Словари
Англо-русский словарь по компьютерной безопасности
Слова
Поиск
Слова на "D" в Англо-русском словаре по компьютерной безопасности
(
2
И
П
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Все
DA
DB
DC
DD
DE
DF
DH
DI
DK
DL
DM
DN
DO
DP
DR
DS
DT
DU
DV
DX
DY
Список всех слов на букву D
Англо-русский словарь по компьютерной безопасности содержит 1026 слов на букву D
Слова, начинающиеся на букву D
D
DA
DAA
DAC
DACTYLOGRAM
DACTYLOGRAPHY
DAE
DAILY CODE
DAILY KEY
DAILY KEYING ELEMENT
DAMA
DAMAGE
DAMAGECAUSING INFECTOR
DAMAGECAUSING VIRUS
DAMAGED DATA
DANGER ALARM SYSTEM
DANS
DAP
DAS
DASD
DATA
DATA (DIGITAL) ENCRYPTION STANDARD
DATA (DIGITAL) ENCRYPTION STANDARD
DATA (TELE)COMMUNICATION
DATA (TELE)COMMUNICATION
DATA ABUSE
DATA ACCESS
DATA ACCESS ARRANGEMENT
DATA ACCESS EQUIPMENT
DATA ACCESS PROGRAM
DATA ACCESS ROUTINE
DATA ACCESS SYSTEM
DATA ACQUISITION
DATA ACQUISITION SYSTEM
DATA AGGREGATION
DATA ALTERATION
DATA AMBIGUITY
DATA ARRAY
DATA ATTRIBUTE
DATA AUTHENTICATION
DATA AUTHENTICATION ALGORITHM
DATA AUTHENTICATION CODE
DATA AUTHENTICATION KEY
DATA AVAILABILITY
DATA BACKUP
DATA BIT
DATA BLOCK
DATA BYTE
DATA CANCELLATION
DATA CHAMBER
DATA CHECKSUM
DATA CIPHERING PROCESSOR
DATA CIPHERING UNIT
DATA CLASSIFICATION
DATA COMMUNICATION
DATA COMMUNICATION EQUIPMENT
DATA COMMUNICATION NETWORK
DATA COMMUNICATION PROTECTION
DATA COMMUNICATION SECURITY
DATA COMMUNICATIONS EQUIPMENT
DATA COMPATIBILITY
DATA COMPRESSION
DATA COMPRESSION MODEM
DATA COMPRESSION PROGRAM
DATA COMPRESSION ROUTINE
DATA CONFIDENTIALITY
DATA CONFIDENTIALITY SERVICE
DATA CONTENT PROTECTION
DATA CONTINUITY
DATA CONTROL
DATA CONVERTER
DATA CORRUPTION
DATA CRIME
DATA CRYPTOGRAPHY
DATA DEFINITION LANGUAGE
DATA DEFINITION LANGUAGE
DATA DESCRIPTION LANGUAGE
DATA DIDDLING
DATA DUPLICATION
DATA ENCAPSULATION
DATA ENCIPHERING KEY
DATA ENCRYPTING KEY
DATA ENCRYPTION ALGORITHM
DATA ENCRYPTION DEVICE
DATA ENCRYPTION EQUIPMENT
DATA ENCRYPTION KEY
DATA ENCRYPTION MODE
DATA ENCRYPTION PACKAGE
DATA ENCRYPTION PROCESSOR
DATA ENCRYPTION REGIME
DATA ENCRYPTION STANDARD
DATA ENCRYPTION STANDARD
DATA ENTRY TERMINAL
DATA EXCHANGE INTERFACE
DATA FIELD
DATA FILE ACCESS
DATA FILE OWNER
DATA FINK CONTROL PROTOCOL
DATA FLOW
DATA FLOW GRANULARITY
DATA FORMAT
DATA FRAME
DATA FRAME(WORK)
DATA FRAME(WORK)
DATA FRAMEWORK
DATA GRADE CIRCUIT
DATA HIERARCHY
DATA ID
DATA IDENTIFIER
DATA IDENTITY
DATA INSERTION INSERTION
DATA INTEGER
DATA INTEGRITY DEVICE
DATA INTEGRITY MECHANISM
DATA INTEGRITY SERVICE
DATA INTERCHANGE FORMAT
DATA INTERCHANGE STANDARDS ASSOCIATION
DATA INTERLOCK
DATA KEY
DATA LINK (EN)CRYPTOR
DATA LINK (EN)CRYPTOR
DATA LINK CONTROL IDENTIFIER
DATA LINK CONTROL PROTOCOL
DATA LINK CRYPTOR
DATA LINK ENCRYPTION
DATA LINK ENCRYPTION STANDARD
DATA LINK ENCRYPTOR
DATA LINK MODEM
DATA LINK SWITCHING
DATA LOSS
DATA MANAGEMENT SYSTEM
DATA MANIPULATION
DATA MARKING
DATA MESSAGE
DATA MODIFICATION
DATA ORIGIN AUTHENTICATION
DATA PATH
DATA PRESENTATION
DATA PRIVACY
DATA PRIVACY KEY
DATA PROCESSING
DATA PROCESSING ASSET PROTECTION
DATA PROCESSING AUDIT
DATA PROCESSING ENVIRONMENT
DATA PROCESSING MANAGER
DATA PROCESSING OPERATION
DATA PROCESSING PROBLEM
DATA PROCESSING SECURITY
DATA PROCESSING SYSTEM
DATA PROCESSOR
DATA PROTECTION CRITERIA
DATA PROTECTION LAW
DATA PROTECTION LEGISLATION
DATA PROTECTION PROCEDURE
DATA PROTECTION UNIT
DATA RATE
DATA RECOVERY
DATA REDUCTION ALGORITHM
DATA REPORT
DATA RETENTION TIME
DATA RETRIEVAL
DATA SCRAMBLER
DATA SCRAMBLING DEVICE
DATA SCREENING
DATA SECURITY
DATA SECURITY AUDIT
DATA SECURITY DEVICE
DATA SECURITY ENGINEERING
DATA SECURITY EQUIPMENT
DATA SECURITY FACILITIES
DATA SECURITY MANAGER
DATA SECURITY MEASURES
DATA SECURITY MODULE
DATA SECURITY SOFTWARE
DATA SECURITY STRATEGY
DATA SEGMENT
DATA SEQUENCE
DATA SERVICE
DATA SET
DATA SIGNALING RATE
DATA SPECIFICATION
DATA SPEED
DATA STRING
DATA SYNTHESIS
DATA TABLET
DATA TAMPERING
DATA TELECOMMUNICATION
DATA TERMINAL EQUIPMENT
DATA THEFT
DATA THROUGHPUT
DATA THROUGHPUT RATE
DATA THROUGHPUT( RATE)
DATA THROUGHPUT(RATE)
DATA TRANSFER
DATA TRANSFER RATE
DATA TRANSMISSION
DATA TRANSMISSION ERRORS
DATA TRANSMISSION LINK
DATA TRANSMISSION SPEED
DATA TRANSMISSION SYSTEM
DATA TRANSMISSION VALIDITY
DATA/TIME STAMP
DATABASE
DATABASE ACCESS POINT
DATABASE CONTROL
DATABASE CONTROL LANGUAGE
DATABASE KEY
DATABASE LOG
DATABASE MAINTENANCE
DATABASE MANAGEMENT SYSTEM
DATABASE MANAGEMENT SYSTEM
DATABASE MANAGER
DATABASED INFORMATION
DATACARRYING LIFETIME
DATACIPHERING OPERATION
DATACOMPRESSION CODE
DATACRYPTOR
DATADEPENDENT ACCESS
DATADEPENDENT CHECK
DATADEPENDENT ENCRYPTION
DATADEPENDENT KEY
DATADEPENDENT PROTECTION
DATADEPENDENT RESTRICTION
DATAGRAM
DATAINITIATED CONTROL
DATAINVOICE MODEM
DATALINK
DATANAPPING
DATAOPERATION KEY
DATAPROCESSING NETWORK
DATASET
DATATRANSLATION KEY
DATE
DATE PROTECTION LAW
DATOR
DAY AND NIGHT SURVEILLANCE
DBCL
DBMS
DBR
DCB
DCC
DCE
DCECP
DCHP
DCP
DCPHOPERATION
DCU
DDB
DDBMS
DDCMP
DDCS
DDE
DDL
DDM
DDN
DDP
DE BRUIJN SEQUENCE
DE BRUIJN STRING
DEA
DEA ALGORITHM
DEACTIVATE DEVICE
DEACTIVATION
DEAD BUG
DEADEND SITUATION
DEADLOCK
DEBLOCKING
DEBUG
DEBUGGER
DEBUGGING
DEBUGGING AIDS
DEBUGGING DEVICE
DEBUGGING EQUIPMENT
DEBUGGING TEST
DEC
DECATENATION
DECEITE
DECENTRALIZED AUTHORIZATION
DECENTRALIZED KEY MANAGEMENT
DECENTRALIZED PROCESSING
DECENTRALIZED SYSTEM
DECEPTION
DECEPTION TEST
DECEPTION TEST(ING)
DECEPTION TEST(ING)
DECEPTION TESTING
DECEPTIVE DATA ALTERATION
DECEPTIVE MESSAGE
DECIMAL ARITHMETIC
DECIMAL NUMBER
DECIMAL STRING
DECIMATED SEQUENCE
DECIMATED STRING
DECIMATION
DECIPHER
DECIPHER CIPHERTEXT
DECIPHER CIPHPERTEXT
DECIPHER CRYPTOGRAM
DECIPHER KEY
DECIPHER THE CRYPTOGRAM
DECIPHERABILITY
DECIPHERABLE
DECIPHERED
DECIPHERED CRYPTOGRAM
DECIPHERER
DECIPHERING
DECIPHERING ALPHABET
DECIPHERING EQUATION
DECIPHERING OPERATION
DECIPHERING PROCESS
DECIPHERMENT TRANSFORM
DECIPHERMENT TRANSFORM(ATION)
DECIPHERMENT TRANSFORM(ATION)
DECIPHERMENT TRANSFORMATION
DECISION
DECISION ERROR
DECISION FUNCTION
DECISION MECHANISM
DECISION PROBLEM
DECISION SPACE
DECISION TREE
DECK
DECLASSIFICATION
DECODABILITY
DECODE KEY
DECODED VOICE
DECODEMENT
DECODER
DECODING
DECODING ALGORITHM
DECOMPOSITION
DECONTROL
DECONVOLUTION
DECOUPLING
DECREASING SEQUENCE
DECREASING STRING
DECRYPT
DECRYPT ONLY KEY
DECRYPT THE CRYPTOGRAM
DECRYPTED MESSAGE
DECRYPTER
DECRYPTING
DECRYPTING BY EAR
DECRYPTION
DECRYPTION BY EAR
DECRYPTION COMPUTATION
DECRYPTION DEVICE
DECRYPTION KEY
DECRYPTMENT
DECRYPTOR
DEDICATED CHANNEL
DEDICATED HARDWARE
DEDICATED LINE
DEDICATED SECURITY MODE
DEDICATED SECURITY REGIME
DEDICATED SIGNAL LINE
DEDICATED SYSTEM
DEDUCIBILITY SECURITY
DEDUCTION
DEE
DEENCRYPTION
DEEP PENETRATIVE SEARCH
DEFAULT
DEFAULT PASSWORD
DEFECTIVE BUG
DEFENSE
DEFENSE DATA NETWORK
DEFENSE INTEGRATED SECURE NETWORK
DEFENSE INTELLIGENCE AGENCY
DEFENSE SECURE NETWORK
DEFENSERELATED INFORMATION
DEGARBLE
DEGAUSS
DEGAUSSER
DEGRADATION
DEGRADED MODE
DEGRADED REGIME
DEGREE
DEGREE OF FREEDOM
DEGREE OF PRIVACY
DEGREE OF SECURITY
DEK
DELATED BIT
DELAY
DELAY MEDIUM
DELEGATION
DELETION
DELIBERATE DATA CORRUPTION
DELIBERATE DESTRUCTION
DELIBERATE SUBSTITUTE
DELIBERATE SUBSTITUTION
DELIBERATE UNAUTHORIZED ACCESS
DELINQUENT
DELIVERY
DELIVERY CONFIRMATION
DELIVERY REPUDIATION
DELIVERY TIME
DELTA MODULATION
DELTA MODULATION ENCODER
DELTA SIGMA ANALOGTODIGITAL CONVERSION
DEMAND
DEMANDASSIGNMENT MULTIPLE ACCESS
DEMARC
DEN
DENIAL
DENIAL OF SERVICE ATTACK
DENIAL OF USE OF RESOURCES
DENIALOF SERVICE THREAT
DENIALOFACCESS SECURITY
DENOMINATORS
DENY ACCESS
DENY THE SERVICE
DEP
DEPACKETIZER
DEPARTPENT OF DEFENSE COMPUTER SECURITY CENTER
DEPENDABILITY
DEPENDENCE
DEPTH
DEREGULATION
DERIVATION
DERIVATIVE CLASSIFICATION
DERIVE A KEY
DERIVED KEY
DES
DES ALGORITHM
DES ALGORITHM ENCRYPTION
DES BASED ENCRYPTION SCHEME
DES CHIP
DES CIPHER
DES CRYPTOGRAPHIC EQUIPMENT
DES DEVICE
DES ENCRYPTION
DES KEY
DES PROTECTION
DES TRANSLATION
DESACTIVATION
DESBASED (CRYPTO)SYSTEM
DESBASED (CRYPTO)SYSTEM
DESBASED (EN)CRYPTOR
DESBASED (EN)CRYPTOR
DESBASED AUTHENTICATION
DESBASED CRYPTOGRAPHY
DESBASED CRYPTOR
DESBASED CRYPTOSYSTEM
DESBASED ENCRYPTOR
DESBASED SYSTEM
DESCENDING SEQUENCE
DESCENDING STRING
DESCRAMBLE
DESCRAMBLED
DESCRAMBLED VOICE
DESCRAMBLER
DESCRAMBLING KEY
DESCRIPTIVE MODEL
DESENCRYPTED MESSAGE
DESIGN
DESIGN DOCUMENTATION
DESIGNATED USER
DESIGNATION
DESIGNEDIN
DESIGNER
DESIGNLIMITED SENSITIVITY
DESKTOP MANAGEMENT INTERFACE
DESKTOP MANAGEMENT TASK FORCE
DESKTOP TERMINAL
DESLIKE (CRYPTO)SYSTEM
DESLIKE (CRYPTO)SYSTEM
DESLIKE CRYPTOSYSTEM
DESLIKE SYSTEM
DESTABILIZING COEFFICIENT
DESTABILIZING FACTOR
DESTINATION
DESTINATION CODE
DESTINATION CRYPTOR
DESTINATION DEVICE
DESTINATION KEY
DESTINATION LABEL
DESTINATION NODE
DESTINATION STATION
DESTINEE
DESTROYER
DESTRUCTION
DESTRUCTIVE CODE
DETAPPER
DETECTABLE ALTERATION
DETECTION
DETECTION CAPABILITY
DETECTION SYSTEM
DETECTION ZONE
DETECTIVE COUNTERMEASURES
DETECTOR
DETER EAVESDROPPING
DETERMINATE TRANSFORM
DETERMINATE TRANSFORM(ATION)
DETERMINATE TRANSFORM(ATION)
DETERMINATE TRANSFORMATION
DETERMINATION
DETERMINE KEY
DETERMINED INTERCEPTOR
DETERMINISTIC (CRYPTO)SYSTEM
DETERMINISTIC (CRYPTO)SYSTEM
DETERMINISTIC ALGORITHM
DETERMINISTIC APPROACH
DETERMINISTIC ATTACK
DETERMINISTIC AUTOMATION
DETERMINISTIC COMPLEXITY
DETERMINISTIC CRYPTANALYSIS
DETERMINISTIC CRYPTOSYSTEM
DETERMINISTIC KEY GENERATION
DETERMINISTIC METHOD
DETERMINISTIC PROCESS
DETERMINISTIC SEARCH
DETERMINISTIC SYSTEM
DETERMINISTIC TECHNIQUE
DETERRED KEY CHANGE
DETERRENCE
DETERRENT
DETERRENT EFFECT
DETERRER
DEVELOPMENT CENTER FOR EMBEDDED COMSEC PRODUCTS
DEVELOPMENT CYBERPUNK
DEVICE
DEVICE KEY
DEVICE MASTER KEY
DEVICEDERIVED PASSWORD
DFS
DFT
DFT SCRAMBLER
DH (CRYPTO)SYSTEM
DH (CRYPTO)SYSTEM
DH CRYPTOSYSTEM
DH KEY DISTRIBUTION METHOD
DH KEY DISTRIBUTION TECHNIQUE
DH SYSTEM
DHCP
DIA
DIAGNOSABILITY
DIAGNOSTIC CHECK
DIAGNOSTIC CODE
DIAGNOSTIC EQUIPMENT
DIAGNOSTIC PROCEDURE
DIAGNOSTIC TEST
DIAGRAM
DIAL ACCESS
DIAL PULSE DECODER
DIALACCESS INFORMATION
DIALBACK
DIALBACK CONTROL
DIALBACK DEVICE
DIALBACK MODEM
DIALBACK PROCEDURE
DIALBACK SECURITY
DIALBACK SECURITY SYSTEM
DIALED NUMBER RECORDER
DIALIN
DIALIN SECURITY
DIALOG METHOD
DIALOG TECHNIQUE
DIALTHROUGH ACCESS
DIALUP (TELE)COMMUNICATION
DIALUP (TELE)COMMUNICATION
DIALUP ACCESS
DIALUP BRIDGE/ROUTER
DIALUP CIRCUIT
DIALUP COMMUNICATION
DIALUP COMPUTER TERMINAL
DIALUP MODEM
DIALUP PENETRATION
DIALUP PERSONAL COMPUTER
DIALUP PORT
DIALUP PORT PROTECTION
DIALUP SESSION
DIALUP TELECOMMUNICATION
DIALUP TELEPHONE LINE
DIALUP USER
DIALUP/CALLBACK TECHNIQUE
DICHOTOMIC ALGORITHM
DICHOTOMIZING SEARCH
DICTIONARY
DICTIONARY CRYPTANALYSIS
DICTIONARY SEARCH
DICTIONARYBASED DATA COMPRESSION
DID
DIDDLING
DIFFEHELLMAN KEY EXCHANGE PROTOCOL
DIFFERENCE SETS
DIFFERENTIAL CRYPTANALYSIS
DIFFERENTIAL DELAY
DIFFERENTIAL PULSE CODE MODULATION
DIFFERENTIAL PULSECODE MODULATION
DIFFICULTTOBREAK
DIFFICULTTOGUESS PASSWORD
DIFFIE AND HELLMAN (CRYPTO)SYSTEM
DIFFIE AND HELLMAN (CRYPTO)SYSTEM
DIFFIE AND HELLMAN CRYPTOSYSTEM
DIFFIE AND HELLMAN SYSTEM
DIFFIEHELLMAN KEY DISTRIBUTION METHOD
DIFFIEHELLMAN KEY DISTRIBUTION TECHNIQUE
DIFFIEHELLMEN KEY EXCHANGE
DIFFUSION
DIGEST
DIGIT
DIGIT RATE
DIGITAL (TELE)COMMUNICATION
DIGITAL (TELE)COMMUNICATION
DIGITAL CHANNEL
DIGITAL CIPHERING
DIGITAL CODE
DIGITAL COMMUNICATION
DIGITAL COMPACT CASSETTE
DIGITAL CONVERTER
DIGITAL CORRELATION
DIGITAL CORRELATOR
DIGITAL CREDENTIALS
DIGITAL DATA
DIGITAL DATA COMMUNICATION MESSAGE PROTOCOL
DIGITAL DATA STREAM
DIGITAL DISPLAY MONITOR
DIGITAL DOCUMENT
DIGITAL ENCRYPTION
DIGITAL ENCRYPTION ALGORITHM
DIGITAL ENCRYPTION DEVICE
DIGITAL FILTERING
DIGITAL KEY
DIGITAL KEYBOARD
DIGITAL LINK MANAGEMENT SYSTEM
DIGITAL LOCK
DIGITAL MESSAGE
DIGITAL MICROMIRROR DISPLAY
DIGITAL PSEUDONYM
DIGITAL REPRESENTATION
DIGITAL SCRAMBLER
DIGITAL SEAL
DIGITAL SECURE VOICE TERMINAL
DIGITAL SIGNAL PROCESSING
DIGITAL SIGNAL PROCESSOR
DIGITAL SIGNALPROCESSING CHIP
DIGITAL SIGNATURE
DIGITAL SIGNATURE ACCESS
DIGITAL SIGNATURE ALGORITHM
DIGITAL SIGNATURE ALGORITHM
DIGITAL SIGNATURE SCHEME
DIGITAL SIGNATURE STANDARD
DIGITAL SPEECH CODER
DIGITAL SPEECH INTERPOLATION
DIGITAL TELECOMMUNICATION
DIGITAL VIDEO
DIGITAL VIDEO EDITOR
DIGITAL VOICE
DIGITAL VOICE CHANGER
DIGITAL VOICE ENCRYPTION
DIGITALANALOG CONVERTER
DIGITALLY ENCRYPTED VOICE (TELE)COMMUNICATION
DIGITALLY ENCRYPTED VOICE (TELE)COMMUNICATION
DIGITALLY ENCRYPTED VOICE COMMUNICATION
DIGITALLY ENCRYPTED VOICE TELECOMMUNICATION
DIGITALLY MODULATED SIGNAL
DIGITALLY SIGNED MESSAGE
DIGITALTOANALOG CONVERSION
DIGITIZATION
DIGITIZED SPEECH
DIGITIZED VOICE
DIGITIZED VOICE ENCRYPTION DEVICE
DIGITIZED VOICE SIGNAL
DIGITIZER
DIGITIZING
DIGRAM
DIGRAM FREQUENCY
DIGRAM FREQUENCY CRYPTANALYSIS
DIGRAM SUBSTITUTE
DIGRAM SUBSTITUTION
DIGRAPH
DIGRAPH DISTRIBUTION
DIGRAPH SUBSTITUTE
DIGRAPH SUBSTITUTION
DIGRAPH(IC) SUBSTITUTE
DIGRAPH(IC) SUBSTITUTE
DIGRAPH(IC) SUBSTITUTION
DIGRAPH(IC) SUBSTITUTION
DIGRAPHIC SUBSTITUTE
DIGRAPHIC SUBSTITUTION
DINOME
DIODE NOISE SOURCE
DIOPHANTINE APPROXIMATION
DIP
DIPLOMATIC (TELE)COMMUNICATION
DIPLOMATIC (TELE)COMMUNICATION
DIPLOMATIC COMMUNICATION
DIPLOMATIC INFORMATION
DIPLOMATIC TELECOMMUNICATION
DIPLOMATIC TELECOMMUNICATION SYSTEM
DIRECT AUTHENTICATION
DIRECT CONVERSATION SURVEILLANCE
DIRECT CORRELATION
DIRECT DATA ENTRY
DIRECT DIAL ACCESS
DIRECT EAVESDROPPING
DIRECT ENCRYPTION
DIRECT ENTRY METHOD
DIRECT ENTRY TECHNIQUE
DIRECT INWARD SYSTEM ACCESS
DIRECT LISTENING
DIRECT READ AFTER WRITE
DIRECT SEARCH
DIRECT SEARCH METHOD
DIRECT SEARCH TECHNIQUE
DIRECT USER TO USER ENCRYPTION
DIRECTACCESS METHOD
DIRECTACCESS STORAGE DEVICE
DIRECTACCESS TECHNIQUE
DIRECTCONNECT MODEM
DIRECTCONNECT SESSION
DIRECTED FLOW NETWORK
DIRECTED TREE
DIRECTION
DIRECTIVE
DIRECTORY
DIRECTORY ACCESS PROTOCOL
DIRECTORY EXCHANGE SERVER
DIRECTORY SYSTEM AGENT
DIRTY DATA
DISA
DISABLE
DISABLE THE PROTECTION
DISALLOW ACCESS
DISAMBIGUE
DISASTER
DISASTER PLAN
DISASTER RECOVERY
DISASTER RECOVERY PLAN
DISASTER SITUATION ANALYZER
DISBURSEMENT SYSTEM
DISCARD THE KEY
DISCARDED DATA
DISCERNING
DISCLOSURE
DISCLOSURE OF SENSITIVE INFIRMATION
DISCLOSURE PREVENTION
DISCONTINUOUS FUNCTION
DISCOVERABLE KEY
DISCOVERABLE PASSWORD
DISCREPANCY
DISCRET LOGARITHM
DISCRETE EXPONENTIAL FUNCTION
DISCRETE EXPONENTIATION
DISCRETE EXPONENTIATION PROBLEM
DISCRETE FOURIER TRANSFORM
DISCRETE FOURIER TRANSFORM SCRAMBLER
DISCRETE FOURIER TRANSFORMATION
DISCRETE HOUSING
DISCRETE LOG (CRYPTO)SYSTEM
DISCRETE LOG (CRYPTO)SYSTEM
DISCRETE LOG CRYPTOSYSTEM
DISCRETE LOG PROBLEM
DISCRETE LOG SYSTEM
DISCRETE LOGARITHM
DISCRETE LOGARITHM PROBLEM
DISCRETE REPRESENTATION
DISCRETE SURVEILLANCE
DISCRETE TIME
DISCRETE VARIABLE
DISCRETEEXPONENTIATION (CRYPTO)SYSTEM
DISCRETEEXPONENTIATION (CRYPTO)SYSTEM
DISCRETEEXPONENTIATION CRYPTOSYSTEM
DISCRETEEXPONENTIATION SYSTEM
DISCRETION
DISCRETION ACCESS CONTROL
DISCRETION ACCESS SECURITY
DISCRETIONARY
DISCRETIONARY ACCESS
DISCRETIONARY ACCESS CONTROL
DISCRETIONARY ACCESS CONTROL MECHANISM
DISCRETIONARY PERMISSION
DISCRETIONARY PROTECTION
DISCRETIONARY SECURITY
DISCRETIONARY SECURITY POLICY
DISCRIMINANT
DISESTABLISHING
DISGRUNTLEDEMPLOYEE
DISGUISE INFORMATION
DISGUISED LISTENING
DISGUISED LISTENING DEVICE
DISGUISING
DISHONESTY
DISINCENTIVE PROTECTION
DISK
DISK ARRAY
DISK FAILURE (FAULT) TOLERANCE
DISK FAILURE (FAULT) TOLERANCE
DISK SCAVENGING
DISKETTE ACCESS
DISKETTE BOOT PROTECTION
DISKLOCKING PROGRAM
DISKLOCKING ROUTINE
DISLOYALITY
DISNET
DISORGANIZATION
DISORGANIZED DATA
DISPERSION
DISPERSIVE CHANNEL
DISPLAY
DISPLAY WINDOW
DISPLAYED INFORMATION
DISRUPTER
DISSEMINATION
DISSEMINATION OF INFORMATION
DISSIMILARITY
DISTANCE
DISTONED SIGNAL
DISTORTED MESSAGE
DISTORTIONS
DISTRIBUTED ACCESS
DISTRIBUTED ACCESS CONTROL
DISTRIBUTED ADMINISTRATION OF NETWORK SOFTWARE
DISTRIBUTED APPLICATION ENVIRONMENT
DISTRIBUTED COMPUTING ENVIRONMENT
DISTRIBUTED COMPUTING ENVIRONMENT
DISTRIBUTED DATA COMMUNICATIONS SERVER
DISTRIBUTED DATA MANAGEMENT
DISTRIBUTED DATA PROCESSING
DISTRIBUTED DATABASE
DISTRIBUTED DATABASE MANAGEMENT SYSTEM
DISTRIBUTED ENTERPRISE MANAGEMENT ARCHITECTURE
DISTRIBUTED FILE SERVICES (SYSTEM)
DISTRIBUTED FILE SERVICES (SYSTEM)
DISTRIBUTED KEY GENERATION
DISTRIBUTED KEY LOADING
DISTRIBUTED KEY MANAGEMENT
DISTRIBUTED MANAGEMENT ENVIRONMENT
DISTRIBUTED NETWORK
DISTRIBUTED OBJECT ENVIRONMENT
DISTRIBUTED OBJECT MANAGEMENT SYSTEM
DISTRIBUTED PARALLEL PROCESSING
DISTRIBUTED PROCESSING SYSTEM
DISTRIBUTED PROTECTION MECHANISM
DISTRIBUTED RELATIONAL DATABASE ARCHITECTURE
DISTRIBUTED SYSTEM
DISTRIBUTED SYSTEM OBJECT MODEL
DISTRIBUTED TRANSACTION PROCESSING
DISTRIBUTION
DISTRIBUTION DIAGRAM
DISTRIBUTION FUNCTION
DISTRIBUTION KEY
DISTRIBUTION LISTS
DIVERSITY
DIVIDE AND CONQUER ATTACK
DIVISOR
DK
DK
DK TRANSFORM
DK TRANSFORM(ATION)
DK TRANSFORM(ATION)
DK TRANSFORMATION
DL
DL PROBLEM
DLCI
DLCP
DLE
DLL
DLMS
DLP
DLSW
DMD
DME
DMI
DMS
DMTF
DNS
DOAPI
DOB EVALUATION CRITERIA
DOCTORED INFORMATION
DOCTORED MESSAGE
DOCUMENT
DOCUMENT (TELE)COMMUNICATION
DOCUMENT (TELE)COMMUNICATION
DOCUMENT AND IMAGE PROCESSING
DOCUMENT COMMUNICATION
DOCUMENT COMPOSITION FACILITIES
DOCUMENT DESTRUCTION
DOCUMENT ENABLED NETWORKING
DOCUMENT HOLDER
DOCUMENT INTERCHANGE FACILITIES
DOCUMENT KEY
DOCUMENT MANAGEMENT SERVICE (SYSTEM)
DOCUMENT MANAGEMENT SERVICE (SYSTEM)
DOCUMENT PROCESSING SYSTEM
DOCUMENT READER
DOCUMENT SCANNER
DOCUMENT SECURITY
DOCUMENT TAMPERING
DOCUMENT TELECOMMUNICATION
DOCUMENT TRANSFER
DOCUMENTARY ANALYSIS
DOCUMENTARY INFORMATION
DOCUMENTATION
DOCUMENTING
DODCSC
DOE
DOMAIN
DOMAIN CONTROL DATABASE
DOMAIN NAME SYSTEM (SERVICE)
DOMAIN NAME SYSTEM (SERVICE)
DOMAIN OF AUTHORIZATION
DOMAIN TRANSFORM CIPHERING
DOMESTIC ALARM SYSTEM
DOMESTIQUE EAVESDROPPER
DOMINANCE
DOMINANCE RELATION
DOMINATE
DOMINATES RELATION
DOMINATING LEVEL
DOMS
DONGLE
DOOR
DOS OPEN API
DOS PROTECTED MODE INTERFACE
DOT CIPHER
DOUBLE ENCRYPTED DATA
DOUBLE ENCRYPTED MESSAGE
DOUBLE ENCRYPTION
DOUBLE KEY
DOUBLE KEY ENCRYPTION
DOUBLE LENGTH KEY
DOUBLE SCRAMBLING
DOUBLE TRANSFORM
DOUBLE TRANSFORM(ATION)
DOUBLE TRANSFORM(ATION)
DOUBLE TRANSFORMATION
DOUBLE TRANSPOSITION
DOUBLE TRANSPOSITION ALGORITHM
DOUBLE TRANSPOSITION CIPHER
DOUBLEKEY ALGORITHM
DOUBLESIDED DOUBLEDENSITY
DOUBLESIDED SINGLEDENSITY
DOUBLET
DOWN FREQUENCY HOPPING
DOWN TIME
DOWNGRADE
DOWNGRADER
DOWNGRADING
DOWNLINELOADED KEY
DOWNLINK
DOWNLINK CHANNEL
DOWNLOAD
DOWNLOAD THE KEY
DOWPLINE KEY LOADING
DPCM
DPM
DPMI
DPP
DPS
DRAM
DRAW
DRDA
DROLLING CODE
DROPCUB
DROPIN LINK (EN)CRYPTOR
DROPIN LINK (EN)CRYPTOR
DROPIN LINK CRYPTOR
DROPIN LINK ENCRYPTOR
DROPIN MICRO
DROPIN MICRO(PHONE)
DROPIN MICRO(PHONE)
DROPIN MICROPHONE
DROPIN MIKE
DROPIN TELEPHONE BUG
DSA
DSCR
DSD
DSDD
DSG
DSNET
DSOM
DSP
DSP CHIP
DSR
DSS
DSSD
DSVT
DTP
DTR
DUAL ATTACHMENT STATION
DUAL AUTHENTICATION
DUAL CUSTODY RULE
DUAL KEY ALGORITHM
DUAL LEG BINARY SEQUENCE
DUAL LEG BINARY STREAM
DUAL LEG BINARY STRING
DUAL PHYSICALKEY ACCESS
DUAL PROCESSOR MODE
DUALINLINE PACKAGE
DUALKEY ENCRYPTION
DUALKEY SCHEME
DUALLEVEL TRANSMISSION
DUMMY ENTRY
DUMMY MESSAGE
DUMMY MESSAGE TRAFFIC
DUMMY PADDING
DUMMY SPECTRUM
DUMMY TRAFFIC
DUMMY.VARIABLE
1
2
T: 209