247 lines
2.5 KiB
Plaintext
247 lines
2.5 KiB
Plaintext
Python
|
|
Java
|
|
JavaScript
|
|
C
|
|
C++
|
|
C#
|
|
PHP
|
|
Ruby
|
|
Go
|
|
Swift
|
|
Kotlin
|
|
Rust
|
|
TypeScript
|
|
HTML
|
|
CSS
|
|
SQL
|
|
NoSQL
|
|
MongoDB
|
|
PostgreSQL
|
|
SQLite
|
|
Redis
|
|
Elasticsearch
|
|
Docker
|
|
Kubernetes
|
|
Microservices
|
|
Angular
|
|
React
|
|
Vue
|
|
Node.js
|
|
Express
|
|
Django
|
|
Flask
|
|
Spring Boot
|
|
.NET
|
|
TensorFlow
|
|
PyTorch
|
|
Pandas
|
|
NumPy
|
|
Scikit-learn
|
|
Matplotlib
|
|
Seaborn
|
|
Bokeh
|
|
Jupyter
|
|
Data Science
|
|
Machine Learning
|
|
Deep Learning
|
|
Artificial Intelligence
|
|
Natural Language Processing
|
|
Computer Vision
|
|
Reinforcement Learning
|
|
Neural Network
|
|
Convolutional Neural Network
|
|
Recurrent Neural Network
|
|
GANs
|
|
Blockchain
|
|
Bitcoin
|
|
Ethereum
|
|
Smart Contract
|
|
Cloud Computing
|
|
AWS
|
|
Azure
|
|
GCP
|
|
Serverless
|
|
DevOps
|
|
Git
|
|
GitHub
|
|
Bitbucket
|
|
Agile
|
|
Scrum
|
|
Kanban
|
|
CI/CD
|
|
JUnit
|
|
Selenium
|
|
REST
|
|
GraphQL
|
|
JSON
|
|
XML
|
|
YAML
|
|
API
|
|
UI
|
|
UX
|
|
VR
|
|
AR
|
|
IoT
|
|
Raspberry Pi
|
|
Arduino
|
|
Linux
|
|
Ubuntu
|
|
CentOS
|
|
Fedora
|
|
Debian
|
|
Windows
|
|
macOS
|
|
Android
|
|
iOS
|
|
Firmware
|
|
Cybersecurity
|
|
Encryption
|
|
Firewall
|
|
VPN
|
|
DDoS
|
|
Malware
|
|
Ransomware
|
|
Phishing
|
|
Two-factor Authentication
|
|
Biometrics
|
|
Virtual Machine
|
|
Container
|
|
Orchestration
|
|
Big Data
|
|
Hadoop
|
|
Spark
|
|
Kafka
|
|
Flink
|
|
ETL
|
|
Data Warehouse
|
|
Business Intelligence
|
|
Data Mining
|
|
Web Scraping
|
|
Web Development
|
|
Frontend
|
|
Backend
|
|
Full Stack
|
|
Software Engineering
|
|
Database
|
|
Schema
|
|
Query
|
|
Indexing
|
|
Normalization
|
|
Denormalization
|
|
Object-Oriented Programming
|
|
Functional Programming
|
|
Procedural Programming
|
|
Scripting
|
|
Compiler
|
|
Interpreter
|
|
IDE
|
|
Debugging
|
|
Refactoring
|
|
Version Control
|
|
Concurrency
|
|
Multithreading
|
|
Synchronization
|
|
Deadlock
|
|
Memory Management
|
|
Garbage Collection
|
|
Exception Handling
|
|
PaaS
|
|
IaaS
|
|
SaaS
|
|
Hashing
|
|
Cryptography
|
|
Algorithm
|
|
Data Structure
|
|
Stack
|
|
Queue
|
|
Tree
|
|
Graph
|
|
Linked List
|
|
Array
|
|
Matrix
|
|
Sorting
|
|
Searching
|
|
BFS
|
|
DFS
|
|
Dynamic Programming
|
|
Greedy Algorithm
|
|
Divide and Conquer
|
|
Backtracking
|
|
Recursion
|
|
MapReduce
|
|
Object-Relational Mapping
|
|
Virtual Reality
|
|
Augmented Reality
|
|
Mixed Reality
|
|
Cyber-Physical System
|
|
Edge Computing
|
|
Fog Computing
|
|
Fifth Generation
|
|
Quantum Computing
|
|
Server
|
|
Client
|
|
Peer-to-Peer
|
|
Blockchain
|
|
Tangle
|
|
Distributed Ledger
|
|
Smart Grid
|
|
Autonomous Vehicle
|
|
Drone
|
|
3D Printing
|
|
Cryptocurrency
|
|
Token
|
|
Initial Coin Offering
|
|
Public Key
|
|
Private Key
|
|
Digital Signature
|
|
Zero-Knowledge Proof
|
|
Merkle Tree
|
|
Side Chain
|
|
Hard Fork
|
|
Soft Fork
|
|
Data Lake
|
|
Data Mart
|
|
OLAP
|
|
OLTP
|
|
CAP Theorem
|
|
ACID
|
|
BASE
|
|
Event-Driven
|
|
Microfrontend
|
|
Service Mesh
|
|
Progressive Web App
|
|
WebAssembly
|
|
GraphQL
|
|
gRPC
|
|
Thrift
|
|
Protocol Buffers
|
|
WebRTC
|
|
Socket.IO
|
|
OAuth
|
|
OpenID
|
|
LDAP
|
|
RBAC
|
|
XSS
|
|
CSRF
|
|
SQL Injection
|
|
Buffer Overflow
|
|
Shellshock
|
|
Heartbleed
|
|
Spectre
|
|
Meltdown
|
|
Row Hammer
|
|
BlueKeep
|
|
Zero Day
|
|
White Hat
|
|
Black Hat
|
|
Gray Hat
|
|
Rainbow Table
|
|
Brute Force
|
|
Dictionary Attack
|
|
Man in the Middle
|
|
Replay Attack
|
|
Denial of Service
|
|
SYN Flood
|
|
Smurf Attack
|
|
IP Spoofing
|
|
Phreaking |