-
1 insecure software
Безопасность: незащищённое программное обеспечение -
2 insecure software
Англо-русский словарь по компьютерной безопасности > insecure software
-
3 software
программное обеспечение, программные средстваАнгло-русский словарь по компьютерной безопасности > software
-
4 незащищённое программное обеспечение
Security: insecure softwareУниверсальный русско-английский словарь > незащищённое программное обеспечение
-
5 line
1) линия2) шина; линия; провод3) строка, строчка•- line up- access line
- acoustic delay line
- across the line
- action line
- active line
- addressing line
- address line
- AND cross parity line
- approximation straight line
- arbitration lines
- asynchronous line
- backbone line
- balanced line
- balanced transmission line
- bidirectional line
- bit line
- buffered line
- bus line
- carry line
- character line
- character selection line
- character spacing reference line
- clock line
- coaxial line
- code line
- coding line
- column line
- command line
- comment line
- communication line
- complemented bit line
- computer line
- conditioned line
- construction line
- continuation line
- control line
- data line
- data-sync line
- datum line
- dedicated line
- delay line
- dial-up line
- dial line
- digit line
- displayed line
- distributed constant electromagnetic delay line
- double line
- drive line
- duplex line
- edge line
- electroacoustic delay line
- electromagnetic delay line
- enable line
- end line
- exchange line
- exciting line
- feedback line
- ferrite delay line
- fine line
- flag line
- flow line
- foreign exchange line
- framing line
- geodesic line
- half-duplex line
- handshake line
- heading line
- heavy line
- helical delay line
- help line
- hidden line
- hot line
- in line
- infinite line
- inhibiting line
- inhibit line
- initial line
- ink line
- input line
- insecure data line
- lead-in line
- leased line
- liberated line
- line of reasoning
- line of sight
- line of support
- lines per minute
- liquid medium delay line
- load line
- local line
- logical line
- logic line
- loose line
- loss-free line
- lossless line
- lossy line
- lumped constant delay line
- magnetic delay line
- magnetostrictive delay line
- mercury delay line
- mouse documentation lines
- multidrop line
- multihop line
- multiparity line
- multipoint line
- multitapped line
- N-character line
- nickel delay line
- nonswitched line
- nonswitch line
- off the line
- open transmission line
- open-ended line
- optical transmission line
- OR word parity line
- out line
- outgoing line
- output line
- pair line
- parameter line
- parity line
- point-to-point line
- power supply line
- power line
- power-shutdown line
- print image line
- private line
- program line
- public line
- quartz delay line
- read select line
- ready line
- recovery line
- reference line
- request line
- request/acknowledge line
- reset line
- return line
- rubber band line
- ruling line
- scan line
- scanning line
- selection line
- select line
- sense line
- set line
- signal line
- single-vendor line
- single-wire line
- slab line
- slave line
- software product line
- solid-medium delay line
- sonic delay line
- specially conditioned line
- spiral delay line
- splitting lines
- status line
- straight line
- strip line
- subscriber line
- supply line
- switched line
- synchonous line
- telecommunication line
- terminated transmission line
- tie line
- time-delay line
- trace line
- transfer line
- transmission line
- true bit lines
- trunk line
- ultrasonic delay line
- uncomplemented bit line
- unconditioned line
- uniform impedance transmission line
- variable delay line
- virtual-ground line
- widow line
- wire-type acoustic delay line
- witness line
- word line
- work line
- write select line
- Z line
- zig-zag sense lineEnglish-Russian dictionary of computer science and programming > line
См. также в других словарях:
Comparison of open source configuration management software — This is a comparison of free (libre) and open source configuration management software. Contents 1 Basic properties 2 Platform support 3 Short descriptions 4 Refere … Wikipedia
Trillian (software) — Infobox Software name = Trillian caption = Trillian main screen collapsible = yes developer = Cerulean Studios released = initial release|2000|7|1 frequently updated = yes programming language = C++ operating system = Microsoft Windows Mac OS X… … Wikipedia
COPS (software) — This article is about the software. For the governing body Conference of the Parties , see COP16. COPS was the first common Unix computer system security scanning tool, created by Dan Farmer; Gene Spafford helped him start it in 1989 while Dan… … Wikipedia
SANS Institute — The SANS Institute (SysAdmin, Audit, Networking, and Security) is a trade name owned by the for profit Escal Institute of Advanced Technologies. SANS provides computer security training, professional certification, and a research archive. It was… … Wikipedia
Tor (anonymity network) — Tor Developer(s) The Tor Project[1] Initial release 20 September 2002 (2002 09 20) … Wikipedia
Distributed Sender Blackhole List — The Distributed Sender Blackhole List is a DNSBL that lists IP addresses of insecure e mail hosts. DSBL can be used by server administrators to tag or block e mail messages that come from insecure servers, which is often spam. The DSBL publishes… … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit … Wikipedia
Nmap — Security Scanner results of an Nmap scan Original author(s) Gordon Lyon (Fyodor) Initial release September, 1997 … Wikipedia
Comparison of TLS Implementations — The Transport Layer Security (TLS) protocol provide the ability to secure communications across networks. There are several TLS implementations which are free and open source software and sometimes choosing between the available implementations… … Wikipedia
Linux adoption — This article covers adoption of the Linux operating system by homes, organizations, companies, and governments. Linux migration is the change from using other operating systems to using Linux. HistoryLinux powered personal computers account for… … Wikipedia