-
1 general privacy level
-
2 general privacy level
уровень безопасности для систем общего пользования или промышленных системАнгло-русский словарь по компьютерной безопасности > general privacy level
-
3 industrial privacy level
(general privacy level) уровень безопасности для систем общего пользования или промышленных системАнгло-русский словарь по компьютерной безопасности > industrial privacy level
-
4 level
-
5 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
6 system
1) система || системный3) вчт операционная система; программа-супервизор5) вчт большая программа6) метод; способ; алгоритм•system halted — "система остановлена" ( экранное сообщение об остановке компьютера при наличии серьёзной ошибки)
- CPsystem- H-system- h-system- hydrogen-air/lead battery hybrid system- Ksystem- Lsystem- L*a*b* system- master/slave computer system- p-system- y-system- Δ-system
См. также в других словарях:
Privacy-invasive software — is a category of computer software that ignores users’ privacy and that is distributed with a specific intent, often of a commercial nature. Three typical examples of privacy invasive software are adware, spyware and content hijacking programs.… … Wikipedia
Privacy — For other uses, see Privacy (disambiguation). Privacy (from Latin: privatus separated from the rest, deprived of something, esp. office, participation in the government , from privo to deprive ) is the ability of an individual or group to seclude … Wikipedia
General Practice Research Database — The General Practice Research Database (GPRD) is a large database of anonymised medical records from GP practices around the UK. The database is considered by many to be the gold standard of longitudinal anonymised patient databases from primary… … Wikipedia
Information privacy — Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally… … Wikipedia
Internet privacy — involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information… … Wikipedia
Second-level ISP — The last five years have seen the development of Second level ISP’s. They are actually a type of anonymous internet access providers which is distinct from other anonymous browsing solutions (proxy lists, Tor, JAP). A Second level ISP provides… … Wikipedia
Pretty Good Privacy — Original author(s) Phil Zimmermann Developer(s) Phil Zimmermann Initial release In 1991 Written in Multi language … Wikipedia
Nixon v. General Services Administration — Supreme Court of the United States Argued April, 20 1977, 1977 … Wikipedia
Consumer privacy — laws and regulations seek to protect any individual from loss of privacy due to failures or limitations of corporate customer privacy measures. They recognize that the damage done by privacy loss is typically not measurable, nor can it be undone … Wikipedia
Communication privacy management theory — is a communication theory first developed by Sandra Petronio[1][2] in 1991 describing the ways in which relational actors manage their privacy boundaries and the disclosure of private information. The theory focuses heavily on the processes that… … Wikipedia
Political privacy — has been a concern since voting systems emerged in ancient times. The secret ballot is the simplest and most widespread measure to ensure that political views are not known to anyone other than the voter it is nearly universal in modern democracy … Wikipedia