علوم الحاسوب والشبكات وقواعد البيانات
 Share
The version of the browser you are using is no longer supported. Please upgrade to a supported browser.Dismiss

 
View only
 
 
ABCDEFGHIJKLMNOPQRSTUVWXYZAA
1
الصفحة الرئيسيةعلم الحاسوبحماية الحاسوبشبكات الحاسوبغرافيك وتصاميمقواعد البيانات
2
www.arabicwiki.orgComputer ScienceComputer Security
Computer Networking
Graphic and Design
Data Base
3
Cryptanalysis of the EnigmaList of TCP and UDP port numbersList of TCP and UDP port numbersList of Kung Fu Panda characters
Comparison of relational database management systems
4
Comparison of relational database management systems
Cracking of wireless networksList of device bit ratesList of Red vs. Blue charactersCommitment ordering
5
Usage share of operating systemsJuniper Networks
List of acquisitions by Cisco Systems
List of Madagascar (franchise) characters
Null (SQL)
6
Glossary of graph theory termsPaywall
Semi-Automatic Ground Environment
Comparison of layout engines (Cascading Style Sheets)
Microsoft Data Access Components
7
Commitment orderingCryptomeList of WiMAX networks
The Penguins of Madagascar (season 2)
Government database
8
ALGOL 68
Intel Active Management Technology
Comparison of open-source wireless drivers
List of Code Lyoko episodesCluster analysis
9
List of computer science conferences
Dual EC DRBGJuniper NetworksHistory of computer animation
List of academic databases and search engines
10
Common LispIT riskTechnological convergenceList of Shrek charactersMAINWAY
11
Timeline of quantum computingAutoRun
List of Internet exchange points by size
Mondo TVContactPoint
12
مشروع الترجمة الأوسع لإثراء الويكيبيديا العربية
من مختلف التخصصات.
تم تجميع مقالات من الويكيبيديا الإنجليزية، بحاجة للإنشاء
على الويكيبيديا العربية من قبل أعضاء في مبادرة ض لتطوير
الويكيبيديا العربية.
نتمنى أن يسهل عليكم هذا المشروع
إيجاد المقالات المناسبة للترجمة بسهولة!
Topological data analysisTrusted Computing100 Gigabit Ethernet
Comparison of layout engines (Document Object Model)
Relational algebra
13
BombeSHA-1Email spamHoodwinked!DNA database
14
Book embeddingLinux malware
Windows Vista networking technologies
Monster High (web series)Btrieve
15
Unification (computer science)SHA-2FidoNet
Comparison of layout engines (HTML5)
DBase
16
2-satisfiabilityAACS encryption key controversyEndiannessList of Pixar film referencesDavid McGoveran
17
Computer chessWindows SearchLeaky bucketCars (franchise)Apache Cassandra
18
Monad (functional programming)Cisco PIXRONJARed vs. BlueJoin (SQL)
19
Generic programmingMobile device forensicsDeep packet inspection
List of Pixar awards and nominations (feature films)
Relational model
20
Cell (microprocessor)Cyber-security regulation
National Science Foundation Network
Hot Wheels AcceleRacersList of biological databases
21
Actor modelList of computer criminalsSynchronous optical networking
Green Lantern: The Animated Series
Global serializability
22
Computational creativityFortinetX.509Shrek (franchise)Claritas Prizm
23
Null (SQL)
Sony BMG copy protection rootkit scandal
Server Message BlockList of computer-animated filmsSerializability
24
Microsoft Data Access ComponentsGemaltoSHA-1
List of Hot Wheels Battle Force 5 characters
Open Database Connectivity
25
Colossus computerNorton 360SHA-2
The Penguins of Madagascar (season 3)
Comparison of database tools
26
Government database
Hackers: Heroes of the Computer Revolution
AppleTalk
Star Wars: The Clone Wars (2008 TV series)
Graph database
27
Exception handlingUnited States Cyber Command
Digital Enhanced Cordless Telecommunications
TronAstrophysics Data System
28
Artificial general intelligenceWhiz Kids (TV series)Cisco PIXReBootTeradata
29
Cluster analysisPaXEthernet physical layerMadagascar (franchise)Microsoft Jet Database Engine
30
List of academic databases and search engines
Zango (company)List of Bluetooth profiles
How to Train Your Dragon (franchise)
Object-relational impedance mismatch
31
Agent-based modelData breachPower over EthernetList of Red vs. Blue special episodesSafetyLit
32
Consistency modelComodo GroupH.323Star Wars: The Clone Wars (film)List of neuroscience databases
33
Boolean satisfiability problemExtensible Authentication ProtocolDigital media playerScale spaceExtract, transform, load
34
Dual EC DRBGPrivacy-invasive softwareZero-configuration networkingFather of the PridePhilippine E-Journals
35
List of important publications in computer science
Cult of the Dead CowDell PowerConnectMetalocalypseCyc
36
Ant colony optimization algorithms
Payment Card Industry Data Security Standard
CobraNetSuper Why!HeinOnline
37
CORDICMultilevel securityExtensible Authentication ProtocolSkylandLexisNexis
38
MAINWAYBrowser hijackingHayes command setJohnny TestIsolation (database systems)
39
Affective computingBuffer overflow protectionNamed data networking
Roughnecks: Starship Troopers Chronicles
Two-phase locking
40
List of academic computer science departments
List of warez groupsIEEE 802.11n-2009
Comparison of layout engines (ECMAScript)
Bitmap index
41
Directed acyclic graphJeremy HammondEmail addressDitherR-tree
42
ContactPointComputer security conferenceGoogle Data CentersJPEG XRFunctional dependency
43
Block cipherCyber security standardsCisco CatalystComputer display standard
Business performance management
44
Relational algebraLocal shared objectRapidIO
List of The Adventures of Jimmy Neutron: Boy Genius episodes
GeoBase (geospatial data)
45
Closure (computer programming)
International Safe Harbor Privacy Principles
IEEE 1355Hoodwinked Too! Hood vs. EvilEmbedded database
46
MicrokernelCVSSLeader electionRed vs. Blue (season 4)Column-oriented DBMS
47
Trusted ComputingNT LAN ManagerIP multicastList of The Strangerhood episodesGadfly (database)
48
Upper ontologyGary McKinnonALOHAnetKung Fu Panda (franchise)Database marketing
49
History of cryptographyCommon CriteriaLink aggregationBrainPopQuotient filter
50
DNA databaseMalwarebytesISCSIShadow RaidersMetadata standard
51
CypherpunkMontgomery modular multiplicationOptical fiber connectorLightWave 3DTephritid Workers Database
52
RC4Cold boot attackDOCSISChop Socky ChooksShard (database architecture)
53
SHA-1
Address space layout randomization
Token ring
Comparison of layout engines (Scalable Vector Graphics)
Architecture of Btrieve
54
Optimizing compilerITIL security managementWhite spaces (radio)List of VeggieTales charactersJD Edwards
55
BtrieveHacker ethicNetFlow
List of Hot Wheels Battle Force 5 episodes
SAP HANA
56
SHA-2Trend MicroAnonymous P2PPolyharmonic splineSpatial database
57
IteratorWi-Fi Protected AccessNT LAN ManagerIron Man: Armored AdventuresAnomaly detection
58
Multiplication algorithmExtended Validation CertificateCaBIGPacific Data ImagesHierarchical clustering
59
Stochastic context-free grammarMulti-factor authenticationDICOM
Timeline of computer animation in film and television
Foreign key
60
DBaseBruce SchneierOrganizationally unique identifierPeter Rabbit (TV series)Unique key
61
W. T. TutteForcepointMedia-independent interfaceFinding Nemo (franchise)XLeratorDB
62
David McGoveranRainbow tableList of SIP response codes
Kung Fu Panda: Legends of Awesomeness (season 2)
Biobase (company)
63
Minimum spanning treeISO/IEC 27001:2005Internet in UkraineRed vs. Blue (season 5)Schedule (computer science)
64
Exact coverMovielandHayes Microcomputer ProductsBravest WarriorsTwo-phase commit protocol
65
Futures and promisesUnix securityWi-Fi Protected AccessBabar and the Adventures of BadouSciELO
66
Context-free grammarSwattingCooperative MIMONeurotically YoursTransitive closure
67
A New Kind of ScienceProofpoint, Inc.Ethernet frameJimmy Neutron: Boy GeniusRedis
68
Join (SQL)Skype securityJim Allchin
Kung Fu Panda: Legends of Awesomeness (season 1)
Bigtable
69
Tutte polynomialMandatory access controlSkype securityDan Vs.Lloyd's algorithm
70
Maximal independent setProtection ring
Enhanced Interior Gateway Routing Protocol
Planet 51
Hierarchical and recursive queries in SQL
71
Magic number (programming)Barracuda NetworksXMODEMBlob detectionCursor (databases)
72
Mersenne TwisterEinstein (US-CERT program)
List of assigned /8 IPv4 address blocks
Tinker Bell (film)Database design
73
Comparison of parser generatorsIdentity managementEtherCATThe Buzz on MaggieAtomic commit
74
Communicating sequential processes
Return-oriented programmingBarracuda NetworksFractal-generating softwareLocal outlier factor
75
Aspect-oriented software development
Federal Information Security Management Act of 2002
HomePlugGrowing Up CreepieHugh Darwen
76
Relational modelStankDawgPrecision Time ProtocolLuxo Jr.Flat file database
77
ECMAScriptKernel Patch Protection
Small form-factor pluggable transceiver
Red vs. Blue (season 3)Xenbase
78
Code talkerCyberwarfare by Russia
Advanced Message Queuing Protocol
The French DemocracyPanjab Digital Library
79
Kolmogorov complexity/dev/randomHome networkDonkey XoteParAccel
80
Code page 437Security-focused operating systemEthernet over twisted pairXavier: Renegade AngelMaster data management
81
CoroutineIEEE 802.1XCANopenBarbie: Princess Charm SchoolData warehouse appliance
82
Block cipher mode of operationClickjackingBandwidth allocation
Comparison of layout engines (MathML)
IBM Informix
83
Global serializabilityAnkit FadiaIEEE 802.1XTinker Bell and the Lost TreasureAozora Bunko
84
Applications of artificial intelligenceInformation technology controlsRS-485
Comparison of layout engines (XHTML 1.1)
BusinessObjects
85
Radix sortMan-in-the-browserForce10Match movingExecutive information system
86
Tracing garbage collectionTokenization (data security)Root name serverBionicle 2: Legends of Metru NuiThird normal form
87
Standard MLExecutable space protectionRepresentational state transferTin ToyData architecture
88
Graph isomorphism problem2007 cyberattacks on EstoniaTelebitEssential matrixScience Citation Index
89
Graph minorStratus VOSLine Mode Browser
List of accolades received by Life of Pi
Music information retrieval
90
List of terms relating to algorithms and data structures
Messenger Plus!TERENAPixel art scaling algorithmsDatabase schema
91
Branch predictorApplication firewallCeph (software)
Comparison of layout engines (HTML)
Database transaction
92
Letter frequencyDigest access authenticationMulti-link trunkingRed vs. Blue (season 1)SQL Server Compact
93
RewritingChristopher SoghoianApplication firewall
Quantum Quest: A Cassini Space Odyssey
Australian Bibliographic Network
94
Shortest path problemHackers on Planet EarthISO/IEEE 11073Flatland (2007 film)Database Workbench
95
HeapsortPort scannerGigabit EthernetComputer facial animationMultiversion concurrency control
96
Concurrency controlSalsa208b/10b encodingList of Code Lyoko charactersIn-memory database
97
SerializabilitySecurity tokenAvaya ERS 8600Red vs. Blue (season 2)Star schema
98
Tail callWinFixerCarrier EthernetArthur and the InvisiblesComparison of data modeling tools
99
Fold (higher-order function)Session fixationEthernet in the first milePrincess FionaSimple Features
100
Outline of artificial intelligenceEdward FeltenPreboot Execution EnvironmentList of machinima festivalsCorrelation clustering
Loading...
 
 
 
علوم الحاسوب،شبكات،قواعد بيانات