-
1 encrypted information
Безопасность: зашифрованная информация, шифрованная информация, шифровка -
2 encrypted information
зашифрованная информация, шифротекстАнгло-русский словарь по компьютерной безопасности > encrypted information
-
3 encrypted information
s.encriptación. -
4 information
информация, сведенияАнгло-русский словарь по компьютерной безопасности > information
-
5 encrypted access information
(за) шифрованная информация для доступаАнгло-русский словарь по компьютерной безопасности > encrypted access information
-
6 encrypted classified information
Англо-русский словарь по компьютерной безопасности > encrypted classified information
-
7 зашифрованная информация
1) Engineering: ciphered information, enciphered information2) Security: black information, cryptoinformation, encrypted informationУниверсальный русско-английский словарь > зашифрованная информация
-
8 шифрованная информация
1) Engineering: ciphered information2) Makarov: enciphered information3) Security: encrypted informationУниверсальный русско-английский словарь > шифрованная информация
-
9 шифровка
1) General subject: a telegram in code, cipher message, cypher message2) Military: cipher text3) Engineering: cipher, encipherment, encryption4) Law: ciphering5) Economy: coded merit, coding (напр. адресов), encription (данных)6) Polygraphy: encoding7) Telecommunications: encapsulation (данных)8) Business: ciphered message9) Security: cipher communication, cryptocommunication, cryptogram, encrypted information10) SAP.tech. encrypting -
10 encriptación
f.1 encryption.2 encrypted information.* * *= encryption.Ex. Apart from serving as 'electronic money', smart cards are already being envisaged as identification and access control passes, bearers of personal records, encryption devices and so on.----* descodificar una programa de encriptación = crack + encryption software.* * *= encryption.Ex: Apart from serving as 'electronic money', smart cards are already being envisaged as identification and access control passes, bearers of personal records, encryption devices and so on.
* descodificar una programa de encriptación = crack + encryption software.* * *encriptación nfInformát encryption -
11 зашифрованная копия
Information technology: encrypted copyУниверсальный русско-английский словарь > зашифрованная копия
-
12 шифрованное соединение
Information technology: encrypted connectionУниверсальный русско-английский словарь > шифрованное соединение
-
13 шифрованное туннелирование
Information technology: encrypted tunnelingУниверсальный русско-английский словарь > шифрованное туннелирование
-
14 шифрованный вирус
Information technology: encrypted virus -
15 шифрованный пароль
Information technology: encrypted passwordУниверсальный русско-английский словарь > шифрованный пароль
-
16 codificado
adj.coded, encrypted, encoded, hidden in code.past part.past participle of spanish verb: codificar.* * *1.SM2.ADJ coded* * *= scrambled, coded.Ex. The set-top box may also contain remotely controllable descrambling circuits for services which are transmitted in a scrambled form.----* codificado de antemano = precoded [pre-coded].* información no codificada = non-coded information.* mensaje codificado = encrypted message.* no codificado = non-coded.* * *= scrambled, coded.Ex: The set-top box may also contain remotely controllable descrambling circuits for services which are transmitted in a scrambled form.
* codificado de antemano = precoded [pre-coded].* información no codificada = non-coded information.* mensaje codificado = encrypted message.* no codificado = non-coded.* * *codificado, -a adj[emisión de TV] scrambled* * *adj TV encrypted -
17 sistema de cobro por la información usada
(n.) = information meteringEx. Information metering is a developing technology that enables an entire collection of information to be distributed at very low cost to a user in encrypted form, the user paying on a pay as you view basis.* * *(n.) = information meteringEx: Information metering is a developing technology that enables an entire collection of information to be distributed at very low cost to a user in encrypted form, the user paying on a pay as you view basis.
Spanish-English dictionary > sistema de cobro por la información usada
-
18 encryption
E-coma means of encoding information, especially financial data, so that it can be transmitted over the Internet without being read by unauthorized parties.Within an Internet security system, a secure server uses encryption when transferring or receiving data from the Web. Credit card information, for example, which could be targeted by a hacker, is encrypted by the server, turning it into special code that will then be decrypted only when it is safely within the server environment. Once the information has been acted on, it is either deleted or stored in encrypted form. -
19 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
20 file
- 1
- 2
См. также в других словарях:
Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… … Wikipedia
information theory — the mathematical theory concerned with the content, transmission, storage, and retrieval of information, usually in the form of messages or data, and esp. by means of computers. [1945 50] * * * ▪ mathematics Introduction a mathematical… … Universalium
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Information privacy — Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally… … Wikipedia
Information leakage — happens whenever a system that is designed to be closed to an eavesdropper reveals some information to unauthorized parties nonetheless. For example, when designing an encrypted instant messaging network, a network engineer without the capacity… … Wikipedia
Encrypted Key Transport — or EKT is an extension to SRTP that fits within the SRTP framework and reduces the amount of signaling control that is needed in an SRTP session. EKT securely distributes the SRTP master key and other information for each SRTP source, using SRTCP … Wikipedia
encrypted — a. converted into a coded form that cannot be interpreted without knowing the secret method for interpretation, called the key; of messages or other forms of information. Syn: encoded, coded, enciphered, ciphered, cyphered, written in code.… … The Collaborative International Dictionary of English
Information protection policy — is a document which provides guidelines to users on the processing, storage and transmission of sensitive information. Main goal is to ensure information is appropriately protected from modification or disclosure. It may be appropriate to have… … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Al Gore and information technology — Al Gore is the former Vice President of the United States (1993–2001), the 2000 Democratic Party presidential nominee, and the co winner of the 2007 Nobel Peace Prize. He has been involved with the development of the Internet since the… … Wikipedia
Program Specific Information — (PSI) is metadata, part of MPEG transport stream.The PSI data contains four tables: PAT (Program Association Table), CAT (Conditional Access Table), PMT (Program Map Table) and NIT (Network Information Table). This last table is normally not used … Wikipedia