Pages courtes

Aller à la navigation Aller à la recherche

Afficher au maximum 50 résultats du nº 751 au nº 800.

Voir ( | ) (20 | 50 | 100 | 250 | 500)

  1. (hist) Ligne de transmission [632 octets]
  2. (hist) AMRC - Accès Multiple par Répartition en Code (CDMA – Code Division Multiple Access) [634 octets]
  3. (hist) Registre (Register) [635 octets]
  4. (hist) Cellule (Cell) [636 octets]
  5. (hist) Fichier exécutable (Executable file) [639 octets]
  6. (hist) Données sensibles [639 octets]
  7. (hist) SOA (Service Oriented Architecture) (Architecture Orientée Service) [643 octets]
  8. (hist) IPS - Intrusion Prevention System (Système de prévention d’intrusion) [643 octets]
  9. (hist) Appairage (peering) [643 octets]
  10. (hist) TELNET (TELecommunication NETwork) [644 octets]
  11. (hist) Slacktivisme [644 octets]
  12. (hist) Infobésité (Information overload) [644 octets]
  13. (hist) Virtuel (Virtual) [645 octets]
  14. (hist) IDoT – Identity of things (Identité des objets) [645 octets]
  15. (hist) Enregistreur de frappe (Keystroke Logger - Keylogger) [648 octets]
  16. (hist) Cybercriminalité (Cybercriminality, Cybercrime) [649 octets]
  17. (hist) Intrusion (Intrusion) [651 octets]
  18. (hist) FTP - File Transfert Protocol (Protocole de transfert de fichiers) [653 octets]
  19. (hist) Registre Internet Régionaux (RIR) (Regional Internet Registry) [656 octets]
  20. (hist) Attaque (Attack) [656 octets]
  21. (hist) SIEM (Security Information and Event Management) [658 octets]
  22. (hist) ISL – Inter Switch Link [660 octets]
  23. (hist) Cyberdéfense (Cyber defense, Cyberdefence) [660 octets]
  24. (hist) Backdoor (Porte dérobée) [661 octets]
  25. (hist) Ping [662 octets]
  26. (hist) Session (Session) [663 octets]
  27. (hist) Add-on (Additif – Module complémentaire - Plug-in) [663 octets]
  28. (hist) Transport (couche) (Transport layer) [664 octets]
  29. (hist) Parité [664 octets]
  30. (hist) Frame Relay (Relai de trame) [664 octets]
  31. (hist) Accès (Access- hit) [666 octets]
  32. (hist) WCDMA (Wideband Code Division Multiple Access) (Multiplexage par code large bande) [666 octets]
  33. (hist) Binaire (Binary) [666 octets]
  34. (hist) UTF (Unicode Transformation Format) [667 octets]
  35. (hist) Data center (Centre de traitement de données) [667 octets]
  36. (hist) Heuristique (Heuristics) [668 octets]
  37. (hist) MAC – Media Access Control (Contrôle d’accès au support) [672 octets]
  38. (hist) Kerberos [674 octets]
  39. (hist) Homologation de sécurité (Security accreditation) [674 octets]
  40. (hist) Système d’information industriel (Industrial Information System – IIS) [676 octets]
  41. (hist) RAT (Remote Administration Tool) [677 octets]
  42. (hist) OSS - Operating System and Service (Sous système d’exploitation et de maintenance) [678 octets]
  43. (hist) RSA - Rivest, Shamir, Adelman [680 octets]
  44. (hist) Renifleur (Sniffer) [684 octets]
  45. (hist) Data scientist [685 octets]
  46. (hist) Bogue (Bug) [685 octets]
  47. (hist) STIX (Structured Threat Information eXpression) [686 octets]
  48. (hist) DoS et DDoS (Denial of service - Deny Of Service) [689 octets]
  49. (hist) Courtier en accès initial (Initial Access Broker) [689 octets]
  50. (hist) Numérisation (Digitizing) [692 octets]

Voir ( | ) (20 | 50 | 100 | 250 | 500)