- indecipherable system
- нераскрываемая криптосистема
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Languages of the legal system of East Timor — East Timor emerged as the world s newest state on 20 May 2002 with the transfer of sovereigny from the United Nations Transitional Administration in East Timor (UNTAET). Between 1975 and 1999, the national territory of this new Asian state was… … Wikipedia
Balloon help — System 7 Balloon Help in Eudora Balloon help was a help system introduced by Apple Computer in their 1991 release of System 7.0. The name referred to the way the help text was displayed, in balloons , like those containing the words in a comic… … Wikipedia
KABBALAH — This entry is arranged according to the following outline: introduction general notes terms used for kabbalah the historical development of the kabbalah the early beginnings of mysticism and esotericism apocalyptic esotericism and merkabah… … Encyclopedia of Judaism
Nobel Prizes — ▪ 2009 Introduction Prize for Peace The 2008 Nobel Prize for Peace was awarded to Martti Ahtisaari, former president (1994–2000) of Finland, for his work over more than 30 years in settling international disputes, many involving ethnic,… … Universalium
Cadency — Brisures used in cadency (shown in red). The left hand column shows the cadency marks (brisures) used for sons in the English and Canadian systems. The right hand column shows the brisures used in Canadian heraldry for daughters.The marks are… … Wikipedia
Configurable Network Computing — or CNC is JD Edwards s (JDE) client–server proprietary architecture and methodology that implements its highly scalable enterprise wide business solutions software that can run on a wide variety of hardware, operating systems (OS) and hardware… … Wikipedia
Cryptanalysis — Close up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, hidden , and analýein, to loosen or to untie ) is the study of methods for obtaining the meaning of encrypted information, without access to the secret… … Wikipedia
Stargate (device) — For episodes of the television series, see List of Stargate SG 1 episodes, List of Stargate Atlantis episodes, and List of Stargate Universe episodes. A Stargate from Stargate SG 1. A Stargate is a portal device within the Stargate fictional… … Wikipedia
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
Kerckhoffs' principle — In cryptography, Kerckhoffs principle (also called Kerckhoffs assumption, axiom or law) was stated by Auguste Kerckhoffs in the 19th century: a cryptosystem should be secure even if everything about the system, except the key, is public knowledge … Wikipedia
List of Star Control races — This is a list of fictional alien species that appeared in various games of the Star Control franchise. Contents 1 History and reception 2 Introduced in Star Control 2.1 Androsynth 2.2 Arilou … Wikipedia