Pages courtes

Aller à la navigation Aller à la recherche

Afficher au maximum 50 résultats du nº 801 au nº 850.

Voir ( | ) (20 | 50 | 100 | 250 | 500)

  1. (hist) CVSS – Common Vulnerability Scoring System [693 octets]
  2. (hist) Adresse MAC (Medium Access Control address) [695 octets]
  3. (hist) EFF- Electronic Fontier Foundation [697 octets]
  4. (hist) Stéganographie (Steganography) [699 octets]
  5. (hist) Adware (Publiciels) [699 octets]
  6. (hist) Gain (Gain) [702 octets]
  7. (hist) Terminal (Terminal) [703 octets]
  8. (hist) TE0152: Loi de Weber-Fechner [707 octets]
  9. (hist) Honey words (Leurre de mots de passe) [709 octets]
  10. (hist) Cyberdéfense militaire (Millitary Cyberdefence) [709 octets]
  11. (hist) Renseignement d’Intérêt Cyber-RIC (Cyber intelligence) [710 octets]
  12. (hist) Framework (Cadre d’application – socle d’application – cadriciel) [715 octets]
  13. (hist) Preuve numérique (Digital proof) [717 octets]
  14. (hist) OTP – One Time Pad (Masque jetable) [717 octets]
  15. (hist) X.25 [719 octets]
  16. (hist) Carte SIM (Subscriber Identity Mobile card) [722 octets]
  17. (hist) MITRE [723 octets]
  18. (hist) Moore - Loi de Moore [723 octets]
  19. (hist) RSSI – Responsable de la Sécurité des Systèmes d’Information [725 octets]
  20. (hist) Gestionnaire de communauté (Community manager) [725 octets]
  21. (hist) Décrypter (Decipher) [725 octets]
  22. (hist) CAPEC – Common Attack Pattern Enumeration and Classification [725 octets]
  23. (hist) Dématérialisation (Dematerialization) [727 octets]
  24. (hist) LTE – Long Term Evolution [732 octets]
  25. (hist) Protocole de routage (Routing protocol) [733 octets]
  26. (hist) SQL (Structured Query Lanquage) [734 octets]
  27. (hist) Chroot Jail [734 octets]
  28. (hist) API - Application Programming Interface (Interface de programmation) [737 octets]
  29. (hist) Elévation de privilège (Privilege Escalation) [738 octets]
  30. (hist) Computer Network Operations – CNO (Opérations Informatiques) [740 octets]
  31. (hist) HSDPA - High Speed Download Packet Access [749 octets]
  32. (hist) Incident (Incident) [754 octets]
  33. (hist) Logiciel (Software) [756 octets]
  34. (hist) NTP – Network Time Protocol [763 octets]
  35. (hist) Middleware (Intergiciel – Logiciel médiateur) [763 octets]
  36. (hist) Cobalt Strike [763 octets]
  37. (hist) TE0331: Effet de récence [764 octets]
  38. (hist) SHTTP (Secure Hypertext Transfer Protocol) [764 octets]
  39. (hist) Pair à pair (Peer to peer – P2P) [764 octets]
  40. (hist) TE0121: Illusion de la fréquence [765 octets]
  41. (hist) Point d'accès (Access Point) [766 octets]
  42. (hist) Payload (Charge utile – Charge active) [767 octets]
  43. (hist) Evènement redouté (Feared event) [768 octets]
  44. (hist) Code (Code) [773 octets]
  45. (hist) FH- Faisceau Hertzien [775 octets]
  46. (hist) Critères communs (CC) (Common criteria) [775 octets]
  47. (hist) SMURF (attaque) (Attaque par réflexion) [781 octets]
  48. (hist) Clé USB à mémoire flash (Memory stick) [784 octets]
  49. (hist) Règle de détection (Detection rules) [789 octets]
  50. (hist) Fuite d’information (Leak) [789 octets]

Voir ( | ) (20 | 50 | 100 | 250 | 500)