-
1 преступное использование ЭВМ
Русско-английский словарь по вычислительной технике и программированию > преступное использование ЭВМ
-
2 преступное использование ЭВМ
лента, кодированная на ЭВМ — computer tape
Русско-английский большой базовый словарь > преступное использование ЭВМ
-
3 машина для любительского использования
Русско-английский большой базовый словарь > машина для любительского использования
-
4 вычислительная машина промышленного использования
Русско-английский большой базовый словарь > вычислительная машина промышленного использования
-
5 злонамеренное использование компьютеров
Security: computer tamperingУниверсальный русско-английский словарь > злонамеренное использование компьютеров
-
6 мошенничество с применением компьютера
Network technologies: computer tamperingУниверсальный русско-английский словарь > мошенничество с применением компьютера
-
7 преступное использование ЭВМ
Information technology: computer tamperingУниверсальный русско-английский словарь > преступное использование ЭВМ
-
8 преступное использование компьютера
Information technology: computer tamperingУниверсальный русско-английский словарь > преступное использование компьютера
-
9 программа
сущ.
См. также в других словарях:
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Computer file — This article is about computer files and file systems in general terms. For a more detailed and technical article, see File system. A computer file is a block of arbitrary information, or resource for storing information, which is available to a… … Wikipedia
Computer case — A stripped ATX desktop case. The motherboard will lie flat on the bottom, against the right panel, with peripheral connectors protruding through the rear panel, drive bays at the top and front, and the power supply at the top and rear. A computer … Wikipedia
Personal computer game — A personal computer game (also known as a computer game or simply PC game) is a video game played on a personal computer, rather than on a video game console or arcade machine. Computer games have evolved from the simple graphics and gameplay of… … Wikipedia
Trusted Computer System Evaluation Criteria — (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify and… … Wikipedia
Session (computer science) — In computer science, in particular networking, a session is a semi permanent interactive information interchange, also known as a dialogue, a conversation or a meeting, between two or more communicating devices, or between a computer and user… … Wikipedia
Mark Abene — Abene redirects here. For the Senegalese village, see Abéné. Mark Abene in July 2008. Born 1972 (age 38–39) New York City, US Other names Phiber Optik … Wikipedia
Jesse McGraw — Jesse W. McGraw aka GhostExodus plead guilty to 2 counts of computer tampering charges for putting malware on at least 14 computers at the Texas hospital where he worked as a security guard, and for installing the remote access program LogMeIn on … Wikipedia
Evidence Eliminator — Infobox Software name = Evidence Eliminator caption = Evidence Eliminator 6.0 running under Windows XP developer = Robin Hood Software latest release version = 6.01 operating system = Windows [cite web | title = Evidence Eliminator | publisher =… … Wikipedia
Super Bowl XLIII — Pittsburgh Steelers Arizona Cardinals (AFC) (NFC) … Wikipedia
PC game — Computer game redirects here. For interactive gaming in general, see video game. For other uses, see Computer game (disambiguation) … Wikipedia