- manual key distribution
- ручное распределение ключей
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Distribution mangagement system — SCADA systems have been a part of utility automation for at least 15 years and contributing to the decision making process of the control rooms. However, majority of the existing solutions are closely related to distribution network data… … Wikipedia
Manual transmission — Transmission types Manual Sequential manual Non synchronous Preselector Automatic Manumatic Semi automatic Electrohydraulic … Wikipedia
Key (lock) — A cut key A key is an instrument that is used to operate a lock. A typical key consists of two parts: the blade, which slides into the keyway of the lock and distinguishes between different keys, and the bow, which is left protruding so that… … Wikipedia
1A2 Key System — The 1A2 Key System is an analog multiline business key telephone system. Unlike more modern multiline systems, every telephone line serving a particular phone is wired into that phone, and electromechanical switches (the keys ) switch the lines… … Wikipedia
распределение ключей вручную — — [[http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23]] Тематики защита информации EN manual key distribution … Справочник технического переводчика
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
NATOPS — The Naval Air Training and Operating Procedures Standardization (NATOPS) program prescribes general flight and operating instructions and procedures applicable to the operation of all US naval aircraft and related activities. The program issues… … Wikipedia
History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… … Wikipedia
Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… … Wikipedia
Cracking of wireless networks — is the penetration of wireless networks. A wireless network can be penetrated in a number of ways. These ways vary greatly in the level of computer skill and commitment they require. Once within a network, a skilled hacker can modify software,… … Wikipedia
Ceiling effect — In pharmacology, the term ceiling effect refers to the property of increasing doses of a given medication to have progressively smaller incremental effect (an example of diminishing returns). Narcotics, such as nalbuphine, serve as a classic… … Wikipedia