Zum Inhalt wechseln
NEU
HOT
Themen
Allgemein
Arbeitswelt
Coding
Data
Gesellschaft & Politik
Hardware
KI
Network
News
Zukunftsmusik
Podcast
IT Lexikon
Themen
Allgemein
Arbeitswelt
Coding
Data
Gesellschaft & Politik
Hardware
KI
Network
News
Zukunftsmusik
Podcast
IT Lexikon
Allgemein
Arbeitswelt
Coding
Data
Gesellschaft & Politik
Hardware
KI
Network
News
Zukunftsmusik
IT Lexikon
Allgemein
Arbeitswelt
Coding
Data
Gesellschaft & Politik
Hardware
KI
Network
News
Zukunftsmusik
IT Lexikon
Traum IT Job finden
NEU
HOT
Unser IT- und Programmierer-Lexikon
Bei Jobriver stehen wir Ihnen mit unserer Expertise zur Seite und vermitteln Ihnen alles Wichtige rund um IT.
Suche
Über 660 Begriffe rund um IT und Programmieren einfach erklärt
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
#
#
2-Faktor-Authentifizierung (2FA)
5G
A
Active Directory
Add-in
Add-on
Adobe Flash Player
Advanced Persistent Threat
Adware
Ajax
Algorithmus
Altcoins
Amazon
Angular
Anonymous Function
Antimalware
Antimalware
Antivirus
Apache
API
API Gateway
Array
ASCII
Assembler
Assembly
Asynchron
B
Bandlaufwerk
Bandwidth
Bankingtrojaner
Base64
BDSG
Benchmark
Big Data
Binary
Bitrate
Bloatware
Blockchain
Blockchain Ledger
Boolean
Bootloader
Bootsektor
Bootstrap
Bot
BSI
Buffer
Bug
Business Continuity
Business E-Mail Compromise (BEC)
BYOD
Byte
Bytecode
C
Cache
Cache Miss
Cache Poisoning
Call-to-Action (CTA)
Callback
CAPTCHA
CDN
CERT
Certificate Authority
Change Management
Chaos Computer Club (CCC)
Character Encoding
Checksum
CIA-Triade
Class
CLI
Client Management
Cloud Act
Cloud Computing
Cloud-Management
Cloud-Telefonie
Cloudflare
Cluster
Code Review
Codebase
Coinhive
Cold Boot
Collision
Command Line
Compiler
Compression
Compression Algorithm
Computervirus
Computerwurm
Concurrent
Concurrent Programming
Connection Pool
Container
Content Delivery Network
Context Switching
Continuous Integration
Cookie
Cookie Policy
Coroutines
CPU
Credential Stuffing
Critical Section
CRM (Customer Relationship Management)
Cryptanalysis
Cryptography
Cryptojacking
Cryptolocker
CSS
Cursor
Cyberattack
Cybercrime-Versicherung
Cyberheist
Cyberkriminalität
Cybersecurity
D
DaaS
Dashboard-Software
Data Literacy
Data Mining
Data Science
Data Structure
Database
Database Management System
Datenmanagement
Datenpanne
Datenschutz-Folgenabschätzung (DSFA)
De-Mail
Deadlock
Debugging
Dependency Graph
Dependency Injection
Depth-First Search
Deterministic
DevOps
Dialer
Diceware
Digital Certificate
Digital Index
Digital Signature
Digitalisierung der Gesellschaft
Disaster Recovery
Distributed System
DMS (Dokumenten-Management-System)
DNS
DNS Flood
DNS Record
Docker
Docker Compose
DOM
Domain Name
Doxing
Drive-by-Exploit
Dropper
DSGVO
DsiN
DSL
Dynamic Programming
E
E-Mail Spoofing
E-Mail-Archivierung
E-Mail-Header
E-Mail-Verschlüsselung
Edge Computing
ElasticSearch
Embedded System
Encryption
End-to-End Encryption
Endbenutzer-Lizenzvertrag
Endgerät
Endpoints
Enumerator
ePrivacy
Ethernet
Event Loop
Event-Driven Programming
Exception
Exponential Backoff
External API
Extreme Programming
F
Failover
Fault Tolerance
Fetch API
FIDO-Allianz
FIFO
File Descriptor
File System
Fileless Malware
Filesharing
Firewall
Flask
Floating Point
Framework
Freeware
Frontend
FTP
G
Garbage Collection
Garbage Collection Algorithm
Gateway
GDPdU
Genetic Algorithm
GeoJSON
Git
GitHub
GitLab
Glasfaser
Global Area Network (GAN)
Global Scope
Go Digital
GoBD
GraphQL
Greylist
Groupware
GUI
H
Hacker
Hardware
Hash Map
Hash Table
Hashfunktion
Hashing
Heap
Hoax
Honeypot
Honeytoken
Horizontal Scaling
HTTP
HTTP Flood
HTTPS
Hybrid Cloud
Hybrid Cloud
Hyperlink
Hypervisor
I
IaaS
IDE
Identity Governance
Immutable
Immutable Data
Index
IndexedDB
Infinite Loop
Informations- und Kommunikationstechnologie (IKT)
Infrastructure as Code
Inheritance
Innovationsmanagement
Instant Messenger
Integrated Development Environment
Interoperability
IoT
IP Address
IP Binding
IP Spoofing
Iteration
Iterative Algorithm
J
Jailbreak
Java
JavaScript
JDK
JSON
JVM
K
Kernel
KRITIS
Kryptowährung
Kubernetes
Kubernetes Cluster
L
Lambda Function
LAMP Stack
Latency
Lazy Loading
Library
Linear Search
Linux
Linux Kernel
Load Balancer
Load Testing
Local Area Network (LAN)
Local Storage
Logarithmic Complexity
Logic Bomb
Loop Invariant
Low Code
Low-Level Programming
LTE
M
Machine Code
Machine Learning
macOS
Makro
Malvertising
Managed Service
Managed Service Provider
Manifest File
Manual Testing
MapReduce
Markup Language
Master Node
Media Drop
Memory Allocation
Memory Leak
Metropolitan Area Network (MAN)
Middleware
Middleware Stack
MIME Type
Mobile Device Management (MDM)
Model-View-Controller
Module
MongoDB
Multi-Factor Authentication
Multi-Threading
Mutex
N
Namespace
Namespace Collision
NAT
Network
Network Attached Storage (NAS)
Netzersatzanlage
Netzwerktypen
Neural Network
New Work
No Code
Node
Node.js
NoSQL
Null Pointer
O
OAuth
Object Pool
Object-Oriented Programming
Open Data Initiative
Open Source
OpenAPI
Operating System
Operator
Opt-in
Opt-out
Outsourcing
P
Package Manager
Packet
Padding
Pagination
Parallel Computing
Parsing
Patch
Patch-Management
Path
Payload
Penetration Testing
Penetrationstest
Performance Testing
Persistent Storage
Personal Area Network (PAN)
Personenbezogene Daten
Pharming
Phishing
PHP
Pivot Table
Pixel
Plain Text
Plugin
Pointer
Polyfill
Port
Port Forwarding
Postgres
PowerShell
Predictive Analysis
Prefetching
Primitive Type
Print-Management
Priority Queue
Private Cloud
Private Key
Process
Profiling
Protocol
Prototyping
Proxy
Proxy Server
Pseudo Code
Public Cloud
Public Domain
Public Key
Python
Q
Query
Query Optimization
Queue
Queue Data Structure
Quicksort
R
RAM
Ransomware / Erpresser-Trojaner
Rate Limiting
React
React Router
Reactive Programming
Real-Time Processing
Recursion
Recursive Function
Referential Transparency
Regex
Regression Testing
Regular Expression
Remote Desktop
Replication
Repository
Resilienz
Responsive Design
RESTful
Reverse Proxy
Round Robin
RSA Encryption
Runtime
S
SaaS
Sandbox
Scala
Scalability
Schema
Schema Migration
Scrum
SDK
SDK Installation
Search Algorithm
Secured Socket Layer
Semaphore
Semaphore Variable
Server-Monitoring
Server-Side Rendering
Serverless
Service-Oriented Architecture
Session Management
Shadow DOM
Shareware
Shell
Singleton
Singleton Design Pattern
Sinkhole
Skimming
Slack API
Smart Contract
Smishing
Snippet
Snippet Sharing
Social Bots
Social Engineering
Socket
Software
Software Artifact
Software Build
Software Container
Software Testing Lifecycle
Source Code
Source Map
Spam
Sparse Matrix
Spear Phishing
Spline Interpolation
Spring Boot
Spyware
SQL
SQL Injection
SSL-Verschlüsselung
SSL-Zertifikat
Stack
Stack Overflow
State Machine
Stateless
Static Analysis
Static Content
Static Variable
Sticky Session
Stream
Streaming Protocol
String
Struct
Structured Data
Sublime Text
Subnet
Subroutine
Sudo Command
Supervisory Control
SVG Rendering
Swagger
Swift
Symlink
Syntax
Synthetic Testing
System Architecture
System Call
System Integration
T
Tab Completion
Table Index
Tailgating
TCP Handshake
TCP/IP Stack
Telematikinfrastruktur
Template Engine
Temporal Logic
Terraform
Thread
Thread Pool
Throttling
Token
Token Ring
Tokenization
TOM Datenschutz
Topological Sorting
Trace Route
Transaction Log
Transmission Control Protocol
Transpiler
Trojaner
Tuple
Tuple Assignment
Turing-Test
Type Conversion
Type Inference
Typo3
U
UI Testing
UML Diagram
Undo Log
Unit Testing
Unmanaged Code
Unterbrechungsfreie Stromversorgung (USV)
URL
URL Encoding
User Authentication
User Interface
Utility Class
V
Value Type
Variable
Variable Scope
Vector Graphics
Version Control
Version History
Vertical Scaling
Virtual Machine
Virtual Reality
Virtualization Technology
Vishing
Visual Studio Code
Voice over IP
VoIP
VPN
Vulnerability
Vulnerability Assessment
W
Waterfall Model
Web Analytics
Web App Manifest
Web Crawler
Web Development
Web Storage API
Web Traffic Analysis
Web Worker
WebAssembly
Webhook
Webhook Configuration
Webpack
WebRTC
WebSocket
WebSocket Protocol
White-Hat-Hacker und Black-Hat-Hacker
Whitelist
Whitespace Character
Wide Area Network (WAN)
Widget
WiFi
Wildcard Matching
Windows
Wireframe
WLAN
Workflow
Workflow Automation
Workflow Diagram
WYSIWYG Editor
X
X.509 Certificate
XHTML
XML
XOR Operation
XPath Query
XQuery
XSLT Transformation
Y
Y2K Problem
YAML
YAML Configuration
YAML Formatter
YAML Injector
YAML Interpreter
YAML Mapping
YAML Parser
YAML Reader
YAML Schema
YAML Syntax
Yarn Clean Command
Yarn CLI
Yarn Configuration
Yarn Lockfile
Yarn Package Manager
Yarn Workspaces
Yeoman Generator
Yield Behavior
Yield Curve
Yield Generator
Yield Lock
Yield Processing
Yield Statement
YUI Compressor
Z
Z-index
Z-index Conflict
Z-index Priority
Z-order Curve
Z-stack View
Zero Bound State
Zero Copy Buffer
Zero Decibel Gain
Zero Error Rate
Zero Gravity Sim
Zero Initialization
Zero Knowledge Proof
Zero Out Memory
Zero Padding Algorithm
Zero Pointing Table
Zero Read Replica
Zero Tolerance File
Zero Tolerance Rule
Zero-Day
Zero-Day Exploit
Zero-Latency
Zeroing Routine
ZeroMemory API
ZeroMQ Library
ZeroSum Game
Zeta Function
Zigbee Protocol
Zigzag Data Path
Zigzag Heuristic
Zigzag Join
Zigzag Traversal
Zip
ZIP Compression
Zip IO Module
Zip Slip Vulnerability
ZipFile Extraction
Zipstream
Zlib Compression
Zlib Library
Zmodem Transfer
Zombie Code
Zombie Process
Zombie VM
Zonal Clustering
Zonal Filter
Zonal Indexing
Zonal OCR
Zone Boundary
Zone Files
Zone of Influence
Zone Redirection
Zookeeper
Zookeeper Logs
Zookeeper Scheduler
Zoom API
Zoom Control
Zoom Focus Area
Zoom in Canvas
Zoom Lens Effect
Zoom Pane
Zoom Transition
ZoomFit Algorithm
Zooming Algorithm
ZoomSDK
ZRAM Memory
ZSH
Top Beiträge
Das Geheimnis des viralen Erfolgs | Kai Thrun im Interview [KI, Marketing & Gesellschaft im Wandel]
Was werden die wichtigsten Programmiersprachen 2025 sein?
17 Jahre im Systemhaus: CEO Rafael Aspiazu de la Vega teilt seine Reise, Erfahrungen und Visionen
Erhalten Sie die besten IT-Stories direkt in Ihren Posteingang!
Vorname
E-Mail
DSGVO
Ich möchte den Newsletter mit News-Beiträgen erhalten und akzeptiere die
Datenschutzerklärung
von Jobriver.
Senden