علوم الحاسوب والشبكات وقواعد البيانات
 Share
The version of the browser you are using is no longer supported. Please upgrade to a supported browser.Dismiss

 
View only
 
 
ABCDEF
1
الصفحة الرئيسيةعلم الحاسوبحماية الحاسوبشبكات الحاسوبغرافيك وتصاميمقواعد البيانات
2
www.arabicwiki.orgComputer ScienceComputer Security
Computer Networking
Graphic and Design
Data Base
3
SHA-2Access tokenList of TCP and UDP port numbers
Star Wars: The Clone Wars (2008 TV series)
Cluster analysis
4
Speculative executionList of TCP and UDP port numbersSOCKSStar Wars: The Clone Wars (film)Extract, transform, load
5
Year 2038 problemSwattingSHA-2Shrek (franchise)Apache Cassandra
6
Directed acyclic graphSOCKS
List of Internet exchange points by size
TronDatabase schema
7
Cluster analysisSHA-2Email address
How to Train Your Dragon (franchise)
Join (SQL)
8
SHA-1SHA-1Power over EthernetReBootGraph database
9
Bitwise operationTorpigSHA-1Kung Fu Panda (franchise)SAP HANA
10
ECMAScriptWi-Fi Protected AccessEndiannessRed vs. BlueHierarchical clustering
11
Breadth-first searchRainbow tableEmail spamMadagascar (franchise)Relational model
12
مشروع الترجمة الأوسع لإثراء الويكيبيديا العربية
من مختلف التخصصات.
تم تجميع مقالات من الويكيبيديا الإنجليزية، بحاجة للإنشاء
على الويكيبيديا العربية من قبل أعضاء في مبادرة ض لتطوير
الويكيبيديا العربية.
نتمنى أن يسهل عليكم هذا المشروع
إيجاد المقالات المناسبة للترجمة بسهولة!
3-D Secure
Payment Card Industry Data Security Standard
Server Message BlockMetalocalypse
List of academic databases and search engines
13
Usage share of operating systems
Certified Information Systems Security Professional
Ethernet frameList of Shrek charactersRedis
14
Polymorphism (computer science)
Intel Active Management Technology
Wi-Fi Protected AccessMickey Mouse ClubhouseThird normal form
15
Block cipher mode of operationGary McKinnonRS-485List of Kung Fu Panda charactersShard (database architecture)
16
Salt (cryptography)Chief information officerAutonomous system (Internet)Cars (franchise)Relational algebra
17
Exclusive orKeychain (software)List of SIP response codesJimmy Neutron: Boy GeniusMaster data management
18
Hash-based message authentication code
IEEE 802.1XList of Bluetooth profilesSpline (mathematics)LexisNexis
19
Extract, transform, loadAir gap (networking)List of DNS record typesPlanet 51Star schema
20
Singleton patternProtection ringX.509Weta DigitalColumn-oriented DBMS
21
Cryptanalysis of the EnigmaHardware security moduleCNAME recordJohnny TestSecond normal form
22
TrieCertified Ethical HackerIP over Avian CarriersMia and MeAnomaly detection
23
HeapsortFIPS 140-2Gigabit EthernetDither
Comparison of relational database management systems
24
Rainbow table
Address space layout randomization
DOCSISArthur and the InvisiblesData mart
25
Tree traversalExtensible Authentication ProtocolApplication layer
List of Madagascar (franchise) characters
Open Database Connectivity
26
Behavior-driven developmentBonziBuddyIEEE 802.11n-2009Hoodwinked!Database design
27
TypeScriptJuniper Networks
Small form-factor pluggable transceiver
BrainPopTeradata
28
Levenshtein distanceRole-based access controlMulticast addressList of computer-animated filmsIsolation (database systems)
29
Activation functionGemalto
List of network protocols (OSI model)
Perlin noiseScience Citation Index
30
Code talkerSneakers (1992 film)HostnamePrincess FionaUpdate (SQL)
31
Abstract data typeChaos Communication CongressLocalhostBeast Wars: TransformersTwo-phase commit protocol
32
Artificial general intelligenceWhitelistRsyncTinker Bell (film)Two-phase locking
33
Database schemaWebrootIEEE 802.1QBarbie in the NutcrackerDatabase transaction
34
Prim's algorithmTrend MicroReal-time Transport ProtocolMickey's Twice Upon a ChristmasR-tree
35
Join (SQL)Segmentation faultLink aggregationXavier: Renegade AngelFlat file database
36
Factory method patternReturn-oriented programmingMaximum transmission unitUV mappingView (SQL)
37
Minimum spanning treeIdentity managementNetwork File SystemStar Wars DetoursIn-memory database
38
Hierarchical clusteringPatch TuesdayZ-Wave
Green Lantern: The Animated Series
JD Edwards
39
Topological sortingIptablesOptical fiber connectorCel shadingTime series database
40
CypherpunkDigest access authenticationIEEE 802.1XA Monster in ParisAtomicity (database systems)
41
Cosine similarityExtended Validation CertificateMulti-mode optical fiberValiant (film)Functional dependency
42
Priority queueISO/IEC 27002List of IP protocol numbersSuper Why!BusinessObjects
43
Relational modelClickjackingAir gap (networking)Father of the PrideSnowflake schema
44
List of academic databases and search engines
Cyber security standardsReserved IP addressesIgor (film)Serializability
45
Zero-knowledge proofKill switchMulticast9 (2005 film)Executive information system
46
Magic number (programming)Common CriteriaMulticast DNSAnisotropic filteringDBase
47
Monad (functional programming)Mail and wire fraudISCSIImage scalingCodd's 12 rules
48
Branch predictorUnited States Cyber CommandDefault gatewayComputer display standardDenormalization
49
Hamming distancePacket analyzerReverse DNS lookupList of VeggieTales charactersBigtable
50
Boolean satisfiability problem
Common Vulnerabilities and Exposures
Link-local addressThe Magic Roundabout (film)Comparison of database tools
51
Radix sortSecurity tokenGreenfield projectMake Love, Not WarcraftOperational data store
52
Business Process Model and Notation
Jonathan JamesBroadcast address
Timeline of computer animation in film and television
List of biological databases
53
Context-free grammarSelf-signed certificateExtensible Authentication ProtocolIron Man: Armored AdventuresCursor (databases)
54
FoobarChinese wallList of device bit ratesPororo the Little PenguinMultiversion concurrency control
55
Shortest path problemFork bombJuniper Networks
List of The Adventures of Jimmy Neutron: Boy Genius episodes
Spatial database
56
IdempotenceData breachDeep packet inspectionPeter Rabbit (TV series)Candidate key
57
Applications of artificial intelligenceData loss prevention softwareISO/IEC 11801JPEG XRCitation index
58
Third normal formStateful firewallSerial communicationMultisample anti-aliasingSuperkey
59
One-time passwordComparison of firewallsSynchronous optical networkingHawaiian VacationWhere (SQL)
60
Memory hierarchyOWASPIEEE 802
A Fairly Odd Movie: Grow Up, Timmy Turner!
Null (SQL)
61
Best, worst and average casePaywallTrivial File Transfer ProtocolFetch! with Ruff RuffmanTransitive closure
62
Check digitCertificate signing requestEthernet over twisted pairTin ToyCyc
63
Binary heapIEEE 802.11i-2004AirPort Time CapsuleAppleseed (film)SCImago Journal Rank
64
Real-time computingList of warez groupsIEEE 802.15.4Barbie of Swan LakeDatabase application
65
Letter frequencyNetwork Access Control
Advanced Message Queuing Protocol
Barbie: Princess Charm SchoolFourth normal form
66
Integer (computer science)Port scannerIGMP snoopingBlob detectionComparison of data modeling tools
67
Elliptic Curve Digital Signature Algorithm
Key derivation functionAnycastMipmapMicrosoft Jet Database Engine
68
Jaccard indexFireEyeData URI schemeHoodwinked Too! Hood vs. EvilData architecture
69
Relational algebraRoot certificateDICOMList of Code Lyoko episodes
Object-relational impedance mismatch
70
Event-driven programmingZip bombSimple Service Discovery ProtocolEveryone's HeroBibliographic database
71
BombeSYN floodPreboot Execution EnvironmentMonster High (web series)Lloyd's algorithm
72
Windows-1252Tokenization (data security)Token ringMorphingUnique key
73
Canny edge detectorNT LAN ManagerEtherTypeBarbie as Rapunzel
Hierarchical and recursive queries in SQL
74
Message authentication codeJeremy HammondSingle-mode optical fiberHappily N'Ever AfterConsistency (database systems)
75
B+ treeFortinetProfibusBarbie: Fairytopia
Business performance management
76
Colossus computerSecurity-focused operating systemDistance-vector routing protocolFBXList of online databases
77
Command patternComodo GroupPrecision Time ProtocolHot Wheels AcceleRacersSocial Sciences Citation Index
78
Associative arrayStack buffer overflowName server
Quantum Quest: A Cassini Space Odyssey
OLE DB
79
Beale ciphersDNS spoofingIP multicastPartysaurus RexData architect
80
Actor modelCracking of wireless networks100 Gigabit EthernetMidori (web browser)Embedded database
81
Star schemaAuthenticated encryptionGoogle Data CentersRonal the BarbarianSQL Server Compact
82
Call stackCurve25519HTTP compressionImage gradientChoral Public Domain Library
83
Birthday attackMalwarebytesALOHAnet
List of The Penguins of Madagascar episodes
Database marketing
84
Object-oriented analysis and designIxquickPacket lossList of 2D animation softwarePower Pivot
85
Context switch
HMAC-based One-time Password Algorithm
F5 NetworksSir BilliIEEE Xplore
86
Forward secrecyBruce SchneierSTUN
Roughnecks: Starship Troopers Chronicles
Bitmap index
87
Column-oriented DBMSAnkit FadiaGeneric Routing EncapsulationList of Red vs. Blue charactersDatabase connection
88
Shamir's Secret SharingISO/IEC 27001:2005Packet analyzerJBIGDelete (SQL)
89
Blowfish (cipher)Service set (802.11 network)Mobile broadbandSpace ChimpsFifth normal form
90
Second normal formBrain (computer virus)Abstract Syntax Notation OneKhumbaSQL-92
91
Role-based access controlISACAWi-Fi AllianceSmall Fry (film)Local outlier factor
92
MicrokernelTiger team
Digital Enhanced Cordless Telecommunications
Bunyan and BabeArmstrong's axioms
93
RC4Chief information security officerTechnological convergenceBarbie and the Magic of PegasusIBM Informix
94
Signed number representationsBrowser hijacking
List of assigned /8 IPv4 address blocks
Microsoft Photo EditorData domain
95
David GelernterMAC spoofingLink-state routing protocolHoudini (software)CODASYL
96
Block cipherHardening (computing)ProvisioningHistory of computer animationMicrosoft Data Access Components
97
Anomaly detectionDevice fingerprintNetwork addressIce Age: A Mammoth ChristmasAtomic commit
98
Comparison of relational database management systems
KoobfaceDatagramGift of the Night FuryRelational calculus
99
Chomsky hierarchyApplication securityVirtual routing and forwardingHot Wheels Battle Force 5SQL Anywhere
100
Data martMandatory access controlNon-return-to-zeroMean shiftData aggregation
Loading...
Main menu