-
1 data
informations f pl, données f pl; COMPUTING données f pl;∎ an item of data une information, une donnée;∎ to collect data on sb/sth recueillir des données sur qn/qchdata acquisition collecte f ou saisie f de données;data analysis analyse f de données;data bank banque f de données;data bus bus m de données;data capture saisie de données;data carrier support m de données;data collection recueil m ou collecte de données;data communications communication f ou transmission f de données, télématique f;data compression compression f de données;data decryption déchiffrement m de données;data encryption cryptage m ou codage m de données;data entry entrée f de données;ACCOUNTANCY data entry form fiche f d'imputation;data exchange échange m de données;data export export m de données;data import import m de données;data input introduction f de données;data link voie f de transmission de données;data loss perte f de données;data management gestion f de données;data manipulation manipulation f de données;data memory mémoire f;data network réseau m de données;data organization organisation f des données;data path chemin m d'accès aux données;data privacy confidentialité f des données ou de l'information;data processing informatique f, traitement m de l'information ou des données;data processing centre centre m de traitement de l'information;data processing manager chef m des traitements;data processing system système m de traitement de l'information;data protection protection f de l'information;British Data Protection Act = loi sur la protection de l'information;data recovery récupération f de données;data retrieval recherche f de données;data security sécurité f des données;data set ensemble m de données;data sharing partage m des données;data source source f de données;data storage stockage m de données;data throughput débit m de données;data transfer transfert m ou transmission de données
См. также в других словарях:
Link encryption — is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a teleprinter circuit or the line between two network switches). It contrasts with end to end encryption where messages… … Wikipedia
link encryption — The application of online crypto operation to a link of a communications system so that all information passing over the link is encrypted in its entirety … Military dictionary
Link Encryption — Online Verschlüsselung … Acronyms
Link Encryption — Online Verschlüsselung … Acronyms von A bis Z
Encryption Control Protocol — Das Protokoll ECP (Encryption Control Protocol) ist ein Begriff aus der Informatik. ECP ermöglicht bei einer PPP (Point to Point Protocol) eine Verschlüsselung. Beispielsweise wird mittels 3DESE (Triple DES Encryption Protocol Extension) eine… … Deutsch Wikipedia
NSA encryption systems — The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA approved systems are still classified, but much more about its early systems has become … Wikipedia
End-to-end encryption — Description End to end encryption (E2EE) encrypts clear (red) data at source with knowledge of the intended recipient, allowing the encrypted (black) data to travel safely through vulnerable channels (eg. public networks) to its recipient where… … Wikipedia
Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering … Wikipedia
AACS encryption key controversy — A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing demand letters[1] to websites… … Wikipedia
Proxy re-encryption — schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so that it may be decrypted by another. Examples of UseBob could designate a proxy to re encrypt one of his messages that… … Wikipedia
Homomorphic encryption — is a form of encryption where one can perform a specific algebraic operation on the plaintext by performing a (possibly different) algebraic operation on the ciphertext. Depending on one s viewpoint, this can be seen as a positive or negative… … Wikipedia