-
1 spoof countermeasures
Военный термин: дезинформирующие помехи -
2 spoof countermeasures
-
3 countermeasures
pyrotechnic countermeasures (to IR guidance systems) — противодействие ИК системам наведения с помощью пиротехнических средств
— chemical warfare countermeasures— laser systems countermeasures -
4 дезинформирующие помехи
Military: deception efforts, deception jamming, deceptive activity (создаваемые средствами РЭП), spoof countermeasuresУниверсальный русско-английский словарь > дезинформирующие помехи
-
5 target
= tgt1) мишеньа) электрод запоминающей ЭЛТ или передающей телевизионной трубкиб) объект, подвергаемый облучению или бомбардировке частицамив) электрод, являющийся источником осаждаемого материала в установках для распыленияг) вчт устройство (напр. магнитный диск), на который производится копирование данных, проф. мишень ( для копирования данных)д) вчт целевое устройство, вызываемое инициатором для обмена устройство ( в стандарте SCSI)3) рлк цель4) рлк отметка цели5) вчт адресат6) вчт целевой; объектный•- alignment target
- area-extensive target
- blurred target
- clutter target
- complex target
- cooperative target
- countermeasures target
- decoy target
- diode array imaging target
- distributed target
- EBS target
- electron-bombarded semiconductor target
- extended target
- false target
- finite target
- fluctuating target
- ghost target
- high Doppler target
- identifiable target
- interchangeable sputtering target
- low Doppler target
- low-flying target
- multiple target
- multi-point target
- natural target
- phantom target
- plasma target
- point target
- polarizing target
- pyroelectric target
- radar target
- reference target
- registration target
- rigid target
- scintillating target
- silicon target
- single target
- spoof target
- sputtering target
- standard target
- tagged target
- test probe target
- tracked target
- unresolved targets
См. также в других словарях:
Defence of the Reich — Part of Campaigns of World War II … Wikipedia
Air-to-air missile — An air to air missile (AAM) is a guided missile fired from an aircraft for the purpose of destroying another aircraft. It is typically powered by one or more rocket motors, usually solid fuelled but sometimes liquid fuelled. Ramjet engines, as… … Wikipedia
Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… … Wikipedia
E-mail spam — E mail spam, also known as bulk e mail or junk e mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e mail. A common synonym for spam is unsolicited bulk e mail (UBE). Definitions of spam usually… … Wikipedia
Cross-site request forgery — Cross site request forgery, also known as a one click attack or session riding and abbreviated as CSRF (pronounced sea surf[1]) or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that… … Wikipedia
Email spam — An email box folder filled with spam messages. Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of spam that involves nearly identical messages sent to numerous recipients by email. Definitions of spam usually… … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia
Measurement and Signature Intelligence — Measurement and Signature Intelligence, or MASINT, refers to intelligence gathering activities that bring together disparate elements that do not fit within the definitions of the major disciplines mentioned above. As a means of collecting… … Wikipedia
Wireless intrusion prevention system — In computing, a wireless intrusion prevention system (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection) , and can automatically take countermeasures (intrusion… … Wikipedia
air warfare — Military operations conducted by airplanes, helicopters, or other aircraft against aircraft or targets on the ground and in the water. Air warfare did not become important until World War I (1914–18). The British, French, German, Russian, and… … Universalium