-
1 Deceptive Electronic Countermeasures
Abbreviation: DECMУниверсальный русско-английский словарь > Deceptive Electronic Countermeasures
-
2 Deceptive / Defence Electronic Countermeasures
Abbreviation: DECMУниверсальный русско-английский словарь > Deceptive / Defence Electronic Countermeasures
-
3 меры РЭП по дезориентации
Military: deception electronic countermeasures (противника), deceptive electronic countermeasures (противника)Универсальный русско-английский словарь > меры РЭП по дезориентации
-
4 меры дезориентации ИК средств
Military: deceptive IR countermeasuresУниверсальный русско-английский словарь > меры дезориентации ИК средств
-
5 дезинформирующие помехи
Military: deception efforts, deception jamming, deceptive activity (создаваемые средствами РЭП), spoof countermeasuresУниверсальный русско-английский словарь > дезинформирующие помехи
-
6 меры радиопротиводействия
Military: deceptive countermeasuresУниверсальный русско-английский словарь > меры радиопротиводействия
См. также в других словарях:
Cybercrime and Countermeasures — Cyber crime, or computer crime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the … Wikipedia
Voice stress analysis — (VSA) technology is said to record psychophysiological stress responses that are present in human voice, when a person suffers psychological stress in response to a stimulus (question) and where the consequences may be dire for the subject being… … Wikipedia
Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… … Wikipedia
Polygraph — This article is about the forensic instrument. For the automatic signing instrument, see Autopen. For the dual pen device that produces a simultaneous copy of an original while it is written in cursive writing, see Polygraph (duplicating device) … Wikipedia
Scareware — Not to be confused with careware or shareware. Scareware comprises several classes of scam software with malicious payloads, or of limited or no benefit, that are sold to consumers via certain unethical marketing practices. The selling… … Wikipedia
Counterintelligence — This article is a subset article of intelligence cycle security. Counterintelligence or counter intelligence (see spelling differences) (CI) refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence… … Wikipedia
Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… … Wikipedia
Counter-intelligence — This article is a subset article of intelligence cycle security. National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process… … Wikipedia
naval warfare — Military operations conducted on, under, or over the sea and waged against other seagoing vessels or targets on land or in the air. The earliest naval attacks were raids by the armed men of a tribe or town using fishing boats or merchant ships.… … Universalium
Domain name scams — are types of Intellectual property scams or confidence scams in which unscrupulous domain name registrars attempt to generate revenue by tricking businesses into buying, listing or converting a domain name. The Office of Fair Trading has outlined … Wikipedia
Presidential Unit Citation (United States) — Presidential Unit Citation Army and Air Force P.U.C … Wikipedia