-
1 authentic password
Безопасность: аутентичный пароль, подлинный пароль -
2 authentic password
подлинный (аутентичный) парольАнгло-русский словарь по компьютерной безопасности > authentic password
-
3 password
пароль; персональная информация аутентификацииАнгло-русский словарь по компьютерной безопасности > password
-
4 password authentic protocol
Вычислительная техника: протокол доступаУниверсальный англо-русский словарь > password authentic protocol
-
5 password authentic protocol
English-Russian dictionary of Information technology > password authentic protocol
-
6 text security password
English-Russian big polytechnic dictionary > text security password
-
7 terminal
терминал, оконечное (абонентское) устройство- telex terminalАнгло-русский словарь по компьютерной безопасности > terminal
См. также в других словарях:
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Cracking of wireless networks — is the penetration of wireless networks. A wireless network can be penetrated in a number of ways. These ways vary greatly in the level of computer skill and commitment they require. Once within a network, a skilled hacker can modify software,… … Wikipedia
DoSnet — A DoSnet (Denial of Service network) is a type of botnet/malware and mostly used as a term for malicious botnets while benevolent botnets often simply are referred to as botnets. Dosnets are used for Distributed Denial of Service (DDoS) attacks… … Wikipedia
biblical literature — Introduction four bodies of written works: the Old Testament writings according to the Hebrew canon; intertestamental works, including the Old Testament Apocrypha; the New Testament writings; and the New Testament Apocrypha. The Old… … Universalium
SiteKey — is a web based security system that provides one type of mutual authentication between end users and websites. Its primary purpose is to deter phishing.SiteKey has been deployed by several large financial institutions since 2006, including Bank… … Wikipedia
Wireless hacking — In security breaches, wireless hacking is the unauthorized use or penetration of a wireless network. A wireless network can be penetrated in a number of ways. There are methods ranging from those that demand a high level of technological skill… … Wikipedia
List of shibboleths — Below are listed various examples of shibboleths. Note that many apocryphal shibboleths exist, and that since, by definition, shibboleths rely on stereotypical pronunciation traits, they may not accurately describe the speech of all members of… … Wikipedia
Electronic business — Electronic business, commonly referred to as eBusiness or e business , or an internet business, may be defined as the application of information and communication technologies (ICT) in support of all the activities of business. Commerce… … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia