startup (1)
=
buuting
AKIT
Inglise
Eesti
#
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
S
s2s
s2s
SA
SAaaS
SaaS (1)
SaaS (2)
SaaS (3)
sabotage
saddle stapling
saddle stitching with staples
saddle stitching with thread
safe (1)
safe (2)
safe deposit box
safeguard
safeguarding
SafeKey
safe mode
safe prime
safety
safety data sheet
safety extra-low voltage
safety factor
safety-instrumented system
safety integrity
safety integrity level
safety measure
safety net (1)
safety plan
safety shield
safety system
safety threshold
SAGE
SAID (1)
SAID (2)
SAIDI
salami shaving
salami slicing
salami tactics
salt
SAM (1)
SAM (2)
Samba
same-origin policy
SAML
SAM owner
sample (1)
sample (2)
sample (3)
sample (4)
sample (5)
sample rate
sample space
sample tag (1)
sample tag (2)
sampling (1)
sampling (2)
sampling (3)
sampling frequency (1)
sampling frequency (2)
sampling rate
sampling unit
SAM practitioner
SAM program scope
SAM tool
SAN
sanction (1)
sanction (2)
sanction (3)
sand
sandbox
sandboxing
Sandworm
sanitization (1)
sanitization (2)
sanitize
sanitizing
sanity check
SANS
SANS Institute
SAN switch
SAP (1)
SAP (2)
SAP (3)
SAP ERP
SAR
Sasser
SATA
satisfaction (1) *
satoshi
save (1)
save (2)
Saville
savvy
SBC
SBD
SBDH
SBIRS
S-box transformation
SBU
SCADA
scaffolding *
scalability
scalable
scalar
scalar product
scalar type *
scale (1)
scale (2)
scale (3)
scaled value
scale factor
scale out
scale type *
scale up
scaling
scam
scam baiting
scan
scan engine
scan line *
scanner
scanning probe microscopy
scanning server
SCAP
Scarab
scareware
scavenging
SCCM
SCCP (1)
SCCP (2)
SCD (1)
SCD (2)
scenario
scene location
schedule
scheduled maintenance
scheduler
schema
schemata
schematic diagram
Schengen area
Schnorr identification scheme
Schnorr signature
SCI (1)
SCIgen
SCIM
SCION (1)
SCION (2)
sclera
scope (1)
scope (2)
scope (3)
scope (4)
scope (5)
scope of attestation
scope of exercise
scope of service
scoping
score (1)
score (2)
scorecard
score type measure *
SCP (1)
SCP (2)
scrambled document related information
scrambler
scrambling (1)
scrambling (2)
scrap
screen (1)
screen (2)
screen (3)
screen (4)
screen (4)
screen capture
screencasting (1)
screencasting (2)
screen door effect
screened host
screened subnet
screened subnetwork
screening (1)
screening (2)
screening (3)
screening router
screen lock
screen name (1)
screen name (2)
screen peeking
screen reader
screensaver (1)
screensaver (2)
screen scraping
screensharing
screenshot
Screen Tab
script (1)
script (2)
script (3)
script (4) *
script (5) *
scripting language *
script kiddie
script kiddy
scroll status
scrubber
scrum *
scrypt
SCSI
SCTP
Scunthorpe problem
Scunthorpe problem*
SCVP
SD card
S-DES
SDK
SDLC (1)
SDM (1)
SDMA
SDMX
SDN
SDO
SDP (1)
SDP (2)
SDP model
SDSL
sd-wan
seafarers' identity document
seal (1)
seal (2)
sealed class
sealed storage
sea-level use case *
search
search and retrieval
search base
search engine
search engine hacking
search engine marketing
search engine optimization
searching state *
search operator
search robot
seat management
SEB (1)
SecaaS
SECaaS
seccomp
second (1)
second (2)
secondary actor*
secondary site
secondary use
second order logic
second-party audit
second-party conformity assessment activity
second preimage attack
second preimage resistance
second-stage recycle bin
secrecy
secret (1)
secret (2)
secret key
secret key cryptography
secret sharing (1)
secret sharing (2)
secret value derivation function
secret word
Seculert
secure
secure application
secure area
secure audit
secure by design
SecureCode
secure coding
Secure copy
secure cryptographic device
secured message
secure envelope
secure gateway
secure hash algorithm
secure mailing list
secure messaging
secure multiparty computation
secure multi-tenancy
Secure Shell
secure signature-creation device
secure state
secure web gateway (1)
secure web gateway (2)
Security+
security (1)
security (2)
security (3)
security (4)
security (5)
security administrator
security advisor
security alarm
security alerts
security analysis (1)
security analysis (2)
security appliance
security architecture
security as a service
security aspect
security assessment (1)
security assessment (2)
security association
security association identifier
security assurance component
security assurance requirement
security attribute
security audit (1)
security audit (2)
security audit message
security auditor (1)
security auditor (2)
security audit record
security audit trail
security authority
security awareness
security awareness education
security banner
security behavior
security breach
security bulletin
security by default
security by design
security camera
security certificate
security certificate chain
security claim
security class (1)
security clearance
security code
security committee
security compliance checklist
security concept
security-critical
security declaration
security design
security dimension
security domain
security engineering
security event
security event management
security expert
security failure
security features
security flaw
security function
security functional requirement
security function policy
security gateway
security governance
security grade
security hole
security hologram
security implementation standard
security incident
security information and event management
security information management
security ink
security intelligence
security kernel
security label
security layer
security level (1)
security level (2)
security log
security management
security management objective
security management policy
security management programme
security management target
security mechanism
security metrics
security monitoring
security objective
security operation*
security operations center
security operations management
security operations objective
security operations personnel
security operations policy
security operations programme
security paper
security pass
security patch (1)
security patch (2)
security perimeter
security personnel
security plan
security plane
security policy
security principal
security printing
security problem
security problem definition
security profile
security property
security-related event
security requirement
security scheme
security sensitive information
security sensitive material
security server
security service (1)
security service (2)
security standard (1)
security standard (2)
security status
security sticker
security strength
security subclass
security target
security technology (1)
security technology (2)
security testing
security theater
security threat scenario
security through obscurity
security token (1)
security token (2)
security token (3)
security token (4)
security token service
security type system *
security update
Sednit
seed (1)
SEED (2)
seed site
segfault
segment (1)
segment (2)
segmentation
segmentation fault
segregation of duties
selection
selective disclosure
selective dump
selective field protection
selective forgery
selective laser sintering
selective wait statement *
selector
self-assessment evidence
self-call *
self-defence
self-defending network
self-descriptiveness *
self-encrypting virus
self-extracting
self-hosting
selfie
self-implementation
self-service password reset
self-signed certificate
self-sovereign identity
self-synchronizing stream cipher
self-synchronous stream cipher
self-test
SELinux
SELV
SEM
semantic discoverability
semantic discoverability security
semantic interoperability
semantics
semantic search
semantic URL
semantic variation point *
Semantic Web
semaphore
semiformal
semi-free start collision attack
semigroup
semilingual
semi-quantitative risk assessment
semi-structured interview
Sender Policy Framework
Sendmail
send-only
sensational language
sensitive asset
sensitive attribute
sensitive but unclassified
sensitive data
sensitive function
sensitive information
sensitive personal data (1)
sensitive personal data (2)
sensitive PII
sensitive state
sensitivity
sensitivity label
sensor (1)
sensor (2)
sensor (3)
sensor (4)
sensor and actuator network
sensor network
sensor node
sentence (1)
sentence (2)
sentiment analysis
sentiment analysis as a service
SENV
SEO (1)
SEO (2)
separated extra-low voltage
separated interface *
separate target style *
separation of concerns *
separation of duties
separation of facilities*
separator *
sequence
sequence diagram
sequence diagram *
sequence number (1)
sequence number (2)
sequencer (1)
sequencer (2)
sequential
sequential cohesion
sequential execution
sequential presentation (1)
serial
serial ATA
serial bus
serial communication
serial console
serial EEPROM
serial interface
serialization (1)
serialization (2)
serialization (3)
serial number (1)
serial number (2)
serial port
series (1)
series (2)
Serpent
servability
servant object *
serveability
server
server accelerator card
server attack
server-based signature
server capability (1)
server capability (2)
server capability (3)
server cluster
server consolidation
server farm
server request
server sprawl
service (1)
service (2)
service (3)
service (4)
service (5)
serviceability (1)
serviceability (2)
service access point
service account
service assurance
service catalog
service code
service delivery objective
service design package
service desk
service level
service level agreement
service level clock
service level commitment
service level timer
service life
service management plan *
service-oriented architecture
service-oriented architecture *
service pack
service passport
service principal
service profile
service provider
service quality*
service request
service request record *
service robot
service set identifier
service support (1)
service support (2)
service tree
servlet
servo (1)
servo (2)
servo control
servomechanism
servomotor
session (1)
session (2)
session border controller
session control
session cookie
session exposure
session fixation
session hijacking
session ID
session identifier
session injection
session key
session layer
session management
session modification
session poisoning
session pollution
session prediction
session riding
session sniffing
session token
SET
set (1)
set (2)
set (3)
set (4)
set (5)
set (6)
set difference
set of data
set of first category
set of permissions
setpoint
set theory
setting method *
settings
settled value (1)
set up
setup (1)
setup (2)
set up algorithm
severe
severity assessment
sex (1)
sex (2)
sexting
sextortion
sexual solicitation
SFA
SFN
SFP (1)
SFP (2)
SFR
S-FSK
SFTP (1)
SFTP (2)
SFX
SGML
SGX
SHA
SHA-0
SHA-1
SHA-2
SHA-224
SHA-256
SHA-3
SHA-384
SHA-512
SHA-512/224
SHA-512/256
shadow app
shadow deployment
shadow index
shadow IT
shadow password
shall
shall not
shallow copy
Shamoon
Shannon entropy
shape
shaped
shard
sharding (1)
share (1)
share (2)
share (3)
share (4)
shared
shared authentication (1)
shared data *
shared folder
shared key (1)
shared key (2)
shared key authentication
shared ledger
shared mailbox
shared nothing architecture
shared responsibility
shared-secret
shared secret (1)
shared secret (2)
shared secret key
shared service (1)
shared service (2)
shareholder
Sharemind
shareware
sheep dip
shell
shellcode
shell injection
shell script
shellscripting
Shellshock
shelter in place
Shewhart cycle
shield (1)
shield (2)
shield (3)
shielded enclosure
shielded room
shielded twisted pair
shift (1)
shift (2)
Shillelagh
shim
shim *
shit thrower
shock (1)*
shock (2)
Shodan
Shorewall
shortcut
shortcut key *
shortest vector problem
shortfall
short filename
shorthand
short-stay visa
short-stroke key
shot (1)
shot (2)
shot (3)
shot (4)
shot (5)
should
shoulder surfing
SHOUTcast
shred
shredder (1)
shredder (2)
shrinkwrap agreement
shrink-wrapped COTS
SHS
S-HTTP
shuffling
shutdown
SI (1)
SI (2)
SI base quantities
SI base units
sibling
SID
side
sideband
side channel
side-channel attack
side effect
sidejacking
sideloading
SI derived units
side stapling
side stitching with staples
side stitching with thread
side view
side-view reference plane
SIEM
sig
sig block
SIGINT
sigma algebra
sign (1)
sign (2)
sign (3)
sign (4)
sign (5)
sign (6)
signal (1)
Signal (2)
signal processing
signals intelligence
Signals Intelligence Directorate
signal spot (1)
signal spot (2)
signal-to-noise ratio
signatory (1)
signatory (2)
signature (1)
signature (2)
signature (3)
signature (4)
signature block
signature-creation data
signature key
signature of a permutation
signature page *
signature recognition
signature/sign
signature system
signature-verification data
signature verifying algorithm
signed timestamp
signee
signer (1)
signer (2)
signer (3)
significant
significant automated decisions
sign-in
signing algorithm
sign language *
sign-off (1)
sign-on
sign up (1)
sign up (2)
sign up (3)
SigRed
SIGTRAN
silent installation
silicon
silicone
SilkRoad (1)
Silk Road (2)
silo (1)
silo (2)
SIM (1)
SIM (2)
SIM card
similarity attack
similarity score
Simjacker
simple event
simple extension (of a field)
simple state *
simplex (1)
simulation
simulator
simultaneous
simultaneous keystrokes
simultaneous presentation
single-bit error
single classification *
single-factor authentication
single flux
single-hop communication
single-instance storage
single login access
single loss expectancy
single-media
single-mode fiber
single monitor arm
single password
single point of contact
single point of failure
single-precision
single sign-on access
single-step interrupt
single-threaded *
single-valued attribute *
sinkhole server
sink node
Sinowal
SIP
SIP ALG
SIP gateway
SIPRNet
Sirefef
SIS (1)
site (1)
site (2)
site (3)
site acceptance testing *
sitemap
site scraper
site survey (1)
site survey (2)
site-to-site VPN
situational awareness
size measure *
sizing *
SJF
SJN
SK
SKA
skeletal (1)
skeletal (2)
skeleton (1)
skeleton (2)
skeleton (3)
skeleton (4)
skeleton (5)
skeleton crew
skeleton frame
skeleton key
skeleton programming
skeleton staff
sketch *
skew (1)
skew (2)
skewness
skewness attack
S/Key
skid
skiddie
SK ID Solutions AS
skill
skinny client
Skipjack
skiptracing
SKOS
SKU
Skype
SLA
slack space
slag code
slamming
slap image
slap prints
slash notation (1)
slave
slave mode
SLC (1)
SLE
sleep mode
slicing
slider (1)
slider (2)
slideshow
sliding window
slim client
Slingshot
slip (1)
SLO
slot (1)
slot (2)
slot (3)
slot time
slow read attack
slug (1)
slug (2)
slug (3)
slurping
SM4
Smack
small cell
small data
smallest
smallest common multiple
smallint *
smallmoney
small round stamp
S.M.A.R.T
SMART (1)
smart building
smart bulb
smart card
smart contract
smart data
smart device
smartdust
smart glasses
smart grid
smart home
Smart-ID
smart input
smart key
smart label
smartlet
smart lock
smart manufacturing
smart meter
smart meter hack
smartphone
Smart Protection 2012
smart sensing
smart sensor
smart speaker
smart token
smartwatch
SMB (1)
SMB (2)
SMBv1 vulnerability
SME (1)
smiley
S/MIME
smishing
SMiShing
smoke testing
smoking area
smouldering
SMS
SMS4
SMS phishing
SMS spam
SMTP
smudge attack
smurf attack
smurfing
SN (1)
SN (2)
snake case
snake oil
snaplen
snapshot (1)
snapshot (2)
snapshot dump
snarfing
sneakernet
SNFS
SNI
sniffing
snippet
SNMP
SNMP trap
snooping attack
snoop server
Snowden
Snowden effect
SOA (1)
SOA (2)
SOA (3)
soak testing
SOAP
Sobig
SOC (1)
SOC (2)
SoC (3)
SOCaaS
social bookmarking
social engagement
social engineering
social engineering attack surface
social graph
social hacker
social involvement
socially-engineered
social media
social network
social network service
social participation
social plugin
social protection
social scoring*
social security
social security card
social security code
social security number
social software
social software
Social Web
societal security
societal security framework
societal value
socket (1)
socket (2)
socket-reuse shellcode
sockpuppet
SOCKS (1)
SOCKS (2)
SoD
sodar
Sofacy Group
soft biometrics
soft bounce
soft certificate
soft copy
soft error
soft fail
SoftFail
soft key
softlifting
soft link
softlink
softloading
softphone
softswitch
software
software agent
software as a service
software asset
software asset management
software attack surface
software bug
software change control board
software component
software consumer
software copyright infringment
software creator
software-defined networking
software-defined storage
software-defined WAN
software development
software development kit
software engineering
software entitlement
software entitlement reconciliation
software forensics
software identification tag
software license
software license agreement
software licensee
software licensor
software maintenance
software metering
software package
software packager
software phone
software piracy
software product
software quality *
software sprawl
software taggant
software testing
software usage
soft zoning
sofware suite
SoGP
SolarWinds
sole responsibility
solid line *
solid modeling *
solid-outline rectangle *
solid-state battery
solid-state drive
solid-state hybrid drive
solution (1)
solution (2)
solution (3)
solution architect *
solvable
solvent (1a)
solvent (1b)
solvent (2)
solving sums
sonar
SONET
sonic warfare
sonic weapon
sonogram (1)
sonogram (2)
Sony rootkit
SOP
Sophie Germain prime
sort by x *
sorting *
sound (1)
sound (2)
source *
source*
source code
source code extraction
source code repository
source confirmation (1)
source confirmation (2)
source data (1)
source data (2)
source document
source integrity
source language *
source program *
source routing
sourcing (1)
sourcing (2)
southbound interface
SoW
space (1)
space (2)
space (3)
space bar
space complexity
space-division multiple access
spacefiller virus
Spacefilter
spacer (1) *
spacial filtering
spaghetti code
spam
spam blog
spambot
spamdexing
spam filter
spamhaus
Spamhaus Project
spam relay
spam score
spam trap (1)
spam trap (2)
spamvertising
SPAN
span (1)
span (2)
span (3)
span (4)
span (5)
span (6)
spanning
spanning port
spanning tree (1)
Spanning Tree (2)
spare part
SPARQL
sparse data
sparse infector
sparse virus
spatial frequency
spatial sampling rate
spatial streaming
spawn
SPC
SPD
S/PDIF
speaker diarization
speaker recognition
speaker separation
speaker verification
spearphishing
special authorization card
special character
specialised task
special number field sieve
special-purpose language *
special release *
specification
specified requirement
specifier (1)
specifier (2)
specify
spec sheet
Spectre
spectrogram (1)
spectrogram (2)
spectrum
speculative execution
speech
speech recognition
speech-to-text conversion
spell checker
spelling engine
SPF (1)
SPF (2)
SPF (3)
SPF failure
spider
spider chart
spike (1)
spike (2)
spim
spIM
spine-leaf architecture
spin-off (1)
spin-off (2)
spin-off (3)
spin-transfer torque memory
spiral development process *
spiral model*
SPIRITFIRE
spiritual and intellectual privacy
spiritual privacy
SPIT
splash screen
splice (1)
splice (2)
splice tray
splinternet
split key
SplitKey
split knowledge
splitting field of a polynomial
split tunneling
splog
SPM (1)
SPN
SP network
SPOC
SPOF
spoliation
sponge function
sponsor
sponsorship
spontaneus volunteer
spoofing
spoofing attack
spooling
sporgery
spot check
spotlight
SPQM-RM *
spreadsheet
spreadsheet program
spread-spectrum communications
spread-spectrum frequency shift keying
sprint *
sprint review *
sprite
sps (1)
spy camera
spying (1)
spying (2)
SpySheriff
spyware
SQL
SQL injection
SQL Slammer
SQO
SQuaRE
square (1)
square stamp
squelch (1)
SRTP
SS7
SSCP
SSD
SSDP
SSDP amplification attack
s-secure
SSH
SSH CRC32 Compensation Attack
SSHD
SSI
SSID
SSID hiding
SSITH
SSL
SSL card
SSLE
SSL pinning
SSN
SSO
SSPR
ST
stable
stable abstractions principle *
stable dependencies principle *
stack (1)
stack (2)
stack backtrace
stack entropy
stack frame
stack machine
stack overflow (1)
Stack Overflow (2)
stack pointer
stack rank (1)
stack smashing
stack trace
stack traceback
staffing management plan *
stage (1)
stage (2)
stage (3)
staged delivery development process *
Stagefright
staggered spin-up
staging server
staircase function
stakeholder (1)
stakeholder (2)
stakeout
stale
staleware
stalker
stalkerware
stamp (1)
stamp coupling
stamper (1)
standalone (1)
standalone (2)
stand-alone authentication tool*
standard (1)
standard (2)
standard (3)
standard (4)
standard (5)
standard conditions
standard deviation
standard-essential patent
standardize
standardized
standard module
Standard of Good Practice
standard protection
standard software
standby mode
standby state
standby time
standing data
stanza
Staog
stapled
starburst (1)
starburst (2)
star chart
STARK
Starlink*
star network
star plot
start date *
star topology
start page
start screen
STARTTLS
startup (1)
startup (2)
startup (3)
startup (4)
start-up cost
startup page
state (1)
state (2)
state actor (1)
state actor (2)
statechart
statechart diagram
state diagram
stateful inspection firewall
stateful packet filtering
state language
stateless inspection firewall
stateless person
state machine
state machine diagram
statement (1)
statement (2)
statement coverage *
statement of applicability
statement of inventorship
statement of work
state secret
state space
state-sponsored terrorism
state transition diagram
static (1)
static (2)
static authentication
static diagram
static Diffie-Hellman
static discharge
static dump
static IP address
static metadata*
static routing
statistic
statistical disclosure control
statistical matching
statistical significance *
statistical validity *
statistics
status (1)
status (2)
status (3)
statutory (1)
statutory (2)
statutory requirement
stdin *
steady-state
stealer
stealth commanding
stealth IT
stealth virus
stealthy
stealware
steganalysis
steganography
stenography
stenotype
step function
stepping-stone
stepwise
stepwise refinement *
stereotype *
ST evaluation
sticky bit
sticky keys *
sticky policy
stimulated emission
stimulus *
stingray
stipulate
stipulated
stipulation
stipulation of nonliability
stipulator
STIX
stochastic process
stock chart
stock keeping unit
STONEGHOST
stop (1)
stop (2)
stop (3)
stopwatch
stop word
stopword
storage (1)
storage (2a)
storage (2b)
storage (3)
storage area network
storage as a service
storage consolidation
storage container
storage controller
storage convergence
storage device
storage ecosystem
storage element
storage engine
storage location (1)
storage medium
storage security
storage service
storage solution
store (1)
store (2)
store and forward
stored cookie
Storm botnet
Storm worm
story *
storyboard
story card *
story point
STP (1)
STP (2)
STP (3)
straight P-box
strategic exercise
strategic risk
strategy
stratification (1)
stratification (2)
stream
stream cipher
streaming media (1)
streaming media (2)
streaming mode
streaming read
stream socket
stress (1)
stress (1)
stress (2)
stress (2)
stress testing
strict conformance
strict operator *
string
stringent
string type *
stripe (1)
stripe (2)
striping
stripping
strong authentication
strong encryption
strong key
strongly bound credentials
strongly typed language *
strong name
strong-named assembly
strong password
strong prime
strongroom
strong secret
STRONTIUM
structural testing
structure analysis
structure-based testing *
structure diagram
structured programming *
STS (1)
STS (2)
stub (1)
stub (2)
stub (3)
study (1)
study (2)
stupidity*
Stuxnet
style (1) *
style (2) *
stylesheet *
stylus
Sub7
subactivity (1) *
subactivity (2) *
subalgebra
sub-attack
subcarrier
subcharacteristic *
subclassing *
subcontracting*
subcontractor
subdomain
subextension
subfield
subgroup
subject (1)
subject (2)
subject (3)
subject field (1)
subject field (2)
subject in contest
subject in issue
subject line
subject-matter expert *
subject of action
subject of application
subject of dispute
subject of invention
subject of law
subject of license
subject of patent
subject of patenting
subject of patent rights
subject of proof
subject to approval
subject to execution
subkey (1)
subkey (2)
sublicense
subliminal channel
submask
submit (1)
submit (2)
subnet
subnet mask
subnetting
subordinate
subpage
subpoena
subproject *
sub-property *
sub-role
subscribe
subscriber
subscriber-SCD
subscriber secure signature-creation device
subscriber signature-creation data
subscriber signature-verification data
subscriber-SSCD
subscriber-SVD
subscription
subscription-based license
subsequent application
subservice
subset
subsetting*
Subseven
subsidiary (1)
subsidiary (2)
subspace topology
substantial change
substate *
substitutability *
substitution (1)
substitution (2)
substitution (3)
substitution cipher
substrate (1)
substrate (2)
sub-surface laser engraving
subsystem
subterfuge
subterfuge marketing
subtype *
sub-use case
subversive biometric capture subject
subversive user
success
success guarantee*
successor (1)
successor (2)
successor (3)
suction cup
SuD (1)
SuD (1)
SuD (2)
SuD (2)
sudo
suffix
suffix notation
suitability
summary (1)
summary (2)
summary use case*
SUNBURST
sunburst chart
Sunset
supercapacitor
superclass *
supercomputer
supercookie
superencryption
superfluous
superordinate
superposition principle
supersingular elliptic curve
superstate *
superstructure *
supersystem
supertype *
superuser
supervised machine learning
supervisor (1)
supervisor (2)
supervisory authority
supervisory body
supervisory control (1)
supervisory control (2)
supervisory manager
supervisory measures
supervisory program
supplemental Ent
supplemental information structure
supplementary
supplicant
supplier
supplier relationship
supplier tendering *
supplies (1)
supplies (2)
supply (1)
supply (2a)
supply (2b)
supply (3)
supply chain
supply chain continuity management
support
supportability
support agent
supporting actor*
supporting circuitry
support software
support stage *
support ticketing system
support ticket system
support vector machine
support vector network
supratreshold stimulus
supremum
surf
surface
surface linking
surface order
surface web
surfacing *
surge
surjective function
surname
surveillance (1)
surveillance (2)
surveillance audit
surveillance camera
survey (1)
survey (2)
survey (3)
survivability
suspend (1)
suspend (2a)
suspend (2b)
suspend (3)
suspense file
suspension (1)
suspicious
sustainability
SV
SVCMONDR*
SVD
SVM
SVN (1)
SVN (2)
SVR
SWAN
swap out
swapping
swarm intelligence
swarm robotics
SWAT (1)*
SWAT (2)*
swatting
sweep (1)
sweep (2)
SWID tag
SWIFT
SWIFTNet
swimlane *
swimlane diagram
swipe card
swipe fingerprint image
swiping (1)
swiping (2)
switch (1)
switch (2)
switching (1)
switching (2)
switching barrier
switching cost
switching function
switching spike
switching variable
switch port
SWOT analysis *
SWOT analysis *
Sybil attack
syllable
Symantec
symbol (1)
symbol (2)
symbolic link
symbolic logic
symbol rate
symlink
symlink race
symmetric authentication method
symmetric cipher
symmetric cryptographic technique
symmetric cryptography
symmetric encryption system
symmetric key
symmetric key based key establishment mechanism for multiple entities
symmetric key system
symmetric relation
sympathetic ink
symptom
SYN
synchronize
synchronous
synchronous message *
synchronous stream cipher
syndication
syndrome
synergy
SYN flood
SYN scanning
syntactic interoperability*
syntax
syntax highlighting *
syntax layer
synthetic data
synthetic identity theft
synthetic matching
SYS
Syslog (1)
syslog (2)
sysop
system
system account
system administration
system administrator
system average interruption duration
system average interruption duration index
system call
system development life cycle
system drive
system files
system fraud
system hardening
system image
system on chip
system operations manager
system operator
system outage analysis
system owner
system parameters
system participation ratio*
system participation ratio*
system port
system process
systems engineering
systems management
system software
system time
system under design*
system under discussion*
Toimub laadimine
startup (1)
=
buuting
Palun oodake...
Katkesta
Tõrge
startup (1)
=
buuting
Andmete allalaadimisel või töötlemisel esines tehniline tõrge.
Vabandame!
Sulge