Словари
Англо-русский словарь по компьютерной безопасности
Слова
Поиск
Слова на "I" в Англо-русском словаре по компьютерной безопасности
(
2
И
П
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Все
IA
IB
IC
ID
IE
IH
II
IL
IM
IN
IO
IP
IR
IS
IT
IV
Список всех слов на букву I
Англо-русский словарь по компьютерной безопасности содержит 807 слов на букву I
Слова, начинающиеся на букву I
IACCI
IACR
IBN
IC CARD
ICDA
ICFA
ICI
ICON
ICTS
ICV
ID
ID CARD
IDAPI
IDDE
IDEA
IDEMPOTENT
IDEMPOTENT ELEMENT
IDEMPOTENT POLINOMIAL
IDENTIFIABLE
IDENTIFIABLE ATTRIBUTE
IDENTIFIABLE ENVIRONMENT
IDENTIFICATION
IDENTIFICATION BADGE
IDENTIFICATION CARD WITH CRYPTOGRAPHIC PROTECTION
IDENTIFICATION CHARACTER
IDENTIFICATION CHARACTERISTIC
IDENTIFICATION CODE
IDENTIFICATION FACILITIES
IDENTIFICATION INFORMATION
IDENTIFICATION MARK
IDENTIFICATION NUMBER
IDENTIFICATION PROCEDURE
IDENTIFICATION SIGN
IDENTIFICATION SIGNAL
IDENTIFICATION SYMBOL
IDENTIFICATION TABLE
IDENTIFICATION TOKEN
IDENTIFICATION WORD
IDENTIFICATION/VERIFICATION MECHANISM
IDENTIFICATOR DESACTIVATION
IDENTIFIER
IDENTIFIER KEY
IDENTIFIER WORD
IDENTIFY
IDENTIFY THE KEY
IDENTIFYEE
IDENTIFYING ATTRIBUTE
IDENTIFYING CARD
IDENTIFYING DEVICE
IDENTIFYING EVIDENCE
IDENTITY
IDENTITY CARD
IDENTITY CHECK
IDENTITY INTERCEPT
IDENTITY INTERCEPT(ION)
IDENTITY INTERCEPT(ION)
IDENTITY INTERCEPTION
IDENTITY KEY
IDENTITY PAPER
IDENTITY PRINT OUT
IDENTITY PROOFING
IDENTITY REQUEST
IDENTITY TOKEN
IDENTITY VERIFICATION
IDENTITY VERIFICATION PROCEDURE
IDENTITYBASED
IDENTITYBASED (CRYPTO)SYSTEM
IDENTITYBASED (CRYPTO)SYSTEM
IDENTITYBASED ACCESS CONTROL
IDENTITYBASED CRYPTOSYSTEM
IDENTITYBASED PROTOCOL
IDENTITYBASED SECURITY POLICY
IDENTITYBASED SIGNATURE SCHEME
IDENTITYBASED SYSTEM
IDIOMORPH
IDL
IDLE BIT
IDLE MODE
IDLE REGIME
IDMS
IDS
IEN
IETF
IH
IIR FILTER
ILE
ILLEGAL ACCESS
ILLEGAL CODE
ILLEGAL COMMAND
ILLEGAL COPYING
ILLEGAL ENTRY
ILLEGAL MANIPULATION
ILLEGAL NETWORK MONITOR
ILLEGAL OPERATION
ILLEGAL PASSWORD
ILLEGAL REQUEST
ILLEGAL TERMINAL
ILLEGAL USE
ILLEGALITY
ILLEGALLY COPIED SOFTWARE
ILLEGITIMATE MESSAGE
ILLICIT ACCESS
ILLICIT COMMUNICATION PATH
ILLICIT COPYING
ILLICIT INFORMATION
ILLICIT INTERCEPT
ILLICIT INTERCEPT(ION)
ILLICIT INTERCEPT(ION)
ILLICIT INTERCEPTION
ILLICIT TRANSMITTER
ILLICIT USE
ILLUMINATOR
ILMI
IMAC
IMAGE
IMAGE PROCESSING
IMAGE PROCESSING SYSTEM
IMAGE PROCESSOR
IMAGE SEGMENTATION
IMAGE SENSOR
IMAGERY
IMAGERY ANALYSIS
IMAGERY INFORMATION
IMAGERY INTELLIGENCE
IMAGING
IMAP
IMINT
IMITATE
IMITATIVE (TELE)COMMUNICATION
IMITATIVE (TELE)COMMUNICATION
IMITATIVE COMMUNICATION
IMITATIVE TELECOMMUNICATION
IMMITATIVE COMMUNICATION DECEPTION
IMMUNE TO CRYPTOANALYSIS CRYPTOSYSTEM
IMMUNE TO CRYPTOANALYSIS SYSTEM
IMMUNE TO EAVESDROPPING
IMMUNITY
IMMUNITY FROM EAVESDROPPING
IMMUNIZATION
IMMUTABLE CODE
IMPARTIAL THIRDPARTY
IMPASSE
IMPEDIMENT
IMPERSONATE
IMPERSONATE THE TRANSMITTER
IMPERSONATE THE USER
IMPERSONATION
IMPERSONATION ATTACK
IMPERSONATOR
IMPERVIOUS PROTECTION
IMPLANTED CODE
IMPLANTER
IMPLEMENT SECURITY
IMPLEMENTATION
IMPLEMENTATION OF ALGORITHM
IMPLEMENTATION OF SECURITY PROGRAM
IMPLICIT
IMPORTATION
IMPOSE RESTRICTION
IMPOSSIBLE TO DENY SIGNATURE
IMPOSTOR
IMPOSTOR ACCEPTANCE
IMPOSTOR TERMINAL
IMPRESSION
IMPREVIOUS
IMPRINT
IMPROPER ACCESS
IMPROPER ACTIVITY
IMPROPER CODE
IMPROPER DISCLOSURE
IMPROPER ENCRYPTION
IMPULSE NOISE
IMPUNITY
IMR
IMS
IN
IN CIPHER
IN THE BLACK
INACCESSIBLE
INACCESSIBLE AREA
INADEQUATE CONTROL
INADEQUATE SECURITY
INADVERTENT ACCESS
INADVERTENT ALARM
INADVERTENT DISCLOSURE
INADVERTENT EMISSION
INADVERTENT MODIFICATION
INADVERTENT THREAT
INBUILT
INCIDENCE MATRIX
INCIDENT
INCIDENT RESPONSE
INCIRCUIT ENCRYPTION DEVICE
INCOMING MESSAGE
INCOMING RADIATION
INCOMING USER
INCOMPATIBILITY
INCOMPLETE BLOCK
INCOMPLETE DATA
INCOMPLETE INFORMATION
INCOMPREHENSIBLE
INCONSISTENCE
INCONTESTABLE
INCORRECT INPUT
INCORRECT PASSWORD
INCREASING SEQUENCE
INCREASING STRING
INCREMENTAL CODER
INDECIPHERABLE
INDECIPHERABLE (CRYPTO)SYSTEM
INDECIPHERABLE (CRYPTO)SYSTEM
INDECIPHERABLE CIPHERTEXT
INDECIPHERABLE CIPHPERTEXT
INDECIPHERABLE CRYPTOGRAM
INDECIPHERABLE CRYPTOSYSTEM
INDECIPHERABLE SYSTEM
INDELIBLE
INDEPENDENT CRITERIA
INDEPENDENT SOFTWARE VENDOR
INDEPENDENT UNIT
INDEX
INDEXED SEQUENTIAL ACCESS METHOD
INDEXING
INDICATOR
INDIRECT AUTHENTICATION
INDIRECT DISCLOSURE PROTECTION
INDIRECT EAVESDROPPING
INDIRECT ENCRYPTION
INDIRECT ENTRY
INDISCRIMINATED ACCESS
INDIVIDUAL
INDIVIDUAL ACCOUNTABILITY
INDIVIDUAL ACCOUNTING
INDIVIDUAL DATA
INDIVIDUAL PASSWORD
INDIVIDUALLY NUMBERED KEY
INDIVISIBLE PRIME
INDOCTRINATION
INDOOR SENSOR
INDUCTION INTERCEPT
INDUCTION INTERCEPT(ION)
INDUCTION INTERCEPT(ION)
INDUCTION INTERCEPTION
INDUCTIVE DEVICE
INDUCTIVE TAP
INDUCTIVE TAP(PING)
INDUCTIVE TAP(PING)
INDUCTIVE TAPPING
INDUSTRIAL EAVESDROPPER
INDUSTRIAL ESPIONAGE
INDUSTRIAL PRIVACY LEVEL
INDUSTRIAL SPYING
INDUSTRY STANDARD ARCHITECTURE
INFALLIBILITY
INFEASIBILITY
INFEASIBLE
INFECTED FILE
INFECTED SYSTEM
INFECTION
INFECTION DETECTION
INFECTOR
INFERENCE
INFERENCE CONTROL
INFERENCE CRYPTANALYSIS
INFERIOR ENCRYPTION
INFILTRATE
INFILTRATION
INFINITE IMPULSE RESPONSE FILTER
INFINITE SEQUENCE
INFINITE STRING
INFINITY BUG
INFORMATICS
INFORMATION
INFORMATION ACCESS
INFORMATION ADDRESSING
INFORMATION AGENT
INFORMATION AGING
INFORMATION ANALYSIS
INFORMATION BIT
INFORMATION CAPACITY
INFORMATION CARRIER
INFORMATION CATEGORIZATION
INFORMATION CHARACTER
INFORMATION CLASSIFICATION LEVEL
INFORMATION COMPROMISE
INFORMATION CONFIDENTIALITY
INFORMATION CONTAMINATION
INFORMATION CONTENT
INFORMATION DATA
INFORMATION DATABASE
INFORMATION DEDUCTION
INFORMATION DESTRUCTION
INFORMATION DISCLOSURE
INFORMATION DISTRIBUTION CHANNEL
INFORMATION DUPLICATION
INFORMATION EXTRACTION
INFORMATION EXTRACTION SYSTEM
INFORMATION FACILITIES
INFORMATION FIELD
INFORMATION FLOW
INFORMATION FLOW ANALYSIS
INFORMATION FLOW CONTROL
INFORMATION FLOW MODEL
INFORMATION FORMAT
INFORMATION FRAGMENTATION
INFORMATION FRAME
INFORMATION FRAMEWORK
INFORMATION GRANULARITY
INFORMATION HANDLING UNIT
INFORMATION HIDING
INFORMATION HIGHWAY
INFORMATION INTEGER
INFORMATION LEAK
INFORMATION LEAKAGE
INFORMATION LOSS
INFORMATION MANAGEMENT SYSTEM
INFORMATION NETWORK
INFORMATION NOISE
INFORMATION OBJECT
INFORMATION PRIVACY
INFORMATION PRIVACY PROTECTION
INFORMATION PROCESSING
INFORMATION PROCESSING ENVIRONMENT
INFORMATION PROCESSING SYSTEM
INFORMATION PROCESSOR
INFORMATION PROTECTION MANAGEMENT
INFORMATION PROTECTION SYSTEM
INFORMATION RATE
INFORMATION RECOVERY
INFORMATION REDUNDANCE
INFORMATION RELEASE
INFORMATION RESOURCE
INFORMATION RETRIEVAL
INFORMATION RETRIEVAL SYSTEM
INFORMATION SECURITY
INFORMATION SECURITY ADMINISTRATOR
INFORMATION SECURITY MODULE
INFORMATION SECURITY PRODUCT
INFORMATION SECURITY RISK
INFORMATION SEQUENCE
INFORMATION SERVICE
INFORMATION SPYING
INFORMATION STORAGE AND RETRIEVAL
INFORMATION STRING
INFORMATION SUBJECT
INFORMATION SYMBOL
INFORMATION SYSTEM VENDOR
INFORMATION SYSTEMS SECURITY ASSOCIATION
INFORMATION TECHNOLOGY SECURITY EVALUATION CRITERIA
INFORMATION THEORETIC
INFORMATION THEORETIC CRYPTOGRAPHY
INFORMATION THIEVERY
INFORMATION TRANSFER
INFORMATION TRANSFER PATH
INFORMATION VALUE
INFORMATION WARFARE
INFORMATIONBASED COMPLEXITY
INFORMATIONBEARING EMISSION
INFORMATIONBEARING FREQUENCY
INFORMATIONBEARING SIGNAL
INFORMATIONHIDING
INFORMATIONPROCESSING EQUIPMENT
INFORMATIONSURFER
INFORMATIONTHEORETIC APPROACH
INFORMATIONTHEORETIC SECURITY
INFOSECURITY
INFRACTION
INFRARED ALARM
INFRARED CAMERA
INFRARED FENCE
INFRARED ILLUMINATOR
INFRINGE COPYRIGHT
INFRINGEMENT
INHERENT KEY
INHERENT SECURITY
INHERENT SOFTWARE PROTECTION
INHIBIT
INHIBIT MECHANISM
INITIAL CODE
INITIAL CONDITION
INITIAL CONTENT
INITIAL FILL
INITIAL FILL VECTOR
INITIAL KEY
INITIAL LOADING
INITIAL PERMUTATION
INITIAL SETTING
INITIAL STATE
INITIAL VALUE
INITIALISING SYNCHRONIZATION
INITIALISING VALUE
INITIALIZATION
INITIALIZATION SEQUENCE
INITIALIZATION SIGNAL
INITIALIZATION STRING
INITIALIZATION TIME
INITIALIZATION VARIABLE
INITIALIZING KEY VARIABLE ENTRY
INITIALIZING VECTOR
INITIATING VECTOR
INITIATION
INITISLIZSTION PROCEDURE
INITLALISING VARIABLE
INJECTED MESSAGE
INJECTION
INJECTION OF INFORMATION
INJECTOR
INJOOR SCANNER
INK
INLINE (EN)CRYPTOR
INLINE (EN)CRYPTOR
INLINE CRYPTOGRAPHY CONFIGURATION
INLINE CRYPTOR
INLINE ENCRYPTOR
INM
INPENETRABILITY
INPROPER DISCLOSURE
INPUT
INPUT DEVICE
INPUT INFORMATION
INPUT LEVEL
INPUT MESSAGE
INPUT VARIABLE
INPUT/OUTPUT FACILITIES
INPUTOUTPUT ISOLATION
INPUTOUTPUT REGISTER
INQUIRYRESPONSE SYSTEM
INSCRIPTION
INSECURE CHANNEL
INSECURE ENVIRONMENT
INSECURE SOFTWARE
INSECURITY
INSERT THE KEY
INSERTED KEY
INSERTED MESSAGE
INSERTION
INSERTION CARD
INSIDE PERIMETER
INSIDER
INSIDER INFORMATION
INSIDER THREAT
INSOLUBILITY
INSPECTION
INSPECTION BODY
INSTALL THE KEY
INSTALLATION
INSTALLATION SECURITY
INSTALLATOR
INSTALLED KEY
INSTANTANEOUS ENCIPHERER
INSTANTIATION
INSULATION
INSURE SECRECY
INSURE THE SECURITY
INTEGER
INTEGER (EN)CRYPTOR
INTEGER (EN)CRYPTOR
INTEGER ARITHMETIC
INTEGER CRYPTOR
INTEGER ENCRYPTOR
INTEGER MODULE
INTEGER REPRESENTATION
INTEGRAL SHIELDING
INTEGRATED APPROACH
INTEGRATED BRANCH NODE
INTEGRATED BUSINESS NETWORK
INTEGRATED CASHED DISK ARRAY
INTEGRATED CIRCCUIT CARD
INTEGRATED CIRCUIT CARD
INTEGRATED DATA MANAGEMENT SYSTEM
INTEGRATED DATABASE APPLICATION PROGRAM INTERFACE
INTEGRATED DEVELOPMENT AND DEBUGGING ENVIRONMENT
INTEGRATED ENTERPRISE NETWORK
INTEGRATED LANGUAGE ENVIRONMENT
INTEGRATED MODEM
INTEGRATED MULTIPORT REPEATER
INTEGRATED OFFICE SYSTEM
INTEGRATED PROTECTION
INTEGRATED SECURITY
INTEGRATED SECURITY SYSTEM
INTEGRATED SERVICES DIGITAL NETWORK
INTEGRATEJ SECURITY SYSTEM
INTEGRATION OF MANAGEMENT SYSTEMS
INTEGRITY ASSURANCE ROUTINE
INTEGRITY ATTACK
INTEGRITY CHECK
INTEGRITY CHECK VALUE
INTEGRITY CHECK VECTOR
INTEGRITY CHECK(ING)
INTEGRITY CHECK(ING)
INTEGRITY CHECKING
INTEGRITY CONTROL
INTEGRITY INTEGER
INTEGRITY LEVEL
INTEGRITY MAINTENANCE
INTEGRITY MECHANISM
INTEGRITY MODEL
INTEGRITY VIOLATION
INTEGRITYBASED SECURITY
INTEGRITYPROTECTED MESSAGE
INTEGRITYSENSITIVE DATA
INTELLECTUAL NETWORK
INTELLECTUAL PROPERTY
INTELLECTUAL PROPERTY PROTECTION
INTELLIGENCE
INTELLIGENCE (TELE)COMMUNICATION
INTELLIGENCE (TELE)COMMUNICATION
INTELLIGENCE BEARING SIGNAL
INTELLIGENCE BIT
INTELLIGENCE COMMUNICATION
INTELLIGENCE GATHERING
INTELLIGENCE HARDWARE
INTELLIGENCE INFORMATION
INTELLIGENCE INFORMATION ANALYSIS
INTELLIGENCE OPERATION
INTELLIGENCE RECEIVER
INTELLIGENCE SERVICE
INTELLIGENCE TELECOMMUNICATION
INTELLIGENCE TELEPHONE
INTELLIGENCEGATHERING NETWORK
INTELLIGENT CARD
INTELLIGENT DEVICE
INTELLIGENT INFORMATION
INTELLIGENT MODULE
INTELLIGENT NETWORK
INTELLIGENT TERMINAL
INTELLIGENT TOKEN
INTELLIGENT WORKSTATION
INTELLIGIBILITY
INTELLIGIBLE DATA
INTELLIGIBLE INFORMATION
INTELLLGIBLLLY TEST
INTELPOST
INTENDED DESTINATION
INTENDED FUNCTION
INTENDED RECEIVER
INTENTIONAL ACTION
INTENTIONAL ACTIVITY
INTENTIONAL DISCLOSURE
INTENTIONAL EAVESDROPPING
INTENTIONAL FAILURE
INTENTIONAL INFILTRATION
INTENTIONAL THREAT
INTENTIONALLY ALTERED TEXT
INTERACTION
INTERACTIVE (TELE)COMMUNICATION
INTERACTIVE (TELE)COMMUNICATION
INTERACTIVE ACCESS
INTERACTIVE CHALLENGERESPONSE PROTOCOL
INTERACTIVE COMMUNICATION
INTERACTIVE ID
INTERACTIVE IDENTIFICATION
INTERACTIVE KEY DISTRIBUTION
INTERACTIVE MAIL ACCESS PROTOCOL
INTERACTIVE MODE
INTERACTIVE PROCEDURE
INTERACTIVE PROOFING
INTERACTIVE REGIME
INTERACTIVE TELECOMMUNICATION
INTERACTIVE TERMINAL
INTERBIT DEPENDENCE
INTERBLOCK SPACE
INTERCARRIER INTERFACE
INTERCEPT
INTERCEPT INFORMATION
INTERCEPT OPERATOR
INTERCEPT RECEIVER
INTERCEPTABILITY
INTERCEPTED CIPHERTEXT
INTERCEPTED CIPHPERTEXT
INTERCEPTED CONVERSATION
INTERCEPTED CRYPTOGRAM
INTERCEPTED MESSAGE
INTERCEPTING EQUIPMENT
INTERCEPTING STATION
INTERCEPTION
INTERCEPTION SECURITY
INTERCEPTION SYSTEM
INTERCEPTION VULNERABILITY
INTERCEPTOR
INTERCHANGE
INTERCHANGE CONFIDENTIALITY
INTERCHANGE KEY
INTERCHANGE PROTECTION
INTERCHANNEL ISOLATION
INTERCITY TELECOMMUNICATIONS SYSTEM
INTERCOM
INTERCONNECTION MODEL
INTERENCLOSURE (TELE)COMMUNICATION
INTERENCLOSURE (TELE)COMMUNICATION
INTERENCLOSURE COMMUNICATION
INTERENCLOSURE TELECOMMUNICATION
INTERESTED PARTY
INTERFACE
INTERFACE DEFINITION LANGUAGE
INTERFACE DEVICE
INTERFACE MODULE
INTERFACE UNIT
INTERFERENCE CANCELLATION
INTERFERENCEFREE LINK
INTERIM LOCAL MANAGEMENT INTERFACE
INTERIOR ACTIVATED BARRIER
INTERIOR SENSOR
INTERLEAVING
INTERLEAVING CODE
INTERLEVEL INTERCOM
INTERLOCK
INTERLOCK CODE
INTERLOCK SWITCH
INTERLOPER
INTERMEDIATE KEY
INTERNAL HACKING
INTERNAL INFORMATION
INTERNAL JUMPERING
INTERNAL KEY
INTERNAL MANIPULATION
INTERNAL MODEM
INTERNAL SAFEGUARD
INTERNAL SECURITY CONTROLS
INTERNAL SELFTEST
INTERNAL VULNERABILITY
INTERNALLY GENERATED KEY
INTERNATIONAL ACCESS
INTERNATIONAL ASSOCIATION FOR CRYPTOLOGIC RESEARCH
INTERNATIONAL ASSOCIATION OF COMPUTER CRIME INVESTIGATORS
INTERNATIONAL COMPUTER FACSIMILE ASSOCIATION
INTERNATIONAL DATA ENCRYPTION ALGONTHM
INTERNATIONAL ELECTRONIC POST
INTERNATIONAL ENCRYPTION ALGORITHM
INTERNATIONAL ORGANIZATION FOR STANDARTIZATION OPENSYSTEMS INTERCONNECTION MODEL
INTERNET ENGINEERING TASK FORCE
INTERNET NETWORK MANAGEMENT
INTERNET PROTOCOL
INTERNET SERVICE PROVIDER
INTERNETWORK MAIL
INTERNETWORK PACKET EXCHANGE
INTERNETWORK PROTOCOL
INTERNETWORK ROUTING
INTERNETWORKING
INTEROPERABILITY
INTERORGANIZATION NETWORK
INTERPOLATING POLINOMIAL
INTERPOLATION
INTERPRET INFORMATION
INTERPRETER
INTERPROCESS MESSAGE
INTERROGATING REQUEST
INTERRUPTION
INTERRUPTION OF TRANSMISSION
INTERRUPTION REQUEST
INTERSILLABIC CONTENT OF SPEACH
INTERSYMBOL CORRELATION
INTERSYMBOL DEPENDENCE
INTERUSER KEY
INTERUSER PROTOCOL
INTERVAL
INTERVENTION
INTHECLEAR (TELE)COMMUNICATION
INTHECLEAR (TELE)COMMUNICATION
INTHECLEAR COMMUNICATION
INTHECLEAR MESSAGE
INTHECLEAR TELECOMMUNICATION
INTRACTABILITY
INTRACTABLE
INTRACTABLE (CRYPTO)SYSTEM
INTRACTABLE (CRYPTO)SYSTEM
INTRACTABLE COMPUTATIONAL COMPLEXITY
INTRACTABLE CRYPTOSYSTEM
INTRACTABLE PROBLEM
INTRACTABLE SYSTEM
INTRANET PROTOCOL
INTRANETWORK ROUTING
INTRANETWORK SECURITY
INTRINSIC CODING
INTRINSIC ID
INTRINSIC IDENTIFIER
INTRINSICALLY SAFE
INTRODUCE REDUNDANCE
INTRUDER
INTRUDER ALARM
INTRUDER ALARM DEVICE
INTRUDER DETECTION PROBABILITY
INTRUDER DETECTION SYSTEM
INTRUDER DETECTOR
INTRUDER PROTECTION SYSTEM
INTRUDER RESISTANT
INTRUDER TARGET
INTRUDER TOLERANT
INTRUDERPROOF SYSTEM
INTRUSION ALARM
INTRUSION ALARM PROXIMITY DEVICE
INTRUSION ALARM SYSTEM
INTRUSION AVOIDANCE
INTRUSION DELAY
INTRUSION DETECTION
INTRUSION DETECTION SENSOR
INTRUSION DETECTOR
INTRUSION GROUP
INTRUSION PREVENTION
INTRUSIONRESISTANT COMMUNICATION CABLE
INTRUSIONTOLERANT ARCHITECTURE
INVALID
INVALID ATTEMPT
INVALID CODE
INVALID DESTINATION
INVALID PASSWORD
INVALID SIGNON
INVALID USER ID
INVALID USER IDENTIFIER
INVALIDATE ATTACK
INVALIDATION BIT
INVARIANT PROPERTY
INVARIANT RELATION
INVASIVE TAP
INVASIVE TAP(PING)
INVASIVE TAP(PING)
INVASIVE TAPPING
INVERSE
INVERSE CORRELATION
INVERSE FUNCTION
INVERSE KEY
INVERSE KEYS
INVERSE MAPPING
INVERSE MATRIX
INVERSE OPERATION
INVERSE PROCESS
INVERSE SUBSTITUTE
INVERSE SUBSTITUTION
INVERSE TRANSFORM
INVERSE TRANSFORM METHOD
INVERSE TRANSFORM TECHNIQUE
INVERSE TRANSFORMATION
INVERSE VALUE
INVERSION
INVERSION FREQUENCY
INVERTED FREQUENCY
INVERTED SEQUENCE
INVERTED SIGNAL
INVERTED SPEECH
INVERTED SPEECH SPECTRUM
INVERTED STRING
INVERTER
INVERTIBLE FUNCTION
INVERTIBLE MAPPING
INVERTIBLE SUBSTITUTE
INVERTIBLE SUBSTITUTION
INVERTIBLE TRANSFORM
INVERTIBLE TRANSFORM(ATION)
INVERTIBLE TRANSFORM(ATION)
INVERTIBLE TRANSFORMATION
INVESTIGATION
INVIOLABILITY
INVISIBLE INK
INVOLUTE CIPHER
INVOLUTION
INVOLUTORY TRANSFORM
INVOLUTORY TRANSFORM(ATION)
INVOLUTORY TRANSFORM(ATION)
INVOLUTORY TRANSFORMATION
INVULNERABILITY
IOS
IP
IPS
IPX
IRQ
IRREDUCIBLE POLINOMIAL
IRREDUCTIBILITY
IRREFUTABLE PROOFING
IRRETRIEVABLE DATA LOSS
IRREVERSIBLE CIPHER
IRREVERSIBLE ENCRYPTION
IRREVERSIBLE FUNCTION
IRREVERSIBLE PROCESS
IRREVERSIBLE SCRAMBLING
IRREVERSIBLE TRANSFORM
IRREVERSIBLE TRANSFORM(ATION)
IRREVERSIBLE TRANSFORM(ATION)
IRREVERSIBLE TRANSFORMATION
IRS
ISA
ISAM
ISDN
ISDN MEDIA ACCESS CONTROL
ISO CODE
ISOLATION
ISOLOGS
ISP
ISR
ISSA
ISSUE
ISSUER
ISSUER'S KEY
ISV
ITEM
ITERATED (CRYPTO)SYSTEM
ITERATED (CRYPTO)SYSTEM
ITERATED CRYPTOSYSTEM
ITERATED SYSTEM
ITERATION CRYPTANALYSIS
ITERATIVE PROCESS
ITERATIVE SCRAMBLING TECHNIQUE
ITERATIVE TRANSFORM
ITERATIVE TRANSFORM(ATION)
ITERATIVE TRANSFORM(ATION)
ITERATIVE TRANSFORMATION
ITSEC
IV
T: 151