-
1 Need To Know Enforcement-Common Network Computer Architecture
Abbreviation: NTKE-CNCAУниверсальный русско-английский словарь > Need To Know Enforcement-Common Network Computer Architecture
-
2 Unix Net for Computer security in Law Enforcement
Information technology: U.N.C.L.E. (organization, USA, Unix), UNCLE (organization, USA, Unix)Универсальный русско-английский словарь > Unix Net for Computer security in Law Enforcement
-
3 автоматизированное обеспечение соблюдения налоговой дисциплины
Economy: computer enforcementУниверсальный русско-английский словарь > автоматизированное обеспечение соблюдения налоговой дисциплины
-
4 Международная научно-практическая конференция сотрудников правоохранительных органов по вопросам преступности в компьютерной сфере
Универсальный русско-английский словарь > Международная научно-практическая конференция сотрудников правоохранительных органов по вопросам преступности в компьютерной сфере
См. также в других словарях:
Computer Online Forensic Evidence Extractor — (COFEE) is a tool kit, developed by Microsoft, to help computer forensic investigators extract evidence from a Windows computer. Installed on a USB flash drive or other external disk drive, it acts as an automated forensic tool during a live… … Wikipedia
Computer poker players — are computer programs designed to play the game of poker against human opponents or other computer opponents. They are commonly referred to as pokerbots or just simply bots. Contents 1 On the Internet 1.1 Player bots 1.1.1 House enforcement … Wikipedia
Computer-aided lean management — Computer aided lean management, in business management, is a methodology of developing and using software controlled, lean systems integration. Its goal is to drive innovation towards cost and cycle time savings. It attempts to create an… … Wikipedia
Computer crime — Computer crime, or cybercrime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target.[2] Netcrime refers to criminal exploitation of the Internet.[3]… … Wikipedia
Computer recycling — Computer monitors are typically packed into low stacks on wooden pallets for recycling and then shrink wrapped.[1] Computer recycling or electronic recycling is the recycling or reuse of computers or other electronics. It includes both finding… … Wikipedia
Computer fraud — is the use of information technology to commit fraud. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act, which provides for jail time and fines. Contents 1 Notable incidents 2 See also 3 External… … Wikipedia
Computer and Internet Protocol Address Verifier — Original author(s) Federal Bureau of Investigation Type Spyware The Computer and Internet Protocol Address Verifier (CIPAV) is a data gathering tool that the Federal Bureau of Investigation (FBI) uses to track and gather location data on suspects … Wikipedia
Computer surveillance — This article is about surreptitious monitoring of computer activity. For information on methods of preventing unauthorized access to computer data, see computer security. Computer surveillance is the act of performing surveillance of computer… … Wikipedia
Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Enforcement Directive — European Union directive: Directive 2004/48/EC Directive on the enforcement of intellectual property rights Made by European Parliament Council Made under … Wikipedia
Computer security incident management — In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events … Wikipedia