-
1 protection against eavesdropping
Англо-русский словарь по компьютерной безопасности > protection against eavesdropping
-
2 protection
защита; средства защитыАнгло-русский словарь по компьютерной безопасности > protection
См. также в других словарях:
Near field communication — An NFC enabled mobile phone interacting with a SmartPoster Near field communication, or NFC, allows for simplified transactions, data exchange, and wireless connections between two devices in proximity to each other, usually by no more than a few … Wikipedia
Cracking of wireless networks — is the penetration of wireless networks. A wireless network can be penetrated in a number of ways. These ways vary greatly in the level of computer skill and commitment they require. Once within a network, a skilled hacker can modify software,… … Wikipedia
Near Field Communication — or NFC, is a short range high frequency wireless communication technology which enables the exchange of data between devices over about a 10 centimetre (around 4 inches) distance.Fact|date=July 2008 The technology is a simple extension of the ISO … Wikipedia
Frequency-hopping spread spectrum — (FHSS) is a method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. A spread spectrum transmission offers three main advantages over… … Wikipedia
2G — (or 2 G) is short for second generation wireless telephone technology.Second generation 2G cellular telecoms networks were commercially launched on the GSM standard in Finland by Radiolinja (now part of Elisa) in 1991. Three primary benefits of… … Wikipedia
United States — a republic in the N Western Hemisphere comprising 48 conterminous states, the District of Columbia, and Alaska in North America, and Hawaii in the N Pacific. 267,954,767; conterminous United States, 3,022,387 sq. mi. (7,827,982 sq. km); with… … Universalium
Katz v. United States — SCOTUSCase Litigants=Katz v. United States ArgueDate=October 17 ArgueYear=1967 DecideDate=December 18 DecideYear=1967 FullName=Charles Katz v. United States USVol=389 USPage=347 Citation=88 S. Ct. 507; 19 L. Ed. 2d 576; 1967 U.S. LEXIS 2… … Wikipedia
Bluetooth — This article is about the electronic protocol. For the medieval King of Denmark, see Harald I of Denmark. Bluetooth logo Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength … Wikipedia
Counterintelligence — This article is a subset article of intelligence cycle security. Counterintelligence or counter intelligence (see spelling differences) (CI) refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence… … Wikipedia
Counter-intelligence and counter-terrorism organizations — Counterintelligence, and closely related counterterrorism, may well be a source of positive intelligence on the opposition s priorities and thinking, not just a defensive measure. Still, foreign intelligence capability is an important part of… … Wikipedia
Norton Internet Security — The main, simplified graphical user interface of Norton Internet Security 2012 … Wikipedia