-
61 method
метод; способ -
62 technique
Англо-русский словарь по компьютерной безопасности > technique
-
63 криптографическая защита
Большой англо-русский и русско-английский словарь > криптографическая защита
-
64 protection
1) защита; охрана; обеспечение безопасности2) крепление; ограждение3) гарантия•-
acoustic protection
-
aircraft hijack protection
-
anodic protection
-
arc protection
-
automatic overload protection
-
average quality protection
-
backup protection
-
balance protection
-
bank protection
-
bilge protection
-
boundary protection
-
built-in power-supply protection
-
built-in thermal protection
-
busbar protection
-
bus protection
-
cabin glare protection
-
carbon build-up protection
-
carrier-current protection
-
cathodic protection
-
circuit breaker protection
-
circulating-current pilot-wire differential protection
-
coating protection
-
collision protection
-
computer protection
-
contact protection
-
copyright protection
-
corrosion protection
-
crossing protection
-
cryptographic protection
-
current protection
-
damage protection
-
data protection
-
database protection
-
definite-time graded relay protection
-
definite-time graded protection
-
differential protection
-
digital distance protection
-
digital overvoltage protection
-
diode protection
-
directional ground protection
-
directional protection
-
discrimination protection
-
distance protection
-
dual protection
-
electrochemical protection
-
encryption protection
-
engine overspeed protection
-
environmental protection
-
error protection
-
excess-voltage protection
-
explosion protection
-
external field protection
-
falling voltage protection
-
fault protection
-
fetch protection
-
field-failure protection
-
field-winding protection
-
file protection
-
fire protection
-
flag protection
-
flood protection
-
foam fire protection
-
foam protection
-
frost-heave protection
-
galvanic protection
-
gas protection
-
ground fault protection
-
ground overcurrent protection
-
ground overvoltage protection
-
hail protection
-
head-on protection
-
highlight overload protection
-
high-speed protection
-
high-voltage protection
-
impedance protection
-
implosion protection
-
indoor protection
-
interference protection
-
interturn short-circuit protection
-
intrusion protection
-
inverse-definite-time current protection
-
jamming protection
-
lading protection
-
leakage protection
-
lightning protection
-
lightning surge protection
-
local backup protection
-
longitudinal differential protection
-
loss-of-field protection
-
loss-of-synchronism protection
-
lot quality protection
-
low-voltage protection
-
magnetic protection
-
memory protection
-
missiles protection
-
negative phase-sequence protection
-
negative sequence protection
-
no-voltage protection
-
no-volt protection
-
open-phase protection
-
opposing block protection
-
outdoor protection
-
out-of-step protection
-
overall protection
-
overcurrent protection
-
overload protection
-
overpower protection
-
overspeed protection
-
overvoltage protection
-
oxide protection
-
password protection
-
percentage biased differential protection
-
percentage differential protection
-
phase overcurrent fault protection
-
phase-comparison protection
-
phase-failure protection
-
phase-reversal protection
-
physical protection
-
pilot-wire protection
-
points protection
-
pole slipping protection
-
positive phase-sequence protection
-
positive sequence protection
-
power protection
-
power system relay protection
-
power system protection
-
power-down protection
-
program protection
-
protection of labor
-
radiation protection
-
radiological protection
-
reactance protection
-
reactor protection
-
rear protection
-
relay protection
-
remote backup protection
-
riprap protection
-
roll-over protection
-
rotor ground-fault protection
-
rust protection
-
sacrificial protection
-
sandblasting protection
-
scour protection
-
sectionalizing protection
-
selective protection
-
shore protection
-
short-circuit protection
-
skid protection
-
slip protection
-
slope protection
-
smoke protection
-
spark protection
-
static discharge protection
-
stator short-circuit protection
-
stepped current protection
-
storage protection
-
surge voltage protection
-
surge protection
-
switching error protection
-
text security protection
-
thermal overload protection
-
thermal protection
-
trailing protection
-
transverse differential protection
-
traveling-wave protection
-
tripping protection
-
unbalance protection
-
undercurrent protection
-
underfrequency protection
-
undervoltage protection
-
unequal error protection
-
visibility protection
-
water protection
-
weather protection
-
wheel slide protection
-
work-site protection
-
zerophase-sequence protection
-
zerosequence protection -
65 криптографическая защита
Англо-русский словарь технических терминов > криптографическая защита
-
66 DES/GSA
-
67 RSA
1) Общая лексика: Russian standards of accounting, РСБУ, Южно-Африканская Республика (Republic of South Africa), ЮАР2) Медицина: respiratory sinus arrhythmia3) Американизм: Radiation Safety Academy, Rehabilitation Services Administration4) Спорт: Roller Skating Association International5) Военный термин: Redstone Arsenal, Regimental Support Area, Returned Services Association, Royal Signals Association, radar service area, radar signature analysis, range safety approval, range support aircraft, remote storage activity, request for salvage action, reserve storage area, retire to staging area6) Техника: remote shutdown area, remote station alarm7) Строительство: Уголок из стального проката (Rolled Steel Angle)8) Юридический термин: Revised Statutes Annotated, Ritual Sexual Abuse9) Телекоммуникации: Rivest, Shamir, Adleman (encryption)10) Сокращение: Range Standardization & Automation programme (USA), Rear Support Area (NATO), Regional Security Affairs, Republic of South Africa, Royal School of Artillery (UK), Royal Society of Arts, Russian Space Agency, Cryptosystem proposed by R.L.Rivest, A.Shamir and L.M.Adleman11) Университет: Resident Students Association, Residential Student Association12) Физиология: Recurrent Spontaneous Abortion13) Вычислительная техника: Reference System Architecture, Reusable Software Assets, Rivest-Shamir-Adleman, алгоритм цифровой подписи Ривеста-Шамира-Адельмана, Rivest, Shamir and Adleman (Verschluesselung, RSA), Random Scheduling Algorithm (protocol)14) Иммунология: rabbit serum albumin, rabbit sialoglycoprotein antigen, rabbit sperm autoantigen15) Космонавтика: РКА, Российское Космическое Агентство16) Канадский термин: Revised Statutes Of Alberta17) Биотехнология: redundant siRNA activity18) Транспорт: Runway Safety Area19) Пищевая промышленность: Responsible Serving of Alcohol20) Фирменный знак: Rochester Software Associates21) Сетевые технологии: алгоритм цифровой подписи Райвеста-Шамира-Адлемана22) Программирование: Rivest Shamir And23) Химическое оружие: residue storage area24) Дорожное движение: Программа помощи на дорогах (Roadside Assistance)25) Нефть и газ: Restructuring Shareholders Agreement26) Яхтенный спорт: Южно-Африканская р-ка (Обозначения на парусах)27) Фармация: rat serum albumin28) Должность: Regional Support Administrator29) NYSE. Royal & Sun Alliance Insurance Company30) Аэропорты: Santa Rosa, LP, Argentina31) СМС: Rock Solid Algorithm32) Международная торговля: Reactor Studios Amsterdam -
68 SET
1) Общая лексика: Secure Electronic Transfer. с (A safe and confidential way of paying for goods which have been purchased over the Internet. Безопасный и конфиденциальный способ оплаты за товары, которые были приобретены через Интернет.)2) Компьютерная техника: Software Engineering Technology, Software English Typing3) Военный термин: Sensor Employment Teams, System Engineering Testbed, satellite experimental terminal, security escort team, sensor employment team, sensory evaluation test, simulated emergency test, small earth terminal, special engineering tests, split engine transportation, systems engineering tests4) Техника: selective electronics training, selective employment tax, space electronics and telemetry, special evaluation team, stepped electrode transistor, systems effects test5) Шутливое выражение: Set Evaluates Things6) Религия: Support Empathy Truth7) Финансы: протокол безопасности электронных платежей8) Биржевой термин: Secure Electronic Trading, Securities Exchange of Thailand, Significant Enough Transaction, Stock Exchange of Thailand9) Сокращение: setting, Single Electron Tunnelling10) Университет: Science Engineering And Technology, Simulation Engineering Technology11) Физика: Sound Emission Transmission12) Электроника: Single Electron Tunneling, Solid Electric Through13) Вычислительная техника: Secure Electronic Transaction, Single Electronic Transistor, Secure Electronic Transactions (IBM, Visa, MS, IBM, Mastercard, Netscape, Banking)14) Транспорт: Safe Effective Transport15) Фирменный знак: Sony Entertainment Television16) Деловая лексика: Service Empowerment And Transformation17) Сетевые технологии: secure electronic transactions, безопасные электронные сделки, защищённые электронные транзакции18) Программирование: Set Byte On Condition19) Полупроводники: single-electron transistor20) Безопасность: Secure Encryption Technology, Softcopy Exploitation Tools21) Расширение файла: Configuration Settings, Driver SETs created by Install, Setup data or information settings22) Нефть и газ: setpoint value input terminal, setpoint/setting input23) Должность: Safety Environment And Technology -
69 set
1) Общая лексика: Secure Electronic Transfer. с (A safe and confidential way of paying for goods which have been purchased over the Internet. Безопасный и конфиденциальный способ оплаты за товары, которые были приобретены через Интернет.)2) Компьютерная техника: Software Engineering Technology, Software English Typing3) Военный термин: Sensor Employment Teams, System Engineering Testbed, satellite experimental terminal, security escort team, sensor employment team, sensory evaluation test, simulated emergency test, small earth terminal, special engineering tests, split engine transportation, systems engineering tests4) Техника: selective electronics training, selective employment tax, space electronics and telemetry, special evaluation team, stepped electrode transistor, systems effects test5) Шутливое выражение: Set Evaluates Things6) Религия: Support Empathy Truth7) Финансы: протокол безопасности электронных платежей8) Биржевой термин: Secure Electronic Trading, Securities Exchange of Thailand, Significant Enough Transaction, Stock Exchange of Thailand9) Сокращение: setting, Single Electron Tunnelling10) Университет: Science Engineering And Technology, Simulation Engineering Technology11) Физика: Sound Emission Transmission12) Электроника: Single Electron Tunneling, Solid Electric Through13) Вычислительная техника: Secure Electronic Transaction, Single Electronic Transistor, Secure Electronic Transactions (IBM, Visa, MS, IBM, Mastercard, Netscape, Banking)14) Транспорт: Safe Effective Transport15) Фирменный знак: Sony Entertainment Television16) Деловая лексика: Service Empowerment And Transformation17) Сетевые технологии: secure electronic transactions, безопасные электронные сделки, защищённые электронные транзакции18) Программирование: Set Byte On Condition19) Полупроводники: single-electron transistor20) Безопасность: Secure Encryption Technology, Softcopy Exploitation Tools21) Расширение файла: Configuration Settings, Driver SETs created by Install, Setup data or information settings22) Нефть и газ: setpoint value input terminal, setpoint/setting input23) Должность: Safety Environment And Technology -
70 application
1) применение, использование3) прикладная программа, приложениеАнгло-русский словарь по компьютерной безопасности > application
-
71 channel
канал (связи, передачи информации)Англо-русский словарь по компьютерной безопасности > channel
-
72 chip
-
73 communication
1) связь, коммуникация; система связи2) передача информации (от ее источника адресатам); сообщение- all-points communication- analog communication- authenticated communication- broadcast communication- burst communication- character-oriented communication- clear communication- clear-to clear communication- client-server communication- coded communication- computer-to-terminal communication- confidential communication- conversational communication- covert communication- cryptographic communication- cryptographically protected communication- cryptographically secure communication- data communication- dial-up communication- digital communication- digitally encrypted voice communication- diplomatic communication- document communication- enciphered communication- encrypted communication- encryption communication- based secure communication- end-to-end communication- frequency hopping communication- high density communication- high-speed communication- imitative communication- intelligence communication- interactive communication- inter-enclosure communication- in-the-clear communication- large-volume communication- legitimate communication- multichannel communication- multimedia communication- multipeer communication- online communication- packet communication- peer-to-peer communication- plain communication- point-to-multipoint communication- program-to-program communication- prohibited communication- protected communication- reliable communication- robust communication- secrecy communication- secret communication- secure communication- secure-to-secure communication- secure voice communication- sensitive communication- signed communication- single-domain communication- speech communication- spoken communication- teleprinter communication- teletype communication- terminal-to-computer communication- terminal-to-terminal communication- top security communication- two-way communication- unauthorised communication- undirected communication- user/computer communication- user to user communication- visual communication- voice communicationАнгло-русский словарь по компьютерной безопасности > communication
-
74 cryptosystem
криптографическая система, криптосистема; шифросистема- abuse-free cryptosystem- algebraic code cryptosystem- analog cryptosystem- asymmetric cryptosystem- asymmetric key cryptosystem- authentication/secrecy cryptosystem- bijective public key cryptosystem- binary cryptosystem- block cryptosystem- broadcast cryptosystem- broadcasting cryptosystem- cipher-feedback cryptosystem- classical cryptosystem- common-key cryptosystem- communication cryptosystem- compromised cryptosystem- computationally secure cryptosystem- conference cryptosystem- conventional cryptosystem- DES-based cryptosystem- DES-like cryptosystem- deterministic cryptosystem- DH cryptosystem- Diffie and Hellman cryptosystem- discrete-exponentiation cryptosystem- discrete log cryptosystem- E3 cryptosystem- effectively unbreakable cryptosystem- elliptic curve cryptosystem- endomorphic cryptosystem- end-to-end encryption cryptosystem- error propagating cryptosystem- factorization cryptosystem- finite cryptosystem- finite automation cryptosystem- Galois field cryptosystem- general cryptosystem- generalized cryptosystem- Goppa-code cryptosystem- hardware-implemented cryptosystem- hidden key cryptosystem- high-grade cryptosystem- high-speed cryptosystem- hybrid public-secret key cryptosystem- hybrid stream/block cryptosystem- identity-based cryptosystem- intractable cryptosystem- indecipherable cryptosystem- iterated cryptosystem- keyed cryptosystem- key escrow cryptosystem- key-minimal cryptosystem- knapsack-based cryptosystem- knapsack public key cryptosystem- matrix cryptosystem- McEliece' cryptosystem- Merkle-Hellman cryptosystem- MH cryptosystem- microprocessor based cryptosystem- minuend cryptosystem- multiple access cryptosystem- multiple destination cryptosystem- multiplicative knapsack cryptosystem- network cryptosystem- non-linear cryptosystem- number theoretic cryptosystem- one-key cryptosystem- one-master-key cryptosystem- one-time-key cryptosystem- one-time-pad cryptosystem- one-time-tape cryptosystem- perfect secrecy cryptosystem- practical security cryptosystem- private key cryptosystem- proprietary cryptosystem- provable secure cryptosystem- public key cryptosystem- public key distribution cryptosystem- public key signature cryptosystem- rapid cryptosystem- reciprocal number cryptosystem- residue cryptosystem- Rivest-Shamir-Adleman cryptosystem- rotor cryptosystem- RSA public key cryptosystem- r-th residue cryptosystem- secret-key cryptosystem- secure cryptosystem- shared key cryptosystem- shift register cryptosystem- single-key cryptosystem- sophisticated cryptosystem- split key cryptosystem- strong cryptosystem- subtractive cryptosystem- symmetric cryptosystem- theoretically unbreakable cryptosystem- threshold cryptosystem- transposition cryptosystem- trap-door-knapsack public key cryptosystem- transient key cryptosystem- threshold cryptosystem- two-key cryptosystem- unbreakable cryptosystem- voice cryptosystem- cryptosystem immune to cryptoanalysisАнгло-русский словарь по компьютерной безопасности > cryptosystem
-
75 cyberpunk
(жаpг. hacker)1) хакер (лицо, пытающееся получить доступ в вычислительную систему по телефонной линии в обход защиты системы)Англо-русский словарь по компьютерной безопасности > cyberpunk
-
76 function
- function D- function EАнгло-русский словарь по компьютерной безопасности > function
-
77 hardware
аппаратное оборудование, аппаратные средства, аппаратураАнгло-русский словарь по компьютерной безопасности > hardware
-
78 integer
Англо-русский словарь по компьютерной безопасности > integer
-
79 management
(административное) управление; руководствоАнгло-русский словарь по компьютерной безопасности > management
-
80 option
возможность выбора; дополнительная возможность; дополнительное средство
См. также в других словарях:
Encryption software — is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks. Contents 1 Security 2… … Wikipedia
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Security by Obscurity — Security through obscurity oder security by obscurity (engl. „Sicherheit durch Unklarheit“) bezeichnet ein kontroverses Prinzip in der Computer und Netzwerksicherheit, nach dem versucht wird, Sicherheit durch Verschleierung bzw. Geheimhaltung zu… … Deutsch Wikipedia
Security by obscurity — Security through obscurity oder security by obscurity (engl. „Sicherheit durch Unklarheit“) bezeichnet ein kontroverses Prinzip in der Computer und Netzwerksicherheit, nach dem versucht wird, Sicherheit durch Verschleierung bzw. Geheimhaltung zu… … Deutsch Wikipedia
Security through Obscurity — oder security by obscurity (engl. „Sicherheit durch Unklarheit“) bezeichnet ein kontroverses Prinzip in der Computer und Netzwerksicherheit, nach dem versucht wird, Sicherheit durch Verschleierung bzw. Geheimhaltung zu erreichen. Ein System… … Deutsch Wikipedia
Security through obscurity — oder security by obscurity (engl. „Sicherheit durch Unklarheit“) bezeichnet ein kontroverses Prinzip in der Computer und Netzwerksicherheit, nach dem versucht wird, Sicherheit durch Verschleierung bzw. Geheimhaltung zu erreichen.… … Deutsch Wikipedia
Security protocol notation — Security (engineering) protocol notation is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network. In the context of a formal model, it allows reasoning about the properties of such a… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Encryption — Encrypt redirects here. For the film, see Encrypt (film). This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography. In cryptography, encryption is the process of… … Wikipedia
Security of Advanced Access Content System — The security of Advanced Access Content System has a subject of discussion amongst security researchers, high definition video enthusiasts, and consumers at large since its inception. A successor to Content Scramble System, the digital rights… … Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia