’écosystème (Ecosystem digital threat mapping) (1 version)
- Infogérance (I.T. Management) (1 version)