Словари
Англо-русский словарь по компьютерной безопасности
Слова
Поиск
Слова на "A" в Англо-русском словаре по компьютерной безопасности
(
2
И
П
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Все
AA
AB
AC
AD
AE
AF
AG
AI
AK
AL
AM
AN
AO
AP
AR
AS
AT
AU
AV
AW
AX
Список всех слов на букву A
Англо-русский словарь по компьютерной безопасности содержит 974 слова на букву A
Слова, начинающиеся на букву A
A POSTERIORI INFORMATION
A POSTERIORI PROBABILITY
A POSTERIORI PROBABILITY ESTIMATION
A PRIORI ESTIMATE
A PRIORI EVALUATION
A PRIORI INFORMATION
A PRIORI PROBABILITY
A PRIORI UNCERTAINTY
A TO D CONVERTER
AAI
AAR
AARY ALPHABET
ABC
ABELIAN GROUP
ABI
ABNEGATION NUMBER
ABNORMAL ACCESS
ABSORBING WALL
ABSTRACT ALGEBRA
ABSTRACT ALGORITHM
ABSTRACT ALPHABET
ABSTRACT AUTOMATION
ABSTRACT OPERATION
ABSTRACT REPRESENTATION
ABUSE
ABUSE INPUT
ABUSE TERMINAL
ABUSEFREE
ABUSEFREE (CRYPTO)SYSTEM
ABUSEFREE (CRYPTO)SYSTEM
ABUSEFREE CRYPTOSYSTEM
ABUSEFREE SYSTEM
ABUSER
ABUSERFRIENDLY
ABUSIVE ACTION
ABUSIVE ACTIVITY
ACC
ACCEPTABILITY
ACCEPTABLE RISK
ACCEPTANCE
ACCESS
ACCESS ADMINISTRATOR
ACCESS ALGORITHM
ACCESS AREA PARTITION
ACCESS ATTEMPT
ACCESS ATTRIBUTE
ACCESS AUDIT
ACCESS AUTHORISATION MATRIX
ACCESS AUTHORIZATION
ACCESS BY KEY
ACCESS CAPABILITY
ACCESS CARD
ACCESS CARD READER
ACCESS CATEGORY
ACCESS CHECK
ACCESS CHECK(ING)
ACCESS CHECK(ING)
ACCESS CHECKING
ACCESS CLASS
ACCESS CODE
ACCESS CONDITION
ACCESS CONTEXT
ACCESS CONTROL
ACCESS CONTROL BIT
ACCESS CONTROL CARD
ACCESS CONTROL CATEGORY
ACCESS CONTROL CENTER
ACCESS CONTROL CHECKING SOFTWARE
ACCESS CONTROL CRYPTOSYSTEM
ACCESS CONTROL DATABASE
ACCESS CONTROL DEVICE
ACCESS CONTROL FACILITIES
ACCESS CONTROL FIELD
ACCESS CONTROL HARDWARE
ACCESS CONTROL INFORMATION
ACCESS CONTROL KEY
ACCESS CONTROL LABEL
ACCESS CONTROL LIST
ACCESS CONTROL LIST SYSTEM
ACCESS CONTROL LOCK
ACCESS CONTROL LOG
ACCESS CONTROL MATRIX
ACCESS CONTROL MEANS
ACCESS CONTROL MECHANISM
ACCESS CONTROL MODEL
ACCESS CONTROL MODULE
ACCESS CONTROL PACKAGE
ACCESS CONTROL PROCEDURE
ACCESS CONTROL PRODUCT
ACCESS CONTROL PROGRAM
ACCESS CONTROL PROTOCOL
ACCESS CONTROL ROUTINE
ACCESS CONTROL RULES
ACCESS CONTROL SERVICE
ACCESS CONTROL SOFTWARE
ACCESS CONTROL STOR(AG)E
ACCESS CONTROL STOR(AG)E
ACCESS CONTROL STORAGE
ACCESS CONTROL STORE
ACCESS CONTROL SWITCH
ACCESS CONTROL SYSTEM
ACCESS CONTROL UNIT
ACCESS CONTROLLER
ACCESS CRITERIA
ACCESS DECISION
ACCESS DELAY
ACCESS DENIAL
ACCESS ERROR
ACCESS EVENT
ACCESS FAILURE
ACCESS FEEDER NODE
ACCESS FILTER
ACCESS FROM A TERMINAL
ACCESS GROUP
ACCESS GUARDING
ACCESS HISTORY
ACCESS ID
ACCESS IDENTIFICATION
ACCESS IDENTIFIER
ACCESS INDICATOR
ACCESS KEY
ACCESS KEY SYSTEM
ACCESS LEVEL
ACCESS LIMITATION
ACCESS LINE
ACCESS LIST
ACCESS LOCK
ACCESS LOCK(OUT)
ACCESS LOCK(OUT)
ACCESS LOCKOUT
ACCESS LOG
ACCESS MANAGEMENT SYSTEM
ACCESS MANAGER
ACCESS MATRIX
ACCESS MATRIX MODEL
ACCESS MECHANISM
ACCESS MODE
ACCESS NUMBER
ACCESS OBJECT
ACCESS ON A NEEDTOKNOW BASIS
ACCESS PARAMETER
ACCESS PASSWORD
ACCESS PATH
ACCESS PERIOD
ACCESS PERMISSION
ACCESS PERMISSION MATRIX
ACCESS POINT
ACCESS PORT
ACCESS PRIVILEGE
ACCESS PRIVILEGE BIT
ACCESS PROCEDURE
ACCESS PROGRAM
ACCESS PROTECTION
ACCESS PROTOCOL
ACCESS REGIME
ACCESS REQUEST
ACCESS RESTRICTION
ACCESS RIGHT
ACCESS RIGHTS BYTE
ACCESS RIGHTS LIST
ACCESS ROUTE
ACCESS ROUTINE
ACCESS SAFEGUARD
ACCESS SCREENING
ACCESS SECURITY
ACCESS SECURITY DEVICE
ACCESS SEQUENCE
ACCESS STRATEGY
ACCESS STRING
ACCESS STRUCTURE
ACCESS SUBJECT
ACCESS SUPERVISION
ACCESS TERMINAL
ACCESS THE DATA
ACCESS THREAT
ACCESS TIME
ACCESS TO CHANNEL
ACCESS TO CIPHER KEYS
ACCESS TO SECRETS
ACCESS TREE
ACCESS UNIT INTERFACE
ACCESS VERIFICATION
ACCESS VIA NETWORK
ACCESS VIOLATION
ACCESSBARRED SIGNAL
ACCESSCONTROL METHOD
ACCESSCONTROL TECHNIQUE
ACCESSCONTROLLED
ACCESSDENIAL PROBABILITY
ACCESSDENIAL TIME
ACCESSED DATA
ACCESSED OBJECT
ACCESSIBILITY
ACCESSING DEVICE
ACCESSING PROCESS
ACCESSOR
ACCESSPRIORITY TABLE
ACCIDENT
ACCIDENTAL ACCESS
ACCIDENTAL DESTRUCTION
ACCIDENTAL DISCLOSURE OF INFORMATION
ACCIDENTAL ENTRY
ACCIDENTAL ERASURE
ACCIDENTAL SUBSTITUTE
ACCIDENTAL SUBSTITUTION
ACCIDENTIAL THREAT
ACCOUNT NAME
ACCOUNTABILITY
ACCOUNTING
ACCOUNTING INFORMATION
ACCOUNTING LOG
ACCREDITATION
ACCREDITATION RANK
ACCREDITED SYSTEM ENGINEER
ACCSA
ACD
ACIA
ACID
ACK
ACKNOWLEDGE CHARACTER
ACKNOWLEDGE SYMBOL
ACKNOWLEDGEMENT
ACKNOWLEDGEMENT MESSAGE
ACKNOWLEDGEMENT SIGNAL
ACL
ACMS
ACODE
ACOUSTC COUPLER
ACOUSTIC ANALYSIS
ACOUSTIC EAVESDROPPING
ACOUSTIC ISOLATION
ACOUSTIC JAMMER
ACOUSTIC MODEM
ACOUSTIC PROTECTION
ACOUSTIC ROOM
ACOUSTIC SHIELDING
ACOUSTICAL ALARM
ACOUSTICAL SIGNAL
ACOUSTICALLY SCREENED HEADSET
ACQUISITION
ACS
ACTION
ACTIVATED BY VOICE DEVICE
ACTIVATION
ACTIVATION KEY
ACTIVE ATTACK
ACTIVE CARD
ACTIVE INFILTRATION
ACTIVE KEY
ACTIVE MATRIX LIQUIDCRYSTAL DISPLAY
ACTIVE PASSWORD
ACTIVE PROTECTION MECHANISM
ACTIVE REDUNDANCE
ACTIVE THREAT
ACTIVE USER
ACTIVE WIRETAPPING
ACTIVITY
ACTUAL INTRUDER
ACTUAL KEY
ACTUAL PASSWORD
ACTUALLY USED KEY
ACTUALLYUSED KEY
ADAPTATION LEVEL
ADAPTER
ADAPTIVE BITS CODING
ADAPTIVE CHOSEN TEXT ATTACK
ADAPTIVE CODING
ADAPTIVE DELTA MODULATION
ADAPTIVE PREDICTION CODING
ADAPTIVE PREDICTIVE CODER
ADAPTIVE PREDICTOR
ADAPTIVE PROCESS
ADAPTIVE RECOGNITION TECHNOLOGY
ADAPTIVE ROUTING
ADAPTIVE TRANSFORM CODING
ADB
ADDED BIT
ADDER
ADDIN
ADDIN BOARD
ADDITION
ADDITIONAL KEY
ADDITIVE
ADDITIVE GENERATOR
ADDITIVE MASKING
ADDITIVE OPERATION
ADDITIVE STREAM CIPHER
ADDITIVE STREAM CIPHER MODE
ADDITIVE STREAM CIPHER REGIME
ADDITIVE STREAM ENCRYPTION
ADDITIVE SYSTEM
ADDITIVE WHITE GAUSSIAN NOISE
ADDON
ADDON DEVICE
ADDON PACKAGE
ADDON PROTECTION
ADDON SECURITY
ADDON SECURITY FACILITIES
ADDON SERVICE
ADDRESS ARITHMETIC
ADDRESS WORD
ADDRESSABLE MEMORY
ADDRESSED INFORMATION
ADDRESSED TERMINAL
ADDRESSEE
ADDRESSING
ADDRESSING CHARACTER
ADDRESSING INFORMATION
ADDRESSING SYMBOL
ADEQUATE PROTECTION
ADEQUATE SECURITY
ADF
ADHERENCE
ADJUSTMENT
ADL
ADMD
ADMINISTATION SERVICE
ADMINISTRATION
ADMINISTRATION MANAGEMENT DOMAIN
ADMINISTRATION MANAGEMENT DOMAIN
ADMINISTRATIVE CONTROL
ADMINISTRATIVE DOMAIN
ADMINISTRATIVE INFORMATION
ADMINISTRATIVE SAFEGUARD
ADMINISTRATIVE SECURITY
ADMINISTRATIVE SECURITY MEASURES
ADMINISTRATOR
ADMISSIBLE
ADMISSIBLE DECISION
ADMISSIBLE HYPOTHESIS
ADP
ADRESS WORD
ADRESSABLE MEMORY
ADRESSED INFORMATION
ADSL
ADVANCED CARD
ADVANCED INTRUDER
ADVANCED MOBILE PHONE SYSTEM
ADVANCED PEERTOPEER NETWORKING
ADVANCED POWER MANAGEMENT
ADVANCED PROGRAMTOPROGRAM COMMUNICATIONS
ADVANCED SOFTWARE
ADVERSARY
ADVERSE PARTY
ADVERTENT THREAT
AEC
AES
AFFINE MAPPING
AFFIRMATION
AFFIRMATIVE ACKNOWLEDGEMENT
AFIS
AFN
AGENCY
AGENT
AGGREGATION
AGREEDUPON KEY
AGREEMENT
AI
AIDS
AIFF
AIS
AKEY
ALARM
ALARM ANNUNCIATOR
ALARM CENTER
ALARM CIRCUIT
ALARM DISPLAY
ALARM INDICATOR
ALARM INITIALIZATION
ALARM INITIATING DEVICE
ALARM LINK
ALARM MECHANISM
ALARM MESSAGE
ALARM RECORDER
ALARM REPORTING SYSTEM
ALARM RESPONSE
ALARM SENSOR
ALARM SIGNAL
ALARM STATION
ALARM SWITCH
ALARM SYSTEM
ALARM TRANSMISSION LINE
ALARMED CABLE
ALARMINITIATING CIRCUIT
ALERT
ALERT INFORMATION
ALG
ALGEBRA
ALGEBRA CRYPTOLOGY
ALGEBRAIC ALPHABET
ALGEBRAIC CIPHER
ALGEBRAIC CODE
ALGEBRAIC CODE (CRYPTO)SYSTEM
ALGEBRAIC CODE (CRYPTO)SYSTEM
ALGEBRAIC CODE CRYPTOSYSTEM
ALGEBRAIC CODE ENCRYPTION
ALGEBRAIC CODE SYSTEM
ALGEBRAIC CODING
ALGEBRAIC CODING THEORY
ALGEBRAIC COMPLEXITY
ALGEBRAIC ERROR CORRECTING CODE
ALGEBRAIC RING
ALGORITHM
ALGORITHM COMPOSITION
ALGORITHM LOGIC
ALGORITHM SUPPORTED ENCRYPTION
ALGORITHMIC ACCESS
ALGORITHMIC ANALYSIS
ALGORITHMIC APPROACH
ALGORITHMIC CHECKING
ALGORITHMIC COMPLEXITY
ALGORITHMIC ENCRYPTION
ALGORITHMIC INSOLUBILITY
ALGORITHMIC LANGUAGE
ALGORITHMIC PASSWORD
ALGORITHMIC PROCESS
ALGORITHMIC SECURITY
ALGORITHMIC TRANSFORM
ALGORITHMIC TRANSFORM(ATION)
ALGORITHMIC TRANSFORM(ATION)
ALGORITHMIC TRANSFORMATION
ALIAS
ALLDIGITAL CORRELATOR
ALLIED COMMUNICATIONS AND COMPUTER SECURITY AGENCY
ALLKEY ATTACK
ALLOCATION
ALLOPHON
ALLOW ACCESS
ALLPOINTS (TELE)COMMUNICATION
ALLPOINTS (TELE)COMMUNICATION
ALLPOINTS COMMUNICATION
ALLPOINTS TELECOMMUNICATION
ALM
ALPHA CHARACTER
ALPHA PASSWORD
ALPHA SYMBOL
ALPHABET
ALPHABET INDICATOR
ALPHABET SIZE
ALPHABETIC CHARACTER
ALPHABETIC CHARACTER SEQUENCE
ALPHABETIC CHARACTER STRING
ALPHABETIC CODE
ALPHABETIC SYMBOL
ALPHABETICALNUMERICAL CONVERSION TABLE
ALPHAMERIC CHARACTER
ALPHAMERIC SYMBOL
ALPHANUMERIC
ALPHANUMERIC ACCESS
ALPHANUMERIC ACCESS CONTROL
ALPHANUMERIC CODE
ALPHANUMERIC CODE ALPHABET
ALPHANUMERIC KEY
ALPHANUMERIC KEYBOARD
ALPHANUMERIC PLAINTEXT
ALPHANUMERIC PRESENTATION
ALPHANUMERIC TEXT
ALTERABLE KEY
ALTERATION
ALTERED CHECKSUM
ALTERED INFORMATION
ALTERNATE PASSWORD
ALTERNATE ROUTE
ALTERNATEROUTE TRAFFIC
ALTERNATIVE HYPOTHESIS
ALTERNATIVE SAMPLE INVERSION
AMATEUR BURGLAR
AMATEUR CRYPTOLOGIST
AMATEUR CYBERPUNK
AMATEUR HACKER
AMATEUR TRAVELLER
AMBIENT NOISE
AMBIGUITY
AMBIGUITY FUNCTION
AMBIGUOUS CRYPTOGRAM
AMBIGUOUS SOLUTION
AMBUSH CODE
AMERICAN SOFTWARE ASSOCIATION
AMERICAN STANDARD CODE FOR INFORMATION INTERCHANGE
AMERICAN STANDARDS ASSOCIATION
AMIS
AMLCD
AMODE
AMP
AMPLIFICATION
AMPLITUDE SCRAMBLING
AMPS
ANAGRAM
ANALOG (CRYPTO)SYSTEM
ANALOG (CRYPTO)SYSTEM
ANALOG (TELE)COMMUNICATION
ANALOG (TELE)COMMUNICATION
ANALOG COMMUNICATION
ANALOG CONVERTER
ANALOG CORRELATOR
ANALOG CRYPTOSYSTEM
ANALOG DATA CHANNEL
ANALOG ENCRYPTION
ANALOG SCRAMBLING
ANALOG SIGNAL
ANALOG SYSTEM
ANALOG TELECOMMUNICATION
ANALOG VOICE PRIVACY SYSTEM
ANALOGDIGITAL CONVERTER
ANALOGTODIGITAL CODER
ANALOGTODIGITAL CONVERSION
ANALOGTODIGITAL ENCODER
ANALOGUE CORRELATION
ANALOGUE MODEL
ANALOGUE RECEIVER
ANALOGUE SCRAMBLER
ANALOGUE SCRAMBLER WITH DIGITAL SIGNAL
ANALOGUE SCRAMBLER WITH DIGITAL SIGNAL PROCESSING
ANALOGUE TRANSMISSION
ANALOGUE VOICE ENCRYPTION
ANALYSABILITY
ANALYSIS
ANALYSIS FILTER BANK
ANALYST
ANALYTICAL ATTACK
ANALYTICAL CRYPTANALYSIS
ANALYTICAL WORK
ANALYZER
ANAXIOMATIZATION HEURISTIC METHOD
ANAXIOMATIZATION HEURISTIC TECHNIQUE
ANCESTOR KEY
ANCHORED FENCE
ANDF
ANI
ANNUNCIATING DEVICE
ANNUNCIATOR
ANNUNCIATOR PANEL
ANOMALY DETECTION
ANONYMITY
ANONYMOUS USER
ANSWERBACK
ANSWERING
ANTIBUG
ANTIBUG SECURITY
ANTIBUGGING
ANTIBUGGING DEVICE
ANTIBUGGING EQUIPMENT
ANTIBUGGING SERVICE
ANTIBUGGING SYSTEM
ANTIBURGLAR PROTECTION
ANTICIPATE THE THREAT
ANTIDOTE
ANTIEAVESDROP
ANTIEAVESDROPPING
ANTIEAVESDROPPING DEVICE
ANTIHACKER PROTECTION
ANTIHACKER SECURITY
ANTIHACKING DEVICE
ANTIHACKING PRODUCT
ANTIINTRUSION DETECTOR
ANTIINTRUSION DEVICE
ANTIINTRUSION SENSOR
ANTILISTENING
ANTINOISE CODING
ANTIPASSBACK
ANTIPERSONNEL SENSOR
ANTIPIRACY PROGRAM
ANTIPIRACY ROUTINE
ANTIRADIATION SHIELDING
ANTISPY PHONE
ANTISPY TELEPHONE
ANTISURVEILLANCE RECEIVER
ANTITAMPER LOCK
ANTITAMPER LOCK(OUT)
ANTITAMPER LOCK(OUT)
ANTITAMPER LOCKOUT
ANTITAMPER SWITCH
ANTITAPPING UNIT
ANTITHEFT MEASURES
ANTITHEFT SYSTEM
ANTIVIRAL
ANTIVIRAL PROGRAM
ANTIVIRAL ROUTINE
ANTIVIRUS ALGORITHM
ANTIVIRUS PRODUCT
ANTIVIRUS PROGRAM
ANTIVIRUS PROTECTION
ANTIVIRUS ROUTINE
ANTIVIRUS SOFTWARE
ANTIVIRUS STRATEGY
AOCE
APC
API
APM
APPC
APPENDED SIGNATURE
APPLE DESKTOP BUS
APPLE OPEN COLLABORATION ENVIRONMENT
APPLICATION
APPLICATION ACCESS
APPLICATION BINARY INTERFACE
APPLICATION BUILDING CLASSES
APPLICATION CONFIDENTIALITY
APPLICATION CONTROL AND MANAGEMENT SYSTEM
APPLICATION ENCRYPTION
APPLICATION ENVIRONMENT SPECIFICATIONS
APPLICATION INTEGER
APPLICATION LEVEL ENCRYPTION
APPLICATION LOADABLE MODULE
APPLICATION PROGRAM
APPLICATION PROGRAM INTERCOM
APPLICATION PROGRAMMING INTERFACE
APPLICATION PROGRAMMING TOOLS
APPLICATION PROTECTION
APPLICATION ROUTINE
APPLICATION SPECIFIC INTEGRATED CIRCUIT
APPLICATION TO APPLICATION INTERFACE
APPLICATIONDIRECTED CRYPTOGRAPHY
APPLICATIONSPECIFIC SECURITY
APPLIQUE
APPLIQUE UNIT
APPN
APPROACH
APPROPRIATE KEY
APPROVED CIRCUIT
APPROVED PROGRAM
APPROVED ROUTINE
APPROXIMATE ALGORITHM
APPROXIMATION
APPROXIMATION ERROR
APPWARE LOADABLE MODULE
APT
ARBITER
ARBITRARILY CHOSEN KEY
ARBITRARILY VARYING CHANNEL
ARBITRARY
ARBITRARY KEY
ARBITRARY PASSWORD
ARBITRARY SEQUENCE
ARBITRARY STRING
ARBITRATED AUTHENTICATION
ARBITRATED SIGNATURE
ARBITRATION
ARBITTAIRE ACCESS
ARCHITECTURE
ARCHITECTURE NEUTRAL DISTRIBUTION FORMAT
AREA
AREA DETECTION
AREA SECURITY
ARITHMETIC
ARITHMETIC CODING
ARITHMETIC COMPLEXITY
ARITHMETIC OPERATION
ARITHMETIC TRANSFORM
ARITHMETIC TRANSFORM(ATION)
ARITHMETIC TRANSFORM(ATION)
ARITHMETIC TRANSFORMATION
ARITY
ARL
ARMING PARAMETER
AROUND THE CLOCK MONITORING SYSTEM
ARQ
ARRANGEMENT
ARRAY
ARRIVAL RATE
ART
ARTCARD SECURITY PROTECTION
ARTEFACT
ARTICLE SCREENING
ARTIFICIAL INTELLIGENCE
ARTIFICIAL LANGUAGE
ARTIFICIAL WORD
ASA
ASCENDING KEY
ASCENDING SEQUENCE
ASCENDING STRING
ASCII
ASCII FILE
ASCRAMBLING
ASD
ASE
ASF
ASR
ASSERTIONAL INFORMATION
ASSESSMENT
ASSET PROTECTION
ASSETS
ASSIGNED PASSWORD
ASSIGNEMENT
ASSOCIATION
ASSOCIATIVE LAW
ASSUMPTIONBASED
ASSURANCE
ASSYMETRIC ALGORITHM
ASYMMETRIC (CRYPTO)SYSTEM
ASYMMETRIC (CRYPTO)SYSTEM
ASYMMETRIC CIPHER
ASYMMETRIC CRYPTOALGORITHM
ASYMMETRIC CRYPTOALGORITM
ASYMMETRIC CRYPTOSYSTEM
ASYMMETRIC ENCRYPTION
ASYMMETRIC KEY
ASYMMETRIC KEY (CRYPTO)SYSTEM
ASYMMETRIC KEY (CRYPTO)SYSTEM
ASYMMETRIC KEY CRYPTOSYSTEM
ASYMMETRIC KEY SYSTEM
ASYMMETRIC KEYS
ASYMMETRIC SYSTEM
ASYMMETRICAL DIGITAL SUBSCRIBER LINE
ASYMMETRICAL MULTIPROCESSING
ASYMMETRICAL PUBLIC KEY
ASYMMETRICALLY ENCRYPTED
ASYMPTOTIC VALUE
ASYNCHRONOUS COMMUNICATIONS INTERFACE ADAPTER
ASYNCHRONOUS MODE
ASYNCHRONOUS PROCESSING ATTACK
ASYNCHRONOUS REGIME
ASYNCHRONOUS TIME DIVISION MULTIPLEXING
ASYNCHRONOUS TRANSFER MODE
ASYNCHRONOUS TRANSMISSION
ASYNCHRONOUSTOSYNCHRONOUS CONVERSION
ATDM
ATM
ATOMIC ACTION
ATOMIC ACTIVITY
ATTACHMENT
ATTACHMENT ID
ATTACHMENT IDENTIFICATION
ATTACHMENT UNIT INTERFACE
ATTACK
ATTACK BY ITERATION
ATTACK SCENARIO
ATTACKER
ATTACKER'S TERMINAL
ATTACKPROOF
ATTACKPROOF CRYPTOALGORITHM
ATTACKPROOF CRYPTOALGORITM
ATTACKRESISTANT
ATTACKRESISTANT ENCLOSURE
ATTACKRESISTANT PROTOCOL
ATTEMPT
ATTEMPT LIMIT
ATTEMPTED ACCESS
ATTEMPTED ATTACK
ATTEMPTED BREAKIN
ATTEMPTED INTRUDER
ATTEMPTED PASSWORD
ATTEMPTED PENETRATION
ATTEMPTED SECURITY VIOLATION
ATTRACTIVE INFORMATION
ATTRIBUTE
ATTRIBUTEBASED ACCESS CONTROL
ATTRIBUTELEVEL ACCESS CONTROL
ATTRIBUTES
AUDIBLE ALARM
AUDIBLE SOUND SENSOR
AUDIO ALARM
AUDIO DETECTION
AUDIO DIGITIZER
AUDIO ENCRYPTION
AUDIO ENCRYPTION UNIT
AUDIO FEEDBACK DEVICE
AUDIO INFORMATION
AUDIO INTERCEPT
AUDIO INTERCEPT(ION)
AUDIO INTERCEPT(ION)
AUDIO INTERCEPTION
AUDIO INTERCHANGE FILE FORMAT
AUDIO JAMMING DEVICE
AUDIO MESSAGING INTERCHANGE SPECIFICATION
AUDIO MONITOR
AUDIO QUALITY
AUDIO SCRAMBLING
AUDIO SCRAMBLING ALGORITHM
AUDIO SECURE ROOM
AUDIO SECURITY
AUDIO SURVEILLANCE
AUDIO SURVEILLANCE COUNTERMEASURE DEVICE
AUDIO SURVEILLANCE DEVICE
AUDIO SURVEILLANCE TAPE
AUDIO TERMINAL
AUDIO VIDEO INTERLACED
AUDIT
AUDIT CONTROL DATA
AUDIT FUNCTION
AUDIT LOG
AUDIT TRAIL
AUDIT TRAIL EVENT
AUDIT TRAIL INFORMATION
AUDITABILITY
AUDITING PROCEDURE
AUDITOR
AUDITOR SURVEILLANCE SYSTEM
AUDITTRIAL ANALYSIS
AUI
AUTHENTIC
AUTHENTIC INFORMATION
AUTHENTIC PASSWORD
AUTHENTIC TERMINAL
AUTHENTICATE
AUTHENTICATED (TELE)COMMUNICATION
AUTHENTICATED (TELE)COMMUNICATION
AUTHENTICATED COMMUNICATION
AUTHENTICATED KEY EXCHANGE
AUTHENTICATED TELECOMMUNICATION
AUTHENTICATED USER
AUTHENTICATING TERMINAL
AUTHENTICATION
AUTHENTICATION ALGORITHM
AUTHENTICATION CENTER
AUTHENTICATION CHANNEL
AUTHENTICATION CHECKSUM
AUTHENTICATION CODE
AUTHENTICATION CRYPTOSYSTEM
AUTHENTICATION DATA
AUTHENTICATION DEVICE
AUTHENTICATION EXCHANGE
AUTHENTICATION FUNCTION
AUTHENTICATION ID
AUTHENTICATION IDENTIFICATION
AUTHENTICATION INFORMATION
AUTHENTICATION INFORMATION RELEASE
AUTHENTICATION KEY
AUTHENTICATION MESSAGE
AUTHENTICATION PATTERN
AUTHENTICATION PROBLEM
AUTHENTICATION ROUTINE
AUTHENTICATION SCHEME
AUTHENTICATION SEQUENCE
AUTHENTICATION SERVER
AUTHENTICATION SERVICE
AUTHENTICATION STANDARD
AUTHENTICATION STRING
AUTHENTICATION SYSTEM
AUTHENTICATION TABLE
AUTHENTICATION TAG
AUTHENTICATION TERMINAL
AUTHENTICATION TOKEN
AUTHENTICATION/SECRECY (CRYPTO)SYSTEM
AUTHENTICATION/SECRECY (CRYPTO)SYSTEM
AUTHENTICATION/SECRECY CRYPTOSYSTEM
AUTHENTICATION/SECRECY SYSTEM
AUTHENTICATOR
AUTHENTICITY
AUTHENTICITY ATTACK
AUTHENTICITY TEST
AUTHENTIFICATION PARAMETER
AUTHENTIFICATION PROCEDURE
AUTHENTIFICETION PROCEDURE
AUTHORISATION RULES
AUTHORITY
AUTHORITY DELEGATION
AUTHORITY LEVEL
AUTHORITY NAMING
AUTHORITY SEPARATION
AUTHORITYITEM APPROACH
AUTHORITYITEM LIST
AUTHORIZATION
AUTHORIZATION CODE
AUTHORIZATION MATRIX
AUTHORIZATION MECHANISM
AUTHORIZATION PROFILE
AUTHORIZATION PROGRAM
AUTHORIZATION ROUTINE
AUTHORIZATION TABLE
AUTHORIZED
AUTHORIZED ACCESS
AUTHORIZED ACTION
AUTHORIZED ACTIVITY
AUTHORIZED AREA
AUTHORIZED CALL
AUTHORIZED KEY
AUTHORIZED LEVEL
AUTHORIZED OPERATION
AUTHORIZED PASSWORD
AUTHORIZED PATH
AUTHORIZED PERSON
AUTHORIZED PERSONNEL
AUTHORIZED PRIVILEGE
AUTHORIZED RECEIVER
AUTHORIZED STATE
AUTHORIZED STATION
AUTHORIZED USER
AUTHORIZED USER REFECTION
AUTHORIZER
AUTO EMULATION SWITCHING
AUTO START RECORDER
AUTOANSWER MODE
AUTOANSWER REGIME
AUTOBLOCKING
AUTOCLEAR
AUTOCORRELATION TEST
AUTOCORRELATION VOCODER
AUTODIAL
AUTODIALER
AUTODIALLER MODEM
AUTODIALLER PROGRAM
AUTODIALLER ROUTINE
AUTOENCIPHERMENT
AUTOINFORMATOR
AUTOKEY
AUTOKEY CIPHER
AUTOKEYED ENCRYPTION
AUTOKEYING
AUTOKEYING MODE
AUTOKEYING REGIME
AUTOLOCKING
AUTOMATED CARTRIDGE SYSTEM
AUTOMATED CONNECTION MANAGER SERVER
AUTOMATED CRYPTANALYSIS
AUTOMATED DATA LIBRARY
AUTOMATED INFORMATION SYSTEM
AUTOMATED OFFICE
AUTOMATED PROCEDURE
AUTOMATED SOFTWARE DISTRIBUTION
AUTOMATED STORAGE AND RETRIEVAL SYSTEM
AUTOMATIC ALTERNATIVE ROUTING
AUTOMATIC ANSWERING
AUTOMATIC CALL
AUTOMATIC CALL DISTRIBUTION
AUTOMATIC CALL DISTRIBUTOR
AUTOMATIC CALLING UNIT
AUTOMATIC CHECK
AUTOMATIC CODE CHANGE
AUTOMATIC DATA PROCESSING
AUTOMATIC DATA SORTING
AUTOMATIC DOCUMENT FEEDER
AUTOMATIC ENCRYPTION
AUTOMATIC ERROR CORRECTION
AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEM
AUTOMATIC FREQUENCY FOLLOWING
AUTOMATIC KEY MANAGEMENT
AUTOMATIC LOGGING
AUTOMATIC NUMBER ID
AUTOMATIC NUMBER IDENTIFICATION
AUTOMATIC PERSONAL IDENTIFICATOR CODE
AUTOMATIC POLLING
AUTOMATIC RECOGNITION TECHNOLOGY
AUTOMATIC REPEAT REQUEST
AUTOMATIC RESTART
AUTOMATIC RESYNCHRONIZATION
AUTOMATIC RETRANMISSION
AUTOMATIC SCRAMBLING
AUTOMATIC SECURE VOICE COMMUNICATIONS
AUTOMATIC SECURITY
AUTOMATIC SHEET FEED
AUTOMATIC SORTING
AUTOMATIC SPEECH RECOGNITION
AUTOMATIC SWITCHING
AUTOMATIC SYNCHRONIZATION
AUTOMATIC TELLER MACHINE
AUTOMATIC TELLER MACHINE
AUTOMATIC TIME SWITCH
AUTOMATIC VOICE RECOGNITION
AUTOMATICALLY ERASING MEMORY
AUTOMATION
AUTOMORPHISM
AUTONOMOUS VIRTUAL NETWORK PROTOCOL
AUTOPIC
AUTOSESSION KEY
AUTOSEVOCOM
AUXILIARY
AUXILIARY KEY
AVAILABILITY
AVAILABLE
AVAILABLE ACCESS
AVAILABLE DATA
AVAILABLE MODE
AVAILABLE REGIME
AVAILLABLE MODE
AVAILLABLE REGIME
AVALANCHE EFFECT
AVI
AVNP
AVOIDANCE
AVR
AWARENESS
AWKWARD USE
AXIS
T: 825