- indirect encryption
- шифрование программными средствами
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
шифрование программными средствами — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN indirect encryption … Справочник технического переводчика
Portable Document Format — PDF redirects here. For other uses, see PDF (disambiguation). Portable Document Format Adobe Reader icon Filename extension .pdf Internet media type application/pdf application/x pdf application/x bzpdf application/x gzpdf … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Comparison of file systems — The following tables compare general and technical information for a number of file systems. Contents 1 General information 2 Limits 3 Metadata 4 Features … Wikipedia
IMSI-catcher — An IMSI catcher is a device for forcing the transmission of the International Mobile Subscriber Identity (IMSI) and intercepting GSM mobile phone calls.The GSM specification requires the handset to authenticate to the network, but does NOT… … Wikipedia
Plausible deniability — is, at root, credible (plausible) ability to deny a fact or allegation, or to deny previous knowledge of a fact. The term most often refers to the denial of blame in (formal or informal) chains of command, where upper rungs quarantine the blame… … Wikipedia
NTFS — Developer Microsoft Full name New Technology File System[1] Introduced July 1993 (Windows NT 3.1) Partition identifier 0x07 (MBR) EBD0A0A2 B9E5 4433 87C0 68B6 … Wikipedia
PIC microcontroller — PIC microcontrollers in DIP and QFN packages … Wikipedia
Friend-to-friend — A friend to friend (or F2F) computer network is a type of peer to peer network in which users only make direct connections with people they know. Passwords or digital signatures can be used for authentication.Many F2F networks support indirect… … Wikipedia
Clandestine HUMINT operational techniques — The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called tradecraft . It applies to clandestine… … Wikipedia