-
1 криптография (для) частного сектора
Security: private-sector cryptographyУниверсальный русско-английский словарь > криптография (для) частного сектора
-
2 криптография частного сектора
Security: (для) private-sector cryptographyУниверсальный русско-английский словарь > криптография частного сектора
См. также в других словарях:
National identification number — A national identification number, national identity number, or national insurance number is used by the governments of many countries as a means of tracking their citizens, permanent residents, and temporary residents for the purposes of work,… … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Stuxnet — is a computer worm discovered in June 2010. It targets Siemens industrial software and equipment running Microsoft Windows.[1] While it is not the first time that hackers have targeted industrial systems,[2] it is the first discovered malware… … Wikipedia
Open-source intelligence — (OSINT) is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence. In the intelligence community (IC), the term… … Wikipedia
Identity document — National identity card redirects here. For cards referred to in the English language as national identity card , see National identity card (disambiguation). An identity document (also called a piece of identification or ID, or colloquially as… … Wikipedia
National Security Agency — NSA redirects here. For other uses, see NSA (disambiguation). For the Bahraini intelligence agency, see National Security Agency (Bahrain). National Security Agency Agency overview … Wikipedia
FIPS 140-2 — The Federal Information Processing Standard (FIPS) Publication 140 2, FIPS PUB 140 2, is a U.S. government computer security standard used to accredit cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial… … Wikipedia
Clipper chip — Not to be confused with Clipper architecture. The Clipper chip was a chipset that was developed and promoted by the U.S. Government[1] as an encryption device to be adopted by telecommunications companies for voice transmission. It was announced… … Wikipedia
Ibrahim Al-kadi — Ibrahim A. Al Kadi, Ph.D. (born March 6, 1954) is a Saudi electrical engineer, known especially for his work on cryptology history and in the telecom regulation sector. Biography Al Kadi was born in Onizah, Saudi Arabia. He lived there for 15… … Wikipedia
Acette — Infobox Company company name = Acette Technologies company company type = Limited Liability Company A partner firm in Dubai Internet City foundation = 2002 by Sunil Sivanand and Sujit Sivanand location = Dubai, United Arab Emirates, Offices in:… … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia