%D8%AC%D8%A7%D8%B3%D9%88%D8%B3%D9%8A%D8%A9_%D8%B1%D9%82%D9%85%D9%8A%D8%A9Monitoratge_(inform%C3%A0tica)Online-DurchsuchungComputer_and_network_surveillance%D9%86%D8%B8%D8%A7%D8%B1%D8%AA_%D8%A8%D8%B1_%D8%B1%D8%A7%DB%8C%D8%A7%D9%86%D9%87_%D9%88_%D8%B4%D8%A8%DA%A9%D9%87Verkkovalvonta%D7%9E%D7%A2%D7%A7%D7%91_%D7%A2%D7%9C_%D7%9E%D7%97%D7%A9%D7%91%D7%99%D7%9D_%D7%95%D7%A8%D7%A9%D7%AA%D7%95%D7%AAStaatstrojaner%E1%80%80%E1%80%BD%E1%80%94%E1%80%BA%E1%80%95%E1%80%BB%E1%80%B0%E1%80%90%E1%80%AC%E1%80%85%E1%80%B1%E1%80%AC%E1%80%84%E1%80%B7%E1%80%BA%E1%80%80%E1%80%BC%E1%80%95%E1%80%BA%E1%80%80%E1%80%BC%E1%80%8A%E1%80%B7%E1%80%BA%E1%80%9B%E1%80%BE%E1%80%AF%E1%80%81%E1%80%BC%E1%80%84%E1%80%BA%E1%80%B8Monitoring_pracy_komputeraVigil%C3%A2ncia_de_computadores_e_redes%D0%9F%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%BC%D0%B0_%D0%BE%D1%82%D1%81%D0%BB%D0%B5%D0%B6%D0%B8%D0%B2%D0%B0%D0%BD%D0%B8%D1%8F%D0%9C%D0%BE%D0%BD%D1%96%D1%82%D0%BE%D1%80%D0%B8%D0%BD%D0%B3%D0%BE%D0%B2%D1%96_%D0%BF%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%BD%D1%96_%D0%BF%D1%80%D0%BE%D0%B4%D1%83%D0%BA%D1%82%D0%B8%DA%A9%D9%85%D9%BE%DB%8C%D9%88%D9%B9%D8%B1_%D8%B3%D8%B1%D9%88%DB%8C%D9%84%DB%8C%D9%86%D8%B3Gi%C3%A1m_s%C3%A1t_tr%E1%BB%B1c_tuy%E1%BA%BFnQ651476
about
P921
Q13873996-a3c72aca-4cbb-c75b-a82d-f7ffd085f41dQ14831675-a7a37d3a-4d39-b028-3171-7af5288d5712Q15098833-37d33bfc-475a-9fed-8684-172008356ea8Q15435223-d5e6024e-4de9-cec6-e67d-78b05d1dd9cdQ15838955-32e17353-4688-9a9b-adbc-0940c0497fb3Q15975538-6a340040-442f-0f6d-ed7e-da5812c1c519Q17617019-4995692c-4b95-7959-825c-d1afd12ac550Q47308927-69F33CC0-7B6A-4504-81A8-F3ABC2A36901Q54958832-323cb477-4307-c658-4f91-acabdea0150dQ7784249-3e923463-4396-eb46-19b0-e269d3c0806fQ914521-B763BAC9-15C4-422A-8673-0067B938B092q12857142-183df9d2-4408-645c-59ef-74f797f689e2q13420597-d7a23127-4b31-775e-0903-4e964d37115eq13424385-6bfb6996-4622-ab28-b565-6eb33be00138q13521865-b3f8ee27-472a-0233-de61-7a3bd32da589q14150139-c6e41c3b-4cea-6d31-15cd-8596c55c94a8q217386-2f437f90-427b-d16a-742f-47c5f04b866a
P31
description
act of performing surveillance ...... recognize and monitor threats
@en
action de surveiller des activités informatiques
@fr
tai yra kompiuterinės veiklos, ...... nternetinės veiklos stebėjimas
@lt
Überwachung der Computertätigkeit
@de
слежение в Интернете с помощью программ
@ru
name
Computer surveillance
@ur
Giám sát trực tuyến
@vi
Kompiuterinis sekimas
@lt
Monitoring pracy komputera
@pl
Online-Durchsuchung
@de
Staatstrojaner
@id
Verkkovalvonta
@fi
computer surveillance
@en
computersurveillance
@nl
monitoratge
@ca
type
label
Computer surveillance
@ur
Giám sát trực tuyến
@vi
Kompiuterinis sekimas
@lt
Monitoring pracy komputera
@pl
Online-Durchsuchung
@de
Staatstrojaner
@id
Verkkovalvonta
@fi
computer surveillance
@en
computersurveillance
@nl
monitoratge
@ca
altLabel
Bundes-Trojaner
@de
Ferndurchsuchung
@de
Governmental Hacking
@de
Online-Fahndung
@de
Onlinedurchsuchung
@de
PC-Fahndung
@de
PC-Screening
@de
Polizei Trojaner
@de
Polizei-Trojaner
@de
Remote Forensic Software
@de
prefLabel
Computer surveillance
@ur
Giám sát trực tuyến
@vi
Kompiuterinis sekimas
@lt
Monitoring pracy komputera
@pl
Online-Durchsuchung
@de
Staatstrojaner
@id
Verkkovalvonta
@fi
computer surveillance
@en
computersurveillance
@nl
monitoratge
@ca
P6366
P646
P279
P6366
2779398728