-
1 sophisticated intruder
(advanced intruder) квалифицированный нарушитель1) вмешательство; посягательство; нарушение (правил),2) вторжение, проникновение (в систему)Англо-русский словарь по компьютерной безопасности > sophisticated intruder
-
2 sophisticated intruder
Безопасность: квалифицированный нарушительУниверсальный англо-русский словарь > sophisticated intruder
-
3 intruder
нарушитель, злоумышленник; лицо, не имеющее санкционированного доступаАнгло-русский словарь по компьютерной безопасности > intruder
-
4 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
5 device
прибор; аппарат; устройство; (техническое) средство- wireless bugging device
См. также в других словарях:
A-6 Intruder — Infobox Aircraft name = A 6 Intruder type = Attack aircraft manufacturer = Grumman caption =The A 6E Intruder designer = first flight = 19 April 1960 introduced = 1963 retired = 1997 primary user = United States Navy more users = United States… … Wikipedia
performing arts — arts or skills that require public performance, as acting, singing, or dancing. [1945 50] * * * ▪ 2009 Introduction Music Classical. The last vestiges of the Cold War seemed to thaw for a moment on Feb. 26, 2008, when the unfamiliar strains … Universalium
Burglar alarm — Silent alarm redirects here. For the album, see Silent Alarm (album). Burglar (or intrusion), fire and safety alarms are all electronic today. Sensors are connected to a control unit via a low voltage hardwire or narrowband RF signal which is… … Wikipedia
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia
Operation Rolling Thunder — Part of the Vietnam War F 105 Thunderchiefs radar bombing at direction of a B 6 … Wikipedia
Military Affairs — ▪ 2009 Introduction Russia and Georgia fought a short, intense war in 2008, fueling global fears of a new Cold War. On August 7 Georgia launched an aerial bombardment and ground attacks against its breakaway province of South Ossetia.… … Universalium
Berzerk — Infobox VG title = Berzerk caption=Screenshot of Berzerk developer = Stern Electronics publisher = Stern Electronics designer = Alan McNeil released=1980 (Arcade) 1982 (GCE Vectrex) 1982 (Atari 2600) 1983 (Atari 5200) platforms= Arcade Game,… … Wikipedia
literature — /lit euhr euh cheuhr, choor , li treuh /, n. 1. writings in which expression and form, in connection with ideas of permanent and universal interest, are characteristic or essential features, as poetry, novels, history, biography, and essays. 2.… … Universalium
List of fictional computers — Computers have often been used as fictional objects in literature, movies and in other forms of media. Fictional computers tend to be considerably more sophisticated than anything yet devised in the real world. This is a list of computers that… … Wikipedia
Life Sciences — ▪ 2009 Introduction Zoology In 2008 several zoological studies provided new insights into how species life history traits (such as the timing of reproduction or the length of life of adult individuals) are derived in part as responses to… … Universalium
Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… … Wikipedia