Словари
Англо-русский словарь по компьютерной безопасности
Слова
Поиск
Слова на "C" в Англо-русском словаре по компьютерной безопасности
(
2
И
П
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Все
CA
CB
CC
CD
CE
CF
CG
CH
CI
CK
CL
CM
CN
CO
CP
CR
CS
CU
CV
CY
Список всех слов на букву C
Англо-русский словарь по компьютерной безопасности содержит 1764 слова на букву C
Слова, начинающиеся на букву C
C
CABINET
CABLE
CABLEBASED NETWORK
CAESAR CIPHER
CAESAR SUBSTITUTE
CAESAR SUBSTITUTION
CAGE
CALCULATION
CALCULATOR
CALL
CALL ACCESS
CALL INDICATOR
CALL LEVEL INTERFACE
CALL MANAGEMENT SYSTEM
CALL MONITOR
CALL REQUEST
CALL SETUP MESSAGE
CALL SETUP PROCEDURE
CALL SETUP PROTOCOL
CALL SETUP TIME
CALL TRACING
CALLBACK
CALLBACK APPROACH
CALLBACK DEVICE
CALLBACK METHOD
CALLBACK MODEM
CALLBACK PROTECTION
CALLBACK SECURITY SYSTEM
CALLBACK TECHNIQUE
CALLED STATION
CALLED TERMINAL
CALLER
CALLIN
CALLING MODE
CALLING REGIME
CALLING STATION
CALLING TERMINAL
CALLSCREENING PROCESS
CAM
CAMERA
CAMPUS NETWORK
CANCEL CHARACTER
CANCEL SYMBOL
CANCELLATION
CANDIDATE
CANDIDATE (FOR )KEY
CANDIDATE (FOR )KEY
CANDIDATE FOR KEY
CANDIDATE KEY
CAO
CAPABILITIES LIST
CAPABILITY
CAPABILITY ACCESS CONTROL SYSTEM
CAPABILITYBASED PROTECTION
CAPACITIVE CARD
CAPACITIVE COUPLED DEVICE
CAPACITY
CAPTURE
CAPTURED PASSWORD
CAR TRACKING DEVICE
CARD
CARD ACCESS
CARD ACCESS CONTROL
CARD ENTRY SYSTEM
CARD IDENTIFICATION CODE
CARD ISSUE CENTER
CARD ISSUER
CARD KEY
CARD PAYPHONE
CARD READER
CARD USER
CARDACCESS LOCK
CARDBASED ACCESS CONTROL
CARDHOLDER
CARDINALITY
CARRIER
CARRIER (CIRCUIT) IDENTIFICATION CODE
CARRIER (CIRCUIT) IDENTIFICATION CODE
CARRIER SENSE MUTIPLE ACCESS/COLLISION DETECTION
CAS
CASCADE CIPHER
CASCADED CODING
CASE
CASE
CASUAL EAVESDROPPER
CASUAL INTRUDER
CATEGORIZATION
CATEGORY
CATION CODE
CATOPTRICAL CRYPTOGRAPHY
CAUTION
CAV
CAVEAT
CBC
CBC MODE
CBC REGIME
CBMS
CCIA
CCS
CCSC
CCSEP
CCTV SYSTEM
CCTVS
CDDI
CDE
CDFS
CDI
CDMA
CDP
CDPD
CDROM
CDROM FILE SYSTEM
CELL
CELLOPHONE
CELLULAR DIGITAL PACKET DATA
CELP
CEM
CENTER
CENTER KEY
CENTRAL KEYING AUTHORITY
CENTRAL PROCESSOR UNIT
CENTRAL STATION SYSTEM
CENTRALIZED CONTROL
CENTRALIZED KEY DISTRIBUTION
CENTRALIZED KEY GENERATION
CENTRALIZED KEY MANAGEMENT
CENTRALLY PRODUCED KEY
CENTRALLY PRODUCED KEYS
CEO
CEPSTRUM ANALYSIS
CERTAINTY
CERTAINTY OF IDENTIFICATION
CERTIFICATE
CERTIFICATE LOG
CERTIFICATED KEY
CERTIFICATION
CERTIFICATION AUTHORITY
CERTIFICATION LOG
CERTIFICATION TEST
CERTIFICATION TEST(ING)
CERTIFICATION TEST(ING)
CERTIFICATION TESTING
CERTIFIED MAIL
CERTIFIED NETWORK EXPERT
CERTIFIED PRIME
CERTIFIED SIGNATURE
CESG
CFB
CFB MODE
CFB REGIME
CFECK VALUE
CGI
CGM
CHAIN
CHAIN CIPHER
CHAINED CIPHERTEXT
CHAINED CIPHPERTEXT
CHAINED CRYPTOGRAM
CHAINED KEY
CHAINING
CHAINING CIPHER
CHAINING MODE ENCRYPTION
CHALLENGE AND REPLY AUTHENTICATION
CHALLENGE CODE
CHALLENGE SIGNAL
CHALLENGE VALUE
CHALLENGE/RESPONSE METHOD
CHALLENGE/RESPONSE TECHNIQUE
CHALLENGEANDRESPONSE ID
CHALLENGEANDRESPONSE IDENTIFICATION
CHALLENGERESPONCE SEQUENCE
CHALLENGERESPONCE STRING
CHALLENGERESPONSE MECHANISM
CHALLENGERESPONSE PERSONAL ID
CHALLENGERESPONSE PERSONAL IDENTIFIER
CHALLENGERESPONSE PROTOCOL
CHANCE
CHANGE
CHANGE A KEY
CHANGEABLE KEY
CHANGEABLE PASSWORD
CHANGEDADDRESS INTERCEPT
CHANGEDADDRESS INTERCEPT(ION)
CHANGEDADDRESS INTERCEPT(ION)
CHANGEDADDRESS INTERCEPTION
CHANGEOVER
CHANGEOVER TO SPARE KEY
CHANGER
CHANGING
CHANNEL
CHANNEL ASSIGNEMENT
CHANNEL CAPACITY
CHANNEL CODING
CHANNEL COMMAND
CHANNEL INDUCED ERROR
CHANNEL MEDIUM
CHANNEL MESSAGE
CHANNEL SEPARATION
CHANNEL SPACING
CHANNEL STATISTICS
CHANNEL VOCODER
CHANNELATTACHED DEVICE
CHARACTER
CHARACTER ANALYZER
CHARACTER ARRAY
CHARACTER CODE
CHARACTER DELETION
CHARACTER DEPENDENCE
CHARACTER FREQUENCY
CHARACTER ORIENTED PROTOCOL
CHARACTER RECOGNITION
CHARACTER SET
CHARACTER SIGNAL
CHARACTER SPACING
CHARACTER STRING
CHARACTERBYCHARACTER SUBSTITUTE
CHARACTERBYCHARACTER SUBSTITUTION
CHARACTERISTIC
CHARACTERISTIC FREQUENCY
CHARACTERISTIC FUNCTION
CHARACTERISTIC POLINOMIAL
CHARACTERISTIC SEQUENCE
CHARACTERISTIC STRING
CHARACTERORIENTED (TELE)COMMUNICATION
CHARACTERORIENTED (TELE)COMMUNICATION
CHARACTERORIENTED COMMUNICATION
CHARACTERORIENTED PROTOCOL
CHARACTERORIENTED TELECOMMUNICATION
CHARACTERS PER SECOND
CHARACTERTONUMBER REPLACEMENT
CHARGE KEY
CHEATING
CHECK
CHECK CHARACTER
CHECK DECRYPTING
CHECK DECRYPTION
CHECK DIGIT
CHECK FIELD
CHECK GATE METAL DETECTOR
CHECK NUMBER
CHECK PARAMETER
CHECK SYMBOL
CHECK TEST
CHECK THE SOLUTION
CHECK WORD
CHECKBIT
CHECKFUNCTION
CHECKING
CHECKING AGAINST SAMPLE
CHECKING CENTER
CHECKING PROCEDURE
CHECKING PROTOCOL
CHECKING SEQUENCE
CHECKING STRING
CHECKSUM
CHECKSUM FUNCTION
CHECKSUM GENERATOR
CHECKSUMMING
CHECKUP
CHECKVALUE
CHEEK SUM
CHERNOBYLGRAM
CHIEF EXECUTIVE OFFICER
CHIEF INFORMATION OFFICER
CHILDREN KEY
CHINESE REMAINDER THEOREM
CHIP
CHIP IMPLEMENTATION
CHIPBASED ENCRYPTION PACKAGE
CHIPCARD
CHIPIN CARD
CHISQUARE DISTRIBUTION
CHISQUARE ESTIMATION
CHISQUARED STATISTICS
CHOSEN CRYPTOGRAM ATTACK
CHOSEN PASSWORD
CHOSEN PLAINTEXT ATTACK
CHOSENCIPHERTEXT ATTACK SECURITY
CHOSENSIGNATURE ATTACK
CHUNK
CIC
CIDR
CIF
CIFAX
CIK
CIO
CIPHER
CIPHER ALGORITHM
CIPHER ALPHABET
CIPHER ANALYSIS
CIPHER ATTACHMENT
CIPHER BLOCK
CIPHER BLOCK CHAINING
CIPHER BLOCK CHAINING MODE
CIPHER BLOCK CHAINING REGIME
CIPHER BREAK
CIPHER BREAK(ING)
CIPHER BREAK(ING)
CIPHER BREAKING
CIPHER BUSTING MACHINE
CIPHER CHARACTER
CIPHER CHIP INTELLIGENT MODULE
CIPHER CODE
CIPHER COMBINATION
CIPHER CONTROL BYTE
CIPHER CRACKING
CIPHER DEVICE
CIPHER DIGRAPH
CIPHER DISCRIMINANT
CIPHER DISK
CIPHER FEEDBACK
CIPHER FEEDBACK ENCRYPTION
CIPHER FEEDBACK METHOD
CIPHER FEEDBACK MODE
CIPHER FEEDBACK REGIME
CIPHER FEEDBACK TECHNIQUE
CIPHER FUNCTION
CIPHER GROUP
CIPHER KEY
CIPHER KEY ALLOCATION
CIPHER KEY BIT
CIPHER LENGTH
CIPHER LOCK
CIPHER MACHINE
CIPHER PERIOD
CIPHER SEARCH ATTACK
CIPHER SECURITY
CIPHER SEQUENCE
CIPHER SET
CIPHER SIGNAL
CIPHER SPACE
CIPHER STREAM
CIPHER STRENGTH
CIPHER STRING
CIPHER STRUCTURE
CIPHER SYMBOL
CIPHER TERMINAL
CIPHER TEXT
CIPHER TEXT CHAIN
CIPHER TEXT FEEDBACK
CIPHER TEXT SPACE
CIPHER UNIT
CIPHER VULNERABILITY
CIPHER WRITING
CIPHERANALYST
CIPHERBREAKER
CIPHERBREAKING
CIPHERBREAKING COMPLEXITY
CIPHERDEPENDENT PARAMETER
CIPHERED BIT SEQUENCE
CIPHERED BIT STRING
CIPHERED CALL
CIPHERED MAIL
CIPHERED SEQUENCE
CIPHERED STRING
CIPHERED TEXT
CIPHERED TRANSMISSION
CIPHERER
CIPHERFEEDBACK
CIPHERFEEDBACK (CRYPTO)SYSTEM
CIPHERFEEDBACK (CRYPTO)SYSTEM
CIPHERFEEDBACK CRYPTOSYSTEM
CIPHERFEEDBACK SYSTEM
CIPHERFUNCTION
CIPHERING
CIPHERING ALGORITHM
CIPHERING DEVICE
CIPHERING FUNCTION
CIPHERING GENERATOR
CIPHERING MODE
CIPHERING RATE
CIPHERING REGIME
CIPHERING SEQUENCE
CIPHERING STRING
CIPHERKEY
CIPHERPUNK
CIPHERTEXT
CIPHERTEXT ALPHABET
CIPHERTEXT AUTOKEY
CIPHERTEXT AUTOKEY CIPHER
CIPHERTEXT BLOCK
CIPHERTEXT CHARACTER
CIPHERTEXT COMBINATION
CIPHERTEXT FILE
CIPHERTEXT GENERATOR
CIPHERTEXT IMAGE
CIPHERTEXT LETTER
CIPHERTEXT MESSAGE
CIPHERTEXT ONLY ATTACK
CIPHERTEXT ONLY ATTACK SECURITY
CIPHERTEXT SEQUENCE
CIPHERTEXT STRING
CIPHERTEXT SYMBOL
CIPHERTEXT VECTOR
CIPHONY
CIPHONY COMMUNICATION NETWORK
CIPHONY COMMUNICATION SYSTEM
CIPHPERTEXT
CIPPHERBREAKER
CIRCUIT
CIRCUIT COMPLEXITY
CIRCUIT REDUNDANCE
CIRCUIT SWITCHING
CIRCUITSWITCHED DATA NETWORK
CIRCULAR SHIFT
CIRCUMSTANTIAL EVIDENCE
CIRCUMVENTING ACCESS
CIRCUMVENTION
CIT
CITIZENS BAND
CIVILIAN CRYPTOGRAPHY
CIVISION
CKD
CLAIMANT
CLAIMED IDENTITY
CLANDESTINE MICRO
CLANDESTINE MICRO(PHONE)
CLANDESTINE MICRO(PHONE)
CLANDESTINE MICROPHONE
CLANDESTINE MIKE
CLANDESTINE OPERATION
CLANDESTINE RECORDER
CLANDESTINE TRANSMITTER
CLARITY
CLASS
CLASS NP
CLASS P
CLASS P PROBLEM
CLASSICAL (CRYPTO)SYSTEM
CLASSICAL (CRYPTO)SYSTEM
CLASSICAL CIPHER
CLASSICAL CRYPTOGRAPHY
CLASSICAL CRYPTOSYSTEM
CLASSICAL SYSTEM
CLASSIFICATION
CLASSIFICATION ATTRIBUTE
CLASSIFICATION AUTHORITY
CLASSIFICATION HIERARCHY
CLASSIFICATION LABEL
CLASSIFICATION LEVEL
CLASSIFICATIONBASED ACCESS CONTROL
CLASSIFIED
CLASSIFIED ACTIVITY
CLASSIFIED ALGORITHM
CLASSIFIED AREA PASS
CLASSIFIED COMMUNICATION FACILITIES
CLASSIFIED CONVERSATION
CLASSIFIED DATABASE
CLASSIFIED DOCUMENT
CLASSIFIED FUNCTION
CLASSIFIED INFORMATION
CLASSIFIED KEY
CLASSIFIED MESSAGE
CLASSIFIED NETWORK
CLASSIFIED PLAIN LANGUAGE INFORMATION
CLASSIFIED PROCESSING
CLASSITIED DATA
CLASSLESS INTERDOMAIN ROUTING
CLEAN SPEECH
CLEAR
CLEAR (TELE)COMMUNICATION
CLEAR (TELE)COMMUNICATION
CLEAR CHARACTER
CLEAR COMMUNICATION
CLEAR CRYPTOGRAPHIC KEY
CLEAR DATA
CLEAR FORM
CLEAR HEADER
CLEAR HEADING
CLEAR INFORMATION
CLEAR KEY
CLEAR MESSAGE
CLEAR MODE
CLEAR OPERATION
CLEAR REGIME
CLEAR SIGNAL
CLEAR SPEECH
CLEAR SPEECH MODE
CLEAR SPEECH REGIME
CLEAR SYMBOL
CLEAR TELECOMMUNICATION
CLEAR TEXT
CLEAR TEXT INPUT
CLEAR TEXT PASSWORD
CLEAR TO SEND
CLEAR TRANSMISSION
CLEAR VOICE OVERRIDE
CLEAR ZONE
CLEAR/CRYPTO MODE
CLEAR/CRYPTO REGIME
CLEAR/SECURE SWITCH
CLEAR/SECURE SWITCHING
CLEARANCE
CLEARANCE ATTRIBUTE
CLEARANCE CAPABILITY
CLEARANCE LEVEL
CLEARANCE RATING
CLEARANCE TO SEND
CLEARCIPHER TRANSITION
CLEARCRYPTO TRANSITION
CLEARED
CLEARED PERSON
CLEARED PERSONNEL
CLEARED TO SECRET USER
CLEARTEXT
CLEARTEXT BLOCK
CLEARTEXT INFORMATION
CLEARTEXT MESSAGE
CLEARTEXT OPERATION
CLEARTEXT VECTOR
CLEARTEXTCIPHERTEXT EXPANSION
CLEARTEXTCIPHERTEXT EXTENSION
CLEARTO CLEAR (TELE)COMMUNICATION
CLEARTO CLEAR (TELE)COMMUNICATION
CLEARTO CLEAR COMMUNICATION
CLEARTO CLEAR TELECOMMUNICATION
CLEARTOSECURE MODE SWITCHING
CLEARVOICE SIGNAL
CLERK
CLI
CLIENT/SERVER OPEN DEVELOPMENT ENVIRONMENT
CLIENTSERVER (TELE)COMMUNICATION
CLIENTSERVER (TELE)COMMUNICATION
CLIENTSERVER COMMUNICATION
CLIENTSERVER TELECOMMUNICATION
CLIMB DETECTION
CLIMBING INTRUDER
CLNP
CLOAK
CLOAKING DEVICE
CLOCK
CLOCK ARITHMETIC
CLOCK CIRCUIT
CLOCK CONTROLLED SHIH REGISTER
CLOCK FREQUENCY
CLOCK PERIOD
CLOCK RATE
CLOCK RECOVERY
CLOCK SIGNAL
CLOSE CIRCUIT SURVEILLANCE CAMERA
CLOSED AREA
CLOSED CIRCUIT TELEVISION MONITOR
CLOSED FIELD
CLOSED SECURITY ENVIRONMENT
CLOSED USER GROUP
CLOSEDCIRCUIT TELEVISION SYSTEM
CLOSURE
CLR
CLUSTER ANALYSIS
CLUSTER DISTRIBUTION
CLUSTERING
CLUT
CLV
CLYPTOGRAPHIC PROTOCOL
CM
CMA
CMIP
CMS
CMVC
CMW
CNL
CNLP
CNM
CNX
COASTING
COCTAIL PARTY SYNDROME
CODE
CODE
CODE ALPHABET
CODE ASSIGNEMENT
CODE BOOK
CODE BOOK MODE
CODE BOOK REGIME
CODE CHARACTER
CODE CHARACTER SET
CODE CLERK
CODE COMBINATION
CODE CONVERSION
CODE CONVERTER
CODE CORRELATION
CODE CRACKING
CODE DEPTH
CODE DIVISION MULTIPLE ACCESS
CODE EXITED LINEAR PREDICTION
CODE GENERATOR
CODE KEY
CODE LAYOUT
CODE LETTER
CODE MAPPING
CODE NAME
CODE NUMBER
CODE PAIR
CODE PERMUTATION
CODE PHRASE
CODE POSITION
CODE RATE
CODE REPETITION CYCLE
CODE REPETITION TIME
CODE REPRESENTATION
CODE SELECTION
CODE SEQUENCE
CODE SETTING
CODE SIGN
CODE SPACE
CODE SYMBOL
CODE SYNCHRONIZATION
CODE TRANSLATION
CODE TRANSPARENT TRANSMISSION
CODE VECTOR
CODE WORD
CODEBOOK
CODEBOOK ENCRYPTION
CODEBREAKER
CODEBREAKING
CODEBREAKING
CODEBREAKING ALGORITHM
CODEBREAKING METHOD
CODEBREAKING SYSTEM
CODEBREAKING TECHNIQUE
CODEC
CODECRACKING
CODED (TELE)COMMUNICATION
CODED (TELE)COMMUNICATION
CODED BADGE
CODED BAND SPLITTER
CODED COMMUNICATION
CODED SIGNAL
CODED TELECOMMUNICATION
CODEKEY
CODEMAKER
CODER
CODER/DECODER UNIT
CODESTRING
CODETEXT
CODEWORD
CODING
CODING ALGORITHM
CODING ERROR
CODING FORMAT
CODING THEORY
COEFFICIENT
COGNITIVE
COGNITIVE PASSWORD
COHERENCE
COHESION
COIN FLOPPING
COIN FLOPPING BY TELEPHONE
COINCIDENCE INDEX
COINTOSSING SEQUENCE
COINTOSSING STRING
COLD SITE
COLLATING SEQUENCE
COLLATING STRING
COLLECTION
COLLECTION PROCESSOR
COLLECTIVE ATTACK
COLLECTIVE COIN FLOPPING
COLLECTIVELY SHARING INFORMATION
COLLISION
COLLISION AVOIDANCE
COLLISION DETECTION
COLLISION RESOLUTION ALGORITHM
COLLISIONFREE HASH FUNCTION
COLLUSION
COLOR
COLOR CHANGE
COLOR LOOK UP TABLE
COLOR MANAGEMENT SYSTEM
COMBINAFORIAL ALGORITHM
COMBINATION
COMBINATION LOCK
COMBINATIONAL COMPLEXITY
COMBINATORIAL MAPPING
COMBINATORIAL PROBLEM
COMBINATORIC
COMBINED ENCRYPTION
COMBINER
COMBINER KEY
COMINT
COMMAND
COMMAND FIELD
COMMAND KEY
COMMAND MODE
COMMAND REGIME
COMMAND SIGNAL
COMMERCIAL CHANNEL
COMMERCIAL COMMUNICATION SECURITY ENDORSEMENT PROGRAM
COMMERCIAL COMPUTER SECURITY CENTRE
COMMERCIAL INTERNET CARRIERS
COMMITMENT SCHEME
COMMODITIES
COMMON COEFFICIENT
COMMON DESKTOP ENVIRONMENT
COMMON FACTOR
COMMON INTERMEDIATE FORMAT
COMMON KEY
COMMON MANAGEMENT INFORMATION PROTOCOL
COMMON MANAGEMENT INFORMATION PROTOCOL
COMMON OBJECT REQUEST BROKER ARCHITECTURE
COMMON OPEN SOFTWARE ENVIRONMENT
COMMON PASSWORD
COMMON PROGRAMMING INTERFACE
COMMON RESOURCE
COMMON USER ACCESS
COMMONKEY (CRYPTO)SYSTEM
COMMONKEY (CRYPTO)SYSTEM
COMMONKEY CRYPTOSYSTEM
COMMONKEY SYSTEM
COMMONLY USED PASSWORD
COMMUNIATIONS VULNERABILITY
COMMUNICANT
COMMUNICATE WITH SYSTEM
COMMUNICATED DATA
COMMUNICATED INFORMATION
COMMUNICATION
COMMUNICATION (CRYPTO)SYSTEM
COMMUNICATION (CRYPTO)SYSTEM
COMMUNICATION ACCESS METHOD
COMMUNICATION ACCESS TECHNIQUE
COMMUNICATION ADAPTER
COMMUNICATION APPLICATION SPECIFICATION
COMMUNICATION BAND
COMMUNICATION CHANNEL ACCESS
COMMUNICATION COMPLEXITY
COMMUNICATION COMPROMISE
COMMUNICATION COMPUTER
COMMUNICATION CONCENTRATOR
COMMUNICATION CONTROL
COMMUNICATION CONTROLLER
COMMUNICATION COUNTERMEASURES
COMMUNICATION CRYPTOSYSTEM
COMMUNICATION DATA PROCESSOR
COMMUNICATION DECEPTION
COMMUNICATION DEVICE
COMMUNICATION DISRUPTER
COMMUNICATION ENCRYPTION
COMMUNICATION ESTABLISHMENT
COMMUNICATION EXPOSURE
COMMUNICATION INTEGER
COMMUNICATION INTELLIGENCE
COMMUNICATION INTERCEPT
COMMUNICATION INTERCEPT OPERATION
COMMUNICATION INTERCEPT(ION)
COMMUNICATION INTERCEPT(ION)
COMMUNICATION INTERCEPTION
COMMUNICATION KEY
COMMUNICATION LINE TERMINAL
COMMUNICATION MASKING
COMMUNICATION MEDIUM
COMMUNICATION MODULE
COMMUNICATION NETWORK
COMMUNICATION NETWORK ACCESS
COMMUNICATION NOISE
COMMUNICATION PARTNER
COMMUNICATION PATH
COMMUNICATION PERIOD
COMMUNICATION PRIVACY
COMMUNICATION PROCESSOR
COMMUNICATION PROTECTION
COMMUNICATION PROTOCOL
COMMUNICATION RELIABILITY
COMMUNICATION SECURITY
COMMUNICATION SECURITY DEVICE
COMMUNICATION SECURITY EQUIPMENT
COMMUNICATION SECURITY GATEWAY
COMMUNICATION SECURITY SYSTEM
COMMUNICATION SESSION
COMMUNICATION SETUP
COMMUNICATION SURVIVABILITY
COMMUNICATION SYSTEM
COMMUNICATION TERMINAL
COMMUNICATIONS MANAGERS ASSOCIATION
COMMUNICATIONSELECTRONICS SECURITY GROUP
COMMUNICATIOS CRYPTOGRAPHY
COMMUNICATOR
COMMUTATION CONDITION
COMMUTATIVE GROUP
COMMUTATIVE PROPERTY
COMMUTATIVE RING
COMPACT DISK READONLY MEMORY
COMPACTED DATA
COMPANY INFORMATION
COMPANYSENSITIVE INFORMATION
COMPARATOR
COMPARISON
COMPARISON METHOD
COMPARISON TECHNIQUE
COMPARTMENT
COMPARTMENTALIZATION
COMPARTMENTATION
COMPARTMENTED INFORMATION
COMPARTMENTED MODE
COMPARTMENTED MODE WORKSTATION
COMPARTMENTED REGIME
COMPATIBILITY
COMPETITIVE INFORMATION
COMPETITOR
COMPEXITY HIERARCHY
COMPLEMENT
COMPLEMENTARY INFORMATION
COMPLEMENTARY KEY
COMPLEMENTARY KEYS
COMPLETE ISOLATION
COMPLETE MEDITATION PRINCIPLE
COMPLETELY RANDOM
COMPLETELY RANDOM SEQUENCE
COMPLETELY RANDOM STRING
COMPLETENESS
COMPLETENESS PROPERTY
COMPLEX KEY
COMPLEX MERSENNE TRANSFORM
COMPLEX PROTECTION
COMPLEXITY
COMPLEXITY CLASS
COMPLEXITY MEASURE
COMPLEXITY PROFILE
COMPLEXITY THEORETIC SECURITY
COMPLEXITY THEORY
COMPLEXITYTHEORETIC APPROACH
COMPONENT
COMPONENT CIPHER
COMPONENTBYCOMPONENT ADDITION
COMPONENTWISE ADDITION
COMPOSITE
COMPOSITE ATTRIBUTE
COMPOSITE INTEGER
COMPOSITE NUMBER
COMPOSITE TRANSFORM
COMPOSITE TRANSFORM(ATION)
COMPOSITE TRANSFORM(ATION)
COMPOSITE TRANSFORMATION
COMPOSITENESS
COMPOSITION
COMPOSITNESS TEST
COMPOUND ENCRYPTION
COMPRESSED ENCODING
COMPRESSED INFORMATION
COMPRESSED VIDEO INTEROPERABILITY
COMPRESSED VOLUME FILE
COMPRESSION
COMPRESSION ALGORITHM
COMPRESSION CODING
COMPRESSION FUNCTION
COMPRESSION RATIO
COMPROMISE
COMPROMISE PROTECTION
COMPROMISE SECURITY
COMPROMISE THREAT
COMPROMISED (CRYPTO)SYSTEM
COMPROMISED (CRYPTO)SYSTEM
COMPROMISED CRYPTOSYSTEM
COMPROMISED KEY
COMPROMISED SECURITY
COMPROMISED SYSTEM
COMPROMISING EMISSION
COMPROMISING INFORMATION
COMPROMISING SIGNAL
COMPUSEC
COMPUTABLE STRONG
COMPUTATION
COMPUTATION SPEED
COMPUTATIONAL (COMPLEXITY BASED )CRYPTOGRAPHY
COMPUTATIONAL (COMPLEXITY BASED )CRYPTOGRAPHY
COMPUTATIONAL COMPLEX PROBLEM
COMPUTATIONAL COMPLEXITY
COMPUTATIONAL COMPLEXITY BASED CRYPTOGRAPHY
COMPUTATIONAL CRYPTOGRAPHY
COMPUTATIONAL CUTOFF RATE
COMPUTATIONAL INACCESSIBLE INFORMATION
COMPUTATIONAL INFEASIBILITY
COMPUTATIONAL INTRACTABILITY
COMPUTATIONAL MODEL
COMPUTATIONAL NODE
COMPUTATIONAL POWER
COMPUTATIONAL PROCEDURE
COMPUTATIONAL RESOURCE
COMPUTATIONAL SECURITY
COMPUTATIONAL TIME
COMPUTATIONALCOMPLEXITY APPROACH
COMPUTATIONALLY INFEASIBLE PROBLEM
COMPUTATIONALLY INTENSIVE
COMPUTATIONALLY SECURE
COMPUTATIONALLY SECURE (CRYPTO)SYSTEM
COMPUTATIONALLY SECURE (CRYPTO)SYSTEM
COMPUTATIONALLY SECURE CIPHER
COMPUTATIONALLY SECURE CRYPTOSYSTEM
COMPUTATIONALLY SECURE SYSTEM
COMPUTER
COMPUTER ABUSE
COMPUTER ACCESS
COMPUTER ACCESS SYSTEM
COMPUTER ACCESS VIA TELEPHONE LINE
COMPUTER ANALYSIS
COMPUTER AND COMMUNUCATIONS INDUSTRY ASSOCIATION
COMPUTER ASSISTED ANALYSIS
COMPUTER BUG
COMPUTER BURGLAR
COMPUTER CENTER
COMPUTER CENTER MANAGER
COMPUTER CONTAMINANT
COMPUTER CRIME
COMPUTER CRIME LEGISLATION
COMPUTER CRIME RISK
COMPUTER CRIMINAL
COMPUTER CRYPTOGRAPHY
COMPUTER CRYPTOLOGY
COMPUTER CYBERPUNK
COMPUTER EAVESDROPPING
COMPUTER ECHO
COMPUTER EMBEZZLER
COMPUTER ENVIRONMENT
COMPUTER ESPIONAGE
COMPUTER FRAUD
COMPUTER GRAPHICS INTERFACE
COMPUTER GRAPHICS METAFILE
COMPUTER HACKER
COMPUTER HACKING
COMPUTER HARDWARE
COMPUTER INFORMATION
COMPUTER INTRUDER
COMPUTER KEY
COMPUTER LAW
COMPUTER MISUSE
COMPUTER NETWORK
COMPUTER NETWORK CONTROL
COMPUTER OPERATOR
COMPUTER OPERATOR ERRORS
COMPUTER PERFORMING CRYPTANALYSIS
COMPUTER PRIVACY
COMPUTER PROGRAM TAPE
COMPUTER READABLE INFORMATION
COMPUTER RELATED CRIME
COMPUTER ROOM
COMPUTER SECURITY
COMPUTER SECURITY ENVIRONMENT
COMPUTER SECURITY LEGISLATION
COMPUTER SECURITY ROOM
COMPUTER SECURITY STANDARD
COMPUTER SITE
COMPUTER SPYING
COMPUTER STORED DATA
COMPUTER SUPPORTED TELECOMMUNICATIONS APPLICATION
COMPUTER SURVEILLANCE
COMPUTER SYSTEM
COMPUTER SYSTEM BREAKIN
COMPUTER TAMPERING
COMPUTER THIEVERY
COMPUTER TRAVELLER
COMPUTER TRESPASSER
COMPUTER USER
COMPUTER VANDALISM
COMPUTER VIRUS COUNTERMEASURES
COMPUTER VULNERABILITY
COMPUTERACCESS CODE
COMPUTERACCESS PORT
COMPUTERAIDED CRYPTANALYSIS
COMPUTERAIDED SOFTWARE ENGINEERING
COMPUTERASSISTED CRIME
COMPUTERAUTOMATED OFFICE
COMPUTERBACKED CRYPTANALYSIS
COMPUTERBASED ACCESS CONTROL
COMPUTERBASED CODEBREAKING METHOD
COMPUTERBASED CODEBREAKING TECHNIQUE
COMPUTERBASED INFORMATION SYSTEM
COMPUTERBASED MESSAGE SYSTEM
COMPUTERCOMMUNICATION NETWORK
COMPUTERCONTROLLED FILE
COMPUTERCONTROLLED GENERATOR
COMPUTERGENERATED PASSWORD
COMPUTERINTEGRATED TELEPHONY
COMPUTERIZED CARD
COMPUTERIZED DEVICE
COMPUTERIZED INFORMATION
COMPUTERRELATED FRAUD
COMPUTERRELATED THREAT
COMPUTERTOCOMPUTER DATA EXCHANGE
COMPUTERTOTERMINAL (TELE)COMMUNICATION
COMPUTERTOTERMINAL (TELE)COMMUNICATION
COMPUTERTOTERMINAL COMMUNICATION
COMPUTERTOTERMINAL TELECOMMUNICATION
COMPUTING
COMPUTING IN GALOIS FIELDS
COMPUTING PARTITION
COMPUTING POWER
COMPUTING RESOURCE
COMPUTING SYSTEM
COMPUTING TIME
COMSEC
COMSEC DEVICE
COMSEC EQUIPMENT
CONCATENATED CODE
CONCATENATED ENCRYPTION
CONCATENATED KEY
CONCATENATION
CONCEALED
CONCEALED EVIDENCE
CONCEALED INFORMATION
CONCEALED WRITING
CONCEALING TEXT
1
2
T: 1440