-
1 encryption rule
правило криптографического преобразования (шифрования на секретном ключе)Англо-русский словарь по компьютерной безопасности > encryption rule
-
2 rule
- rule C- rule E -
3 algorithm
1) алгоритм2) правило; процедура; метод•- adaptive algorithm
- Agarval-Cooley algorithm
- aim algorithm
- annealing algorithm
- asymmetric encryption algorithm
- autoregressive algorithm
- backoff algorithm
- back propagation of error algorithm
- batch algorithm
- Bellman-Ford algorithm
- best cost path algorithm
- bisection algorithm
- branch and bound algorithm - CART algorithm
- channel algorithm
- channel routing algorithm
- Cholesky algorithm
- classification and regression tree algorithm
- clustering algorithm
- Cochran-Orcutt algorithm
- compression algorithm
- conjugate directions algorithm
- conjugate gradients algorithm
- constructive algorithm
- contour following algorithm
- control algorithm
- convolution algorithm
- Cooley-Tuckey algorithm
- cryptographic algorithm
- deflation compression algorithm
- differential synthesis algorithm
- Diffie-Hellman algorithm
- digital signal processing algorithm
- digital signature algorithm
- Dijkstra algorithm
- distance vector algorithm
- DSP algorithm
- dynamic programming algorithm
- edge-tracking algorithm
- evolutionary algorithm
- exact embedding algorithm
- expansion algorithm
- fast algorithm
- fast convolution Agarval-Cooley algorithm
- fixed-weight algorithm
- Ford-Fulkerson algorithm
- fundamental algorithm
- fuzzy algorithm
- general algorithm - greedy algorithm
- Gummel's algorithm
- hashing algorithm
- heuristic algorithm
- ID3 algorithm
- identification algorithm
- initialization algorithm
- integer algorithm - iterative dichotomizer 3 algorithm
- k-means algorithm
- learning algorithm
- least frequently used algorithm
- least recently used algorithm
- Lee-Moore algorithm
- Lee algorithm
- Lee-type algorithm
- Lempel-Ziv algorithm
- Lempel-Ziv-Welch algorithm
- Levenberg-Marquardt algorithm
- LFU algorithm
- line-probe algorithm
- link state algorithm
- LU decomposition algorithm
- LZ algorithm
- LZW algorithm
- MacQueen's k-means algorithm
- McCulloch-Pitts algorithm
- memetic algorithm - min-cut algorithm - nested algorithm
- numerical algorithm
- Oja iterative algorithm
- on-line algorithm
- optimization algorithm
- ordering algorithm
- painter's algorithm
- parallel algorithm
- pattern classification algorithm
- pattern recognition algorithm
- pel-recursive estimation algorithm
- placement algorithm
- planning algorithm
- polynomial algorithm
- predictive algorithm
- preemptive algorithm
- Prim algorithm
- production rule based algorithm
- pruning algorithm
- pseudo least recently used algorithm
- quantum search algorithm
- quick-union algorithm
- quick-union algorithm with path compression
- Q-R-algorithm
- radix sorting algorithm
- randomized algorithm
- rank algorithm
- Read-Solomon cyclic redundancy compression algorithm
- recognition algorithm
- recurrent algorithm
- recursive algorithm
- resilient propagation algorithm - routing algorithm
- Rprop algorithm
- RSA algorithm
- scheduling algorithm
- search algorithm
- search network algorithm - self-organizing algorithm
- semi-numerical algorithm
- sequential algorithm - shortest path algorithm
- sieving algorithm
- simulated annealing training algorithm
- simulation algorithm
- smoothing algorithm
- software algorithm
- spanning tree algorithm
- spline algorithm
- splitting algorithm
- stack algorithm
- statistical algorithm
- stochastic algorithm
- supervised training algorithm
- symmetric encryption algorithm
- time-wheel algorithm
- training algorithm
- universal algorithm
- unsupervised training algorithm
- van der Waerden algorithm
- variational algorithm
- vector distance algorithm
- Viterbi algorithm
- VLSI algorithm
- weighted quick-union algorithm
- working algorithm -
4 algorithm
1) алгоритм2) правило; процедура; метод•- Agarval-Cooley algorithm
- aim algorithm
- algorithm of doubtful convergence
- annealing algorithm
- asymmetric encryption algorithm
- autoregressive algorithm
- back propagation of error algorithm
- backoff algorithm
- batch algorithm
- Bellman-Ford algorithm
- best cost path algorithm
- bisection algorithm
- branch and bound algorithm
- British Telecom Lempel-Ziv algorithm
- BTLZ algorithm
- CART algorithm
- channel algorithm
- channel routing algorithm
- Cholesky algorithm
- classification and regression tree algorithm
- clustering algorithm
- Cochran-Orcutt algorithm
- compression algorithm
- conjugate directions algorithm
- conjugate gradients algorithm
- constructive algorithm
- contour following algorithm
- control algorithm
- convolution algorithm
- Cooley-Tuckey algorithm
- cryptographic algorithm
- deflation compression algorithm
- differential synthesis algorithm
- Diffie-Hellman algorithm
- digital signal processing algorithm
- digital signature algorithm
- Dijkstra algorithm
- distance vector algorithm
- DSP algorithm
- dynamic programming algorithm
- edge-tracking algorithm
- evolutionary algorithm
- exact embedding algorithm
- expansion algorithm
- fast algorithm
- fast convolution Agarval-Cooley algorithm
- fixed-weight algorithm
- Ford-Fulkerson algorithm
- fundamental algorithm
- fuzzy algorithm
- general algorithm
- genetic algorithm
- graph search algorithm
- greedy algorithm
- Gummel's algorithm
- hashing algorithm
- heuristic algorithm
- ID3 algorithm
- identification algorithm
- initialization algorithm
- integer algorithm
- international data encryption algorithm
- iterative algorithm
- iterative dichotomizer 3 algorithm
- k-means algorithm
- learning algorithm
- least frequently used algorithm
- least recently used algorithm
- Lee-algorithm
- Lee-Moore algorithm
- Lee-type algorithm
- Lempel-Ziv algorithm
- Lempel-Ziv-Welch algorithm
- Levenberg-Marquardt algorithm
- LFU algorithm
- line-probe algorithm
- link state algorithm
- LU decomposition algorithm
- LZ algorithm
- LZW algorithm
- MacQueen's k-means algorithm
- McCulloch-Pitts algorithm
- memetic algorithm
- message authentication algorithm
- metaheuristic algorithm
- min-cut algorithm
- modified Gram-Schmidt algorithm
- Nelder-Mead simplex algorithm
- nested algorithm
- numerical algorithm
- Oja iterative algorithm
- on-line algorithm
- optimization algorithm
- ordering algorithm
- painter's algorithm
- parallel algorithm
- pattern classification algorithm
- pattern recognition algorithm
- pel-recursive estimation algorithm
- placement algorithm
- planning algorithm
- polynomial algorithm
- predictive algorithm
- preemptive algorithm
- Prim algorithm
- production rule based algorithm
- pruning algorithm
- pseudo least recently used algorithm
- Q-R-algorithm
- quantum search algorithm
- quick-union algorithm with path compression
- quick-union algorithm
- radix sorting algorithm
- randomized algorithm
- rank algorithm
- Read-Solomon cyclic redundancy compression algorithm
- recognition algorithm
- recurrent algorithm
- recursive algorithm
- resilient propagation algorithm
- Rivest-Shamir-Adleman algorithm
- robust algorithm
- routing algorithm
- RProp algorithm
- RSA algorithm
- scheduling algorithm
- search algorithm
- search network algorithm
- secure hash algorithm
- selective-trace algorithm
- self-organizing algorithm
- semi-numerical algorithm
- sequential algorithm
- sequential leader clustering algorithm
- serial algorithm
- shortest path algorithm
- sieving algorithm
- simulated annealing training algorithm
- simulation algorithm
- smoothing algorithm
- software algorithm
- spanning tree algorithm
- spline algorithm
- splitting algorithm
- stack algorithm
- statistical algorithm
- stochastic algorithm
- supervised training algorithm
- symmetric encryption algorithm
- time-wheel algorithm
- training algorithm
- universal algorithm
- unsupervised training algorithm
- van der Waerden algorithm
- variational algorithm
- vector distance algorithm
- Viterbi algorithm
- VLSI algorithm
- weighted quick-union algorithm
- working algorithmThe New English-Russian Dictionary of Radio-electronics > algorithm
-
5 PES
1) Общая лексика: process equipment supplier2) Медицина: СПП, стент, покрытый паклитакселом3) Военный термин: PULHEEMS employment standard, Positive Enable System, permanent executive secretariat, pointing error sensor, program evaluation system4) Техника: passive electromagnetic system, polyethersulphone5) Химия: Polyethersulfone6) Грубое выражение: Pissy Ending Syndrome7) Оптика: photoelectric scanner8) Сокращение: Performance Evaluation System, Private Express Statutes (together with "Universal Service Obligation" and "Exclusive Mailbox Access" rule = USPS postal monopoly), post enumeration survey, processed eucheuma seaweed, переработанная морская водоросль эухеума9) Текстиль: полиэстр10) Физика: photoelectron spectroscopy11) Физиология: Psychiatric Evaluation Service12) Электроника: Photo- Electron Spectroscopy, Programmer Electronic Switch13) Вычислительная техника: Programmed Electrical Stimulation, packetised elementary stream, система оценки программы, P-bit Errored Seconds (DS3/E3, BIT), Photo-Electric Scanning (DTP), Proposed Encryption Standard (Verschluesselung)14) Стоматология: pink esthetic score15) Связь: personal earth station16) Фирменный знак: Percy Engineering Services, Petroleum Engineering Services17) Сетевые технологии: Packetized Elementary Stream, Process Engineering Suite18) Сахалин А: programmable electronic system19) Медицинская техника: Programmed Extra Stimulation (режим работы устройства кардиостимуляции)20) Безопасность: Proposed Encryption Standard21) Расширение файла: Positioning Error Signal, Processor Enhancement Socket, Processor Upgrade Socket, Program Editor work space file (WordPerfect Library)22) Энергосистемы: Public Electricity Supplier23) Нефть и газ: potential earthquake source, ВОЗ, возможный очаг сильных землетрясений25) Аэропорты: Petrozavodsk, Russia26) Программное обеспечение: Personal Email Solution -
6 pes
1) Общая лексика: process equipment supplier2) Медицина: СПП, стент, покрытый паклитакселом3) Военный термин: PULHEEMS employment standard, Positive Enable System, permanent executive secretariat, pointing error sensor, program evaluation system4) Техника: passive electromagnetic system, polyethersulphone5) Химия: Polyethersulfone6) Грубое выражение: Pissy Ending Syndrome7) Оптика: photoelectric scanner8) Сокращение: Performance Evaluation System, Private Express Statutes (together with "Universal Service Obligation" and "Exclusive Mailbox Access" rule = USPS postal monopoly), post enumeration survey, processed eucheuma seaweed, переработанная морская водоросль эухеума9) Текстиль: полиэстр10) Физика: photoelectron spectroscopy11) Физиология: Psychiatric Evaluation Service12) Электроника: Photo- Electron Spectroscopy, Programmer Electronic Switch13) Вычислительная техника: Programmed Electrical Stimulation, packetised elementary stream, система оценки программы, P-bit Errored Seconds (DS3/E3, BIT), Photo-Electric Scanning (DTP), Proposed Encryption Standard (Verschluesselung)14) Стоматология: pink esthetic score15) Связь: personal earth station16) Фирменный знак: Percy Engineering Services, Petroleum Engineering Services17) Сетевые технологии: Packetized Elementary Stream, Process Engineering Suite18) Сахалин А: programmable electronic system19) Медицинская техника: Programmed Extra Stimulation (режим работы устройства кардиостимуляции)20) Безопасность: Proposed Encryption Standard21) Расширение файла: Positioning Error Signal, Processor Enhancement Socket, Processor Upgrade Socket, Program Editor work space file (WordPerfect Library)22) Энергосистемы: Public Electricity Supplier23) Нефть и газ: potential earthquake source, ВОЗ, возможный очаг сильных землетрясений25) Аэропорты: Petrozavodsk, Russia26) Программное обеспечение: Personal Email Solution -
7 security
1) безопасность; служба безопасности2) защита; защищенностьАнгло-русский словарь по компьютерной безопасности > security
-
8 control
1) управление2) контроль, проверкаАнгло-русский словарь по компьютерной безопасности > control
См. также в других словарях:
40-bit encryption — refers to a key size of forty bits, or five bytes, for symmetric encryption; this represents a relatively low level of security. A forty bit length corresponds to a total of 2^{40} possible keys. Although this is a large number in human terms… … Wikipedia
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Digital rights management — (DRM) is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals to limit the use of digital content and devices. The term is used to describe any technology that inhibits uses … Wikipedia
Health Insurance Portability and Accountability Act — The Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in 1996. According to the Centers for Medicare and Medicaid Services (CMS) website, Title I of HIPAA protects health insurance coverage for workers… … Wikipedia
Clandestine HUMINT operational techniques — The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called tradecraft . It applies to clandestine… … Wikipedia
Pretty Good Privacy — Original author(s) Phil Zimmermann Developer(s) Phil Zimmermann Initial release In 1991 Written in Multi language … Wikipedia
Pirate decryption — most often refers to the reception of compromised pay TV or pay radio signals without authorization from the original broadcaster. The term pirate in this case is used in the sense of copyright infringement and has little or nothing to do with… … Wikipedia
Secure communication — includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no… … Wikipedia
National Security Agency — NSA redirects here. For other uses, see NSA (disambiguation). For the Bahraini intelligence agency, see National Security Agency (Bahrain). National Security Agency Agency overview … Wikipedia