-
1 log-in password
Англо-русский словарь по компьютерной безопасности > log-in password
-
2 log-on password
Англо-русский словарь по компьютерной безопасности > log-on password
-
3 log-on password oriented access
Англо-русский словарь по компьютерной безопасности > log-on password oriented access
-
4 password
пароль; персональная информация аутентификацииАнгло-русский словарь по компьютерной безопасности > password
-
5 access
1) доступ (в систему обработки информации или в сеть связи)2) доступ (на защищенную территорию); способ доступа -
6 SNP
1) Общая лексика: hum. сокр. Single Nucleotide Polymorphism, (single nucleotide polymorphism) однонуклеотидный полиморфизм, полиморфизм одного нуклеотида2) Медицина: sodium nitroprusside, единичный нуклеотидный полиморфизм (single nucleotide polymorphism)3) Американизм: Still No Policies4) Спорт: Sporting News Points5) Военный термин: space nuclear propulsion6) Техника: Skagit nuclear power project, satellite navigation program7) Телекоммуникации: Sequence Number Protection, Sequence Number Packet (NetWare)8) Сокращение: Scottish National Party, Sidewall Neutron Log, Stabilized Normal Probability, ОНП (Однонуклеотидный полиморфизм - single-nucleotide polymorphisms - изменение гомологичных участков ДНК на один нуклеотид у одного вида.)9) Вычислительная техника: SubNetwork Protocol, Series Ninety Protocol (Протокол для ПЛК с поддержкой режима мастер-слэйв через интерфейсы RS-232, RS-422 и RS-485.)10) Нефть: sidewall neutron porosity log, диаграмма нейтронного каротажа с прижимным зондом (sidewall neutron log), Sidewall Neutron Porosity Logging11) Генетика: SNP-маркер (однонуклеотидные полиморфные маркеры), анализ однонуклеотидных полиморфизмов, однонуклеотидный полиморфизм12) Онкология: Single Nucleotide Polymorphism13) Геофизика: диаграмма нейтронного каротажа по надтепловым нейтронам с прижимным зондом (торг. марка компании Schlumberger), метод нейтронного каротажа по надтепловым нейтронам с прижимным зондом (торг. марка компании Schlumberger)14) Деловая лексика: Планирование сбытовой сети (sales network planning)15) Образование: School Nutrition Program16) Безопасность: Security News Portal17) Расширение файла: Output video format from Computer Eyes equipment, Serial Number/Password (Omen Technology), Book-shelf for.BOO (READIBM)18) NYSE. China Petroleum & Chemical19) Аэропорты: St. Paul Island, Alaska USA -
7 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
8 PWL
1) Компьютерная техника: PHP Web Log2) Военный термин: Petroleum and Water Logistics, power level3) Математика: Piece- Wise Linear, кусочно линейный (piecewise linear)4) Юридический термин: Prevailing Wage Law5) Фирменный знак: Pete Waterman Limited6) Глоссарий компании Сахалин Энерджи: prediction based on well log data7) Авиационная медицина: sound power level8) Безопасность: Pass Word List9) Расширение файла: Password List
См. также в других словарях:
log on — To establish a connection to a computer system or online information service; also known as logon and log in. Many systems require the entry of an identification number or a password before the system can be accessed. See also log off;… … Dictionary of networking
Password strength — is a measurement of the effectiveness of a password as an authentication credential. Specifically, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to correctly guess it. The… … Wikipedia
Password chaos — Password chaos, also known as identity chaos, is the feeling experienced by computer users who use a large amount of software applications which require authentication.An example would be a user who needs needs a password to log in to their… … Wikipedia
log-in — UK US (also log on, login, logon) noun [C] IT, INTERNET ► the set of letters and numbers that you write on a computer screen in order to connect to a computer system: »If you re worried about other people accessing your information, you can make… … Financial and business terms
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
log on — verb enter a computer Have you logged in lately? • Syn: ↑log in, ↑log in • Ant: ↑log out (for: ↑log in) • Hypernyms: ↑ … Useful english dictionary
Password policy — A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization s official regulations and may be taught as part… … Wikipedia
log in — verb To gain access to a computer system, usually by providing a previously agreed upon username and password. I would like to log in to check my e mail, but I cant remember my password. Syn: log on, logon Ant … Wiktionary
Password length parameter — In telecommunication, a password length parameter is a basic parameter which affects password strength against brute force attack and so is a contributor to computer security. Password length parameters are related by the expression P = L imes R… … Wikipedia
log — log1 loggish, adj. /lawg, log/, n., v., logged, logging. n. 1. a portion or length of the trunk or of a large limb of a felled tree. 2. something inert, heavy, or not sentient. 3. Naut. any of various devices for determining the speed of a ship,… … Universalium
log — /lɒg / (say log) noun 1. an unhewn portion or length of the trunk or a large limb of a felled tree. 2. something inert or heavy. 3. Nautical a. a device for determining the speed of and distance covered by a ship. b. Also, chip log. a device… …