-
61 Trunk Encryption
Security: TE -
62 Variable Encryption and Intelligence Labeling
Security: VEILУниверсальный русско-английский словарь > Variable Encryption and Intelligence Labeling
-
63 Weak Encryption Protocol
Security: WEPУниверсальный русско-английский словарь > Weak Encryption Protocol
-
64 Wireless Encryption
Security: WEУниверсальный русско-английский словарь > Wireless Encryption
-
65 Wireless Encryption Privacy
Security: WEPУниверсальный русско-английский словарь > Wireless Encryption Privacy
-
66 Wireless Encryption Protocol
Security: WEPУниверсальный русско-английский словарь > Wireless Encryption Protocol
-
67 Wireless Encryption Standard
Security: WESУниверсальный русско-английский словарь > Wireless Encryption Standard
-
68 Word Auto Key Encryption
Security: WAKEУниверсальный русско-английский словарь > Word Auto Key Encryption
-
69 Working Key Encryption Key
Security: WKEKУниверсальный русско-английский словарь > Working Key Encryption Key
-
70 data encryption key
Security: DEKУниверсальный русско-английский словарь > data encryption key
-
71 data encryption processor
Security: DEPУниверсальный русско-английский словарь > data encryption processor
-
72 low cost encryption and authentication device
Security: LEADУниверсальный русско-английский словарь > low cost encryption and authentication device
-
73 Data Encryption Standard/Cipher Block Chaining
Универсальный русско-английский словарь > Data Encryption Standard/Cipher Block Chaining
-
74 Endorsed Data Encryption Standard Products List
Универсальный русско-английский словарь > Endorsed Data Encryption Standard Products List
-
75 File Encryption Key
1) Information technology: FEK (Verschluesselung)2) Security: FEKУниверсальный русско-английский словарь > File Encryption Key
-
76 Improved Proposed Encryption Standard
1) Information technology: IPES (IDEA, PES, Verschluesselung)2) Security: IPESУниверсальный русско-английский словарь > Improved Proposed Encryption Standard
-
77 Proposed Encryption Standard
1) Information technology: PES (Verschluesselung)2) Security: PESУниверсальный русско-английский словарь > Proposed Encryption Standard
-
78 Tactical Data Encryption System
Универсальный русско-английский словарь > Tactical Data Encryption System
-
79 Tiny Encryption Algorithm
1) Information technology: TEA (Verschluesselung)2) Security: TEAУниверсальный русско-английский словарь > Tiny Encryption Algorithm
-
80 commercial encryption
коммерческие криптосистемы: Computer Security Center Центр безопасности коммерческих вычислительных систем (Англии)English-Russian cryptological dictionary > commercial encryption
См. также в других словарях:
Encryption software — is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Contents 1 Security 2… … Wikipedia
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Security by Obscurity — Security through obscurity oder security by obscurity (engl. „Sicherheit durch Unklarheit“) bezeichnet ein kontroverses Prinzip in der Computer und Netzwerksicherheit, nach dem versucht wird, Sicherheit durch Verschleierung bzw. Geheimhaltung zu… … Deutsch Wikipedia
Security by obscurity — Security through obscurity oder security by obscurity (engl. „Sicherheit durch Unklarheit“) bezeichnet ein kontroverses Prinzip in der Computer und Netzwerksicherheit, nach dem versucht wird, Sicherheit durch Verschleierung bzw. Geheimhaltung zu… … Deutsch Wikipedia
Security through Obscurity — oder security by obscurity (engl. „Sicherheit durch Unklarheit“) bezeichnet ein kontroverses Prinzip in der Computer und Netzwerksicherheit, nach dem versucht wird, Sicherheit durch Verschleierung bzw. Geheimhaltung zu erreichen. Ein System… … Deutsch Wikipedia
Security through obscurity — oder security by obscurity (engl. „Sicherheit durch Unklarheit“) bezeichnet ein kontroverses Prinzip in der Computer und Netzwerksicherheit, nach dem versucht wird, Sicherheit durch Verschleierung bzw. Geheimhaltung zu erreichen.… … Deutsch Wikipedia
Security protocol notation — Security (engineering) protocol notation is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network. In the context of a formal model, it allows reasoning about the properties of such a… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Encryption — Encrypt redirects here. For the film, see Encrypt (film). This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography. In cryptography, encryption is the process of… … Wikipedia
Security of Advanced Access Content System — The security of Advanced Access Content System has a subject of discussion amongst security researchers, high definition video enthusiasts, and consumers at large since its inception. A successor to Content Scramble System, the digital rights… … Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia