IT-Lexikon

Wichtige IT-Begriffe verständlich erklärt

A

Access Control

Active Directory

Add-in

Add-on

Adobe Flash Player

Adobe XD

Advanced Persistent Threat

Adware

agile Methoden

Agile Softwareentwicklung

Agilität

Ajax

Akka

Algorithmen

Algorithmus

Altcoins

Amazon

Amplitude

Analytics

Angular

Anonymous Function

Ansible

Antimalware

Antimalware

Antivirus

Antivirus Software

Apache

Apache HTTP Server

Apache Spark

API

API Gateway

Applikationen

Arbeit 4.0

Array

ArrayList

Asana

ASCII

Assembler

Assembly

async/await

Asynchron

Asynchrone Inhalte laden

Asynchrone Programmierung

Asynchroner Programmierung

Asynchronous Programming

Augmented Reality

Ausnahmen

Authentifizierung

Automatentheorie

Automation Testing

Automation Tools

automatisiertes Testing

Automatisierung

Automatisierung

AWS

AWS Lambda

B

Babel

Backup

Backup-Strategien

Balsamiq Wireframes

Bandlaufwerk

Bandwidth

Bankingtrojaner

Base64

Bash

Baumstrukturen

BDSG

Beitrag über Applikationsentwicklung

Benchmark

Benchmarking

Benutzerdatenschutz

Benutzererfahrung

Benutzerfreundlichkeit

Benutzeroberfläche

Best Practices in der Softwareentwick...

Big Data

Bildbearbeitung

Bildverarbeitung

Binäre Suche

Binary

Bitcoin

Bitrate

Bloatware

Blockchain

Blockchain Ledger

Bluetooth

Boolean

Bootloader

Bootsektor

Bootstrap

Bot

Breadth-First Search

BSI

Buffer

Bug

Bundler

Business Continuity

Business E-Mail Compromise (BEC)

Business Intelligence

BYOD

Byte

Bytecode

C

C

Cache

Cache Miss

Cache Poisoning

Caching

Call-to-Action (CTA)

Callback

Callbacks

CAN-SPAM-Gesetz

Canvas

CAPTCHA

Cardano (ADA)

Casting

CDN

CERT

Certificate Authority

Change Management

Chaos Computer Club (CCC)

Character Encoding

Checksum

CIA-Triade

Class

CLI

Client Management

Cloud Act

Cloud Computing

Cloud-Management

Cloud-Telefonie

Cloudflare

Cluster

CMS

CNAME Records

Code Review

Codebase

Codecodings

Codecs

Coding Standards

Coinhive

Cold Boot

Collision

Command Line

Compiler

Compression

Compression Algorithm

Computergraphik

Computervirus

Computerwurm

Concurrency

Concurrent

Concurrent Programming

Configuration Management

Connection Pool

Container

Container

Content Delivery Network

Content Marketing

Context Switching

Continuous Integration

Continuous Integration

Cookie

Cookie Policy

Cookies

Coroutines

CPU

Credential Stuffing

Critical Section

CRM (Customer Relationship Management)

Cryptanalysis

Cryptography

Cryptojacking

Cryptolocker

CSS

CSS-Module

CSS-Optimierung

CSS3

Cursor

Cyberattack

Cybercrime-Versicherung

Cyberheist

Cyberkriminalität

Cybersecurity

D

DaaS

das Internet

das Observer Pattern

Dashboard-Software

Data Integrity

Data Literacy

Data Mining

Data Processing

Data Science

Data Structure

Data Structures

Database

Database Management System

Datastreaming

Dateisystem

Dateiverwaltung

Datenbanken

Datenbankmanagement

Datenbankmanagementsysteme

Datenkompression

Datenmanagement

Datenpanne

Datenschutz

Datenschutz

Datenschutz-Folgenabschätzung (DSFA)

Datenschutzrichtlinien

Datensicherheit

Datenspeicherung

Datenstruktur

Datentypen allgemein

DDoS-Angriffe

De-Mail

Deadlock

Debugging

Decorator

Deep Learning

den Aufbau eines Programms

Dependency Graph

Dependency Injection

Depth-First Search

Design Patterns

Deterministisch

DevOps

Dialer

Diceware

die Schrödinger-Gleichung

Digital Certificate

Digital Index

Digital Marketing

Digital Signature

Digitalisierung der Gesellschaft

Directory Traversal

Disaster Recovery

Distributed System

Django

DMS (Dokumenten-Management-System)

DNS

DNS Flood

DNS Record

Docker

Docker Compose

DOM

Domain Name

Domain Name System

Doxing

Drive-by-Exploit

Dropper

DSGVO

DsiN

DSL

Dynamic Programming

Dynamikbereich

dynamischen Inhalt

G

M

Machine Code

Machine Learning

macOS

macOS

Makro

Malvertising

Malware

managed code

Managed Service

Managed Service Provider

Manifest File

Manual Testing

Map Server

MapReduce

Marketing Automation

Markup Language

Maschinellem Lernen

maschinelles Lernen

Maschinensprache

Master Node

Matrix

Media Drop

Memory

Memory Allocation

Memory Leak

Mergesort

Metropolitan Area Network (MAN)

Microservices-Architektur

Microsoft Teams

Microsoft Teams

Middleware

Middleware Stack

MIME Type

Minifizierung

Minimum Viable Product (MVP)

Mobile Device Management (MDM)

Model-View-Controller

Module

MongoDB

Multi-Factor Authentication

Multi-Threading

Mutable Datenstrukturen

Mutex

Mutierbarer Zustand

MySQL

P

PaaS

Package Manager

Packet

Padding

Pagination

Pandas

Parallel

Parallel Computing

Parallel Programmierung

Parallel Programming

Parcel

Parsing

Parsing

Partitionierung

Passwortmanagement

Patch

Patch-Management

Path

Payload

Penetration Testing

Penetrationstest

Performance Testing

Performance-Optimierung

Persistent Storage

Personal Area Network (PAN)

Personenbezogene Daten

Pharming

Phishing

PHP

Ping-Test

Pivot Table

Pixel

PKI (Public Key Infrastructure)

Plain Text

Play Framework

Plugin

Pointer

Polyfill

Polymorphie

Port

Port Forwarding

Postgres

PowerShell

Predictive Analysis

Prefetching

Primalität

Primitive Type

Print-Management

Priority Queue

Private Cloud

Private Key

Privatsphäre im Internet

Process

Profiling

Programmiersprachen

Progressive Web Apps

Promises

Promises

Protocol

Protokolle

Prototyping

Proxy

Proxy Server

Prozesse

Prozessmanagement

Pseudo Code

Public Cloud

Public Domain

Public Key

Python

PyTorch

R

Race Condition

RAM

Ransomware / Erpresser-Trojaner

Rastergrafiken

Rate Limiting

React

React Router

Reactive Programming

Real-Time Processing

Rechnungswesen

Recursion

Recursive Function

Reference Types

Referential Transparency

Regex

Regression Testing

Regular Expression

Reine Funktionen

Rekursion

Remote Desktop

Rendite

Replication

Repository

Resilienz

Responsive Design

RESTful

RESTful APIs

Reverse Proxy

Riemannsche Hypothese

Ripple (XRP)

Risikomanagement

Risikomanagement

Round Robin

RSA Encryption

Ruby

Runtime

S

SaaS

Sandbox

Scala

Scalability

Scheduling

Schema

Schema Migration

Scripting

Scrum

SDK

SDK Installation

Search Algorithm

Secured Socket Layer

Security Architecture

Security Practices

Semaphore

Semaphore Variable

SEO-Techniken

Server-Monitoring

Server-Side Rendering

Serverless

Service Worker

Service-Oriented Architecture

Session Management

Shadow DOM

Shareware

Shell

Shell-Scripting

sichere Verschlüsselung

Signalverarbeitung

Singleton

Singleton Design Pattern

Sinkhole

Sketch

Skimming

Slack

Slack API

Smart Contract

Smart Contracts

Smishing

Snippet

Snippet Sharing

Social Bots

Social Engineering

Socket

Software

Software Artifact

Software Build

Software Container

Software Testing Lifecycle

Software-Architektur

Softwarearchitekturen

Softwareentwicklung

Source Code

Source Map

Spam

Spam-Filter

Sparse Matrix

Spear Phishing

Speicherverwaltung

Speicherverwaltung

Spieltheorie

Spline Interpolation

Spring Boot

Spyware

SQL

SQL Injection

SSL-Verschlüsselung

SSL-Zertifikat

SSL/TLS Protokolle

Stack

Stack Overflow

State Machine

Stateless

Static Analysis

Static Content

Static Variable

Sticky Session

Stream

Streaming Protocol

Stress Testing

String

Struct

Structured Data

Sublime Text

Subnet

Subroutine

Subversion

Sudo Command

Supervisory Control

SVG Rendering

Swagger

Swift

Symlink

Synchronisation

Syntax

Synthetic Testing

System Architecture

System Call

System Integration

T

Tab Completion

Table Index

Tailgating

TCP Handshake

TCP/IP Stack

Telematikinfrastruktur

Template Engine

Temporal Logic

TensorFlow

Terraform

Thread

Thread Pool

Threading

Threads

Throttling

Throughput

Token

Token Ring

Tokenization

TOM Datenschutz

Topological Sorting

Trace Route

Transaction Log

Transaction Management

Transmission Control Protocol

Transpiler

Trello

Trojaner

Tuple

Tuple Assignment

Turing-Test

Type Conversion

Type Inference

TypeScript

Typo3

V

Value Type

Variable

Variable Scope

Variablen

Variablen Scope

Vector Graphics

Verbindungsmanagement

Vergleich von Suchalgorithmen

verkettete Listen

Verschlüsselung

Version Control

Version History

Vertical Scaling

Video Marketing

Video-Streaming-Technologien

Viren

Virtual Machine

Virtual Reality

Virtualisierung

Virtualisierung

Virtualization Technology

virtuellen Maschinen

Vishing

Visual Studio Code

Voice over IP

VoIP

VoIP-Protokolle

VPN

Vue.js

Vulnerability

Vulnerability Assessment

W

Warm Boot

Waterfall Model

Web Analytics

Web App Manifest

Web Components

Web Crawler

Web Development

Web Storage API

Web Traffic Analysis

Web Worker

WebAssembly

Webdesign

Webentwicklung

Webhook

Webhook Configuration

Webhosting-Anbieter

Webpack

WebRTC

WebSocket

WebSocket Protocol

Wettbewerbsstrategie

White-Hat-Hacker und Black-Hat-Hacker

Whitelist

Whitespace Character

Wide Area Network (WAN)

Wide Area Networks

Wide Area Networks (WAN)

Widget

WiFi

Wildcard Matching

Windows

Wireframe

WLAN

WordPress

Workflow

Workflow Automation

Workflow Diagram

WYSIWYG Editor

Z

Z-index

Z-index Conflict

Z-index Priority

Z-order Curve

Z-stack View

Zeichencodierung

Zero Bound State

Zero Copy Buffer

Zero Decibel Gain

Zero Error Rate

Zero Gravity Sim

Zero Initialization

Zero Knowledge Proof

Zero Out Memory

Zero Padding Algorithm

Zero Pointing Table

Zero Read Replica

Zero Tolerance File

Zero Tolerance Rule

Zero-Day

Zero-Day Exploit

Zero-Latency

Zeroing Routine

ZeroMemory API

ZeroMQ Library

ZeroSum Game

Zertifizierungsstelle

Zeta Function

Zigbee Protocol

Zigzag Data Path

Zigzag Heuristic

Zigzag Join

Zigzag Traversal

Zinskurve

Zip

ZIP Compression

Zip IO Module

Zip Slip Vulnerability

ZipFile Extraction

Zipstream

Zlib Compression

Zlib Library

Zmodem Transfer

Zombie Code

Zombie Process

Zombie VM

Zonal Clustering

Zonal Filter

Zonal Indexing

Zonal OCR

Zone Boundary

Zone Files

Zone of Influence

Zone Redirection

Zookeeper

Zookeeper Logs

Zookeeper Scheduler

Zoom API

Zoom Control

Zoom Focus Area

Zoom in Canvas

Zoom in der Softwarekommunikation

Zoom Lens Effect

Zoom Pane

Zoom Transition

ZoomFit Algorithm

Zooming Algorithm

ZoomSDK

ZRAM Memory

ZSH

Zwei-Faktor-Authentifizierung