Словари
Англо-русский словарь по компьютерной безопасности
Слова
Поиск
Слова на "L" в Англо-русском словаре по компьютерной безопасности
(
2
И
П
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Все
LA
LE
LF
LI
LL
LM
LN
LO
LP
LQ
LR
LS
LU
LV
Список всех слов на букву L
Англо-русский словарь по компьютерной безопасности содержит 402 слова на букву L
Слова, начинающиеся на букву L
LABEL
LABEL ASSIGNEMENT
LABELBASED CONTROL
LABELED SECURITY PROTECTION
LABELLED INFORMATION
LABELLED MESSAGE
LABELLED OUTPUT
LABELLING
LAG TIME
LAGRANGE INTERPOLATING POLINOMIAL
LAGRANGE INTERPOLATION FORMULA
LAGRANGE MULTIPLIER
LAN ACCESS UNIT
LAN NETWORK MANAGER
LAN OUTER NETWORK
LANGUAGE
LANGUAGE REDUNDANCE
LANSEC
LAP
LAPM
LARCENY
LARGE INTEGER FACTORIZATION
LARGE LINEAR COMPLEXITY SEQUENCE
LARGE LINEAR COMPLEXITY STRING
LARGEINTEGER ARITHMETIC
LARGEVOLUME (TELE)COMMUNICATION
LARGEVOLUME (TELE)COMMUNICATION
LARGEVOLUME COMMUNICATION
LARGEVOLUME TELECOMMUNICATION
LASER AUDIO WINDOW INTERCEPTOR
LASER BUG
LASER CARD
LASER EAVESDROPPING
LASER LISTENING SYSTEM
LASER MICRO
LASER MICRO(PHONE)
LASER MICRO(PHONE)
LASER MICROPHONE
LASER MIKE
LASER MONITORING SYSTEM
LASER SCANNER
LASER WINDOW SCANNER
LAST (LEAST) RECENTLY USED
LAST (LEAST) RECENTLY USED
LAT
LATA
LATE ENTRY IN COMMUNICATION
LATENCY
LATENT REPETITION
LATTICE REDUCTION
LATTICE SECURITY MODEL
LAU
LAW
LAW ENFORCEMENT AGENCY
LAW ENFORCEMENT PERSONNEL
LAW OF LARGE NUMBERS
LAWBREAKER
LAWFUL USER
LAWN
LAWSUIT
LAX SECURITY
LAY SIGNATURE
LAYER
LAYERED NETWORKING PROTOCOL
LAYERWISE AUTHENTICATION
LAYOUT
LEAF
LEAK
LEAKAGE
LEAKAGE CHANNEL
LEAKAGE PATH
LEAKAGE PREVENTION
LEAKAGE RADIATION
LEAKED INFORMATION
LEAKER
LEAKPROOF
LEAST ACCESS
LEAST CLEARANCE
LEAST FAVORABLE CASE
LEAST POSSSIBLE PRIVILEGE
LEAST PRIVILEGE
LEAST PRIVILEGE PRINCIPLE
LEAST SIGNIFICANT BIT
LEAST SQUARE ESTIMATION
LEASTCLEARED USER
LEC
LED
LEGAL MESSAGE
LEGAL PROTECTION
LEGAL SECURITY MEASURES
LEGALITY CHECKING
LEGENDRE SYMBOL
LEGISLATION
LEGITIMATE (TELE)COMMUNICATION
LEGITIMATE (TELE)COMMUNICATION
LEGITIMATE ACCESS
LEGITIMATE APPLICATION
LEGITIMATE CHANNEL
LEGITIMATE COMMUNICATION
LEGITIMATE DATA
LEGITIMATE MESSAGE TRAFFIC
LEGITIMATE PATH
LEGITIMATE RECEIVER
LEGITIMATE TELECOMMUNICATION
LEGITIMATE USER
LEL
LEMPELZIV COMPRESSION
LENGTH
LENGTH OF PROTECTION
LENGTH OF THE KEY
LESS CLEARED USER
LETTER
LETTER FREQUENCY DISTRIBUTION
LETTER KEY
LETTER QUALITY
LETTERBYLETTER ENCRYPTION
LETTERBYLETTER SUBSTITUTE
LETTERBYLETTER SUBSTITUTION
LETTERFREQUENCY CRYPTANALYSIS
LETTERPATTERN CRYPTANALYSIS
LETTERPATTERN METHOD
LETTERPATTERN TECHNIQUE
LEVEL
LEVEL OF CONFIDENTIALITY
LEVEL OF PROTECTION
LEVEL OF SENSITIVITY
LEVEL OF VULNERABILITY
LEVEL QUANTIZATION
LFOLD SECRECY
LFSR
LIABILITY
LIBRARY
LIBRARY SERVER
LICENCE NUMBER
LICENSE SERVER APPLICATION PROGRAMMING INTERFACE
LICENSING
LICENSING SYSTEM
LIE DETECTOR TEST
LIE DETECTOR TEST(ING)
LIE DETECTOR TEST(ING)
LIE DETECTOR TESTING
LIFE
LIFE SPAN
LIFETIME
LIGHT ALARM
LIGHTEMITTING DIODE
LIKELIHOOD
LIKELIHOOD APPROXIMATION
LIKELIHOOD FUNCTION
LIMIT
LIMIT ACCESS
LIMITATION
LIMITED ACCESS
LIMITED ACCESS AUTHORIZATION
LIMITED AREA
LIMITED AVAILABILITY
LIMITED KEY
LIMITED PROTECTION
LIMITEDRESOURCE EAVESDROPPER
LINE
LINE ADAPTER
LINE DETECTOR
LINE DISCONNECTIONTYPE DEVICE
LINE EAVESDROPPING
LINE ENCRYPTION DEVICE
LINE INDUCTION NOISE
LINE MODEM
LINE SECURITY
LINE TAPPER
LINEAR ALGEBRA
LINEAR CIPHER
LINEAR COMPLEXITY
LINEAR CONGRUENCE
LINEAR CONGRUENTIAL SEQUENCE
LINEAR CONGRUENTIAL STRING
LINEAR CORRELATION
LINEAR DISTRIBUTION
LINEAR FEEDBACK SHIFT REGISTER
LINEAR MAPPING
LINEAR PHASE SEQUENCE
LINEAR PHASE STRING
LINEAR PREDICTION
LINEAR PREDICTION ANALYSIS
LINEAR PREDICTION CODING
LINEAR PREDICTIVE CODER
LINEAR PREDICTIVE CODING
LINEAR PREDICTIVE CODING ALGORITHM
LINEAR PREDICTIVE PARAMETER
LINEAR PREDICTIVE VOCODER
LINEAR PREDICTOR
LINEAR RECURRING SEQUENCE
LINEAR RECURRING STRING
LINEAR SHIFT REGISTER SEQUENCE
LINEAR SHIFT REGISTER STRING
LINEAR SIEVE ALGORITHM
LINEAR SPACE
LINEAR SPAN
LINEAR THRESHOLD FUNCTION
LINEAR TRANSFORMATION BASED CIPHER
LINEAR VECTOR SPACE
LINETAPPING
LINGUISTIC CODING
LINGUISTIC STRUCTURE
LINK
LINK
LINK ACCESS PROCEDURE
LINK ACCESS PROTOCOL
LINK ACCESS PROTOCOL FOR MODEMS
LINK CONTROL PROTOCOL
LINK CRYPTOGRAPHY
LINK ENCRYPTION
LINK ENCRYPTION DEVICE
LINK ENCRYPTION KEY
LINK KEY
LINK SECURITY
LINK SETUP
LINKBYLINK ENCRYPTION
LINKORIENTED
LINKORIENTED SECURITY
LINKORIENTED SECURITY MEASURES
LINKUP
LIP READING
LIPSTICK
LIST
LISTEN THROUGH
LISTENER
LISTENER FATIGUE
LISTENING
LISTENING DEVICE
LISTENING DEVICE DETECTOR
LISTENING POST
LISTENING STATION
LISTING
LISTS
LITERAL KEY
LITERALIZED FORMAT
LIVE BUG
LIVENESS
LIVEWARE
LLC
LMI
LMK
LNM
LOAD
LOAD THE KEY
LOADER
LOADING
LOADING PROCEDURE
LOCAL ACCESS AND TRANSPORT AREA
LOCAL ALARM SYSTEM
LOCAL AREA NETWORK
LOCAL AREA NETWORK SECURITY
LOCAL AREA TRANSPORT
LOCAL AREA WIRELESS NETWORK
LOCAL COMPUTER NETWORK
LOCAL CONTROL
LOCAL EXCHANGE CARRIER
LOCAL KEY
LOCAL KEY LOADING
LOCAL MANAGEMENT INTERFACE
LOCAL MASTER KEY
LOCAL RANDOMNESS
LOCAL SEARCH
LOCAL USER GROUP
LOCALLY ASSIGNED KEY
LOCALLY ATTACHED TERMINAL
LOCATE A TRANSMITTER
LOCATION
LOCATOR
LOCK
LOCK CODE
LOCK MODE
LOCK REGIME
LOCK RELEASE
LOCKABLE KEYBOARD
LOCKANDKEY PROTECTION
LOCKANDKEY PROTECTION SYSTEM
LOCKED
LOCKED DATA
LOCKED RESOURCE
LOCKED ROOM
LOCKKEY MECHANISM
LOCKOUT
LOCKUP
LOCKWORD
LOG
LOGARITHM
LOGBOOK
LOGGING
LOGIC
LOGIC BOMB
LOGIC COMPATIBILITY
LOGIC OPERATION
LOGICAL ACCESS CONTROL
LOGICAL ANALYSIS
LOGICAL BOMB
LOGICAL EXPRESSION
LOGICAL FUNCTION
LOGICAL ID
LOGICAL IDENTIFIER
LOGICAL LINK CONTROL
LOGICAL OPERATION
LOGICAL POSTULATES
LOGICAL PROBLEM
LOGICAL PROTECTION
LOGICAL RESTRICTION
LOGICAL SEQUENCING
LOGICAL SOFTWARE
LOGICAL UNIT
LOGICAL VOLUME MANAGER
LOGICAL ZERO
LOGICALLY PROTECTED AREA
LOGIN
LOGIN ID
LOGIN IDENTIFIER
LOGIN INFORMATION
LOGIN NAME
LOGIN PASSWORD
LOGIN PROCEDURE
LOGIN PROTOCOL
LOGIN SECURITY
LOGIN TIME
LOGOFF
LOGOFF TIME
LOGON
LOGON ACCESS
LOGON ACCESS CONTROL
LOGON DATA
LOGON ID
LOGON IDENTIFICATION
LOGON MESSAGE
LOGON PASSWORD
LOGON PASSWORD ORIENTED ACCESS
LOGON PROCEDURE
LOGON SECURITY
LOGON SEQUENCE
LOGON SESSION
LOGON STRING
LOGON TIME
LOGOUT
LON
LONG HAUL NETWORK
LONG KEY CIPHER
LONG KEY ENCRYPTION
LONG PASSWORD
LONG PLAYING RECORDER
LONGLASTING SECURITY
LONGLIVED DATA
LONGLIVED KEY
LONGSTANDING PASSWORD
LONGTERM KEY
LONGTERM SECURITY
LOOK FOR A BUG
LOOKUP
LOOKUP DICTIONARY
LOOP
LOOP CHECK
LOOP NETWORK
LOOPBACK MODE
LOOPBACK REGIME
LOOPHOLE
LOOPING
LOOPING VERIFICATION
LOOTING
LOSS
LOSS FUNCTION
LOSS OF SYNCHRONIZATION
LOST KEY
LOW ACCESS CLASS
LOW GRADE CIPHER
LOW LEVEL CODE
LOW LIGHT SURVEILLANCE
LOW ORDER BIT
LOW VALUE
LOWBITRATE CODER
LOWER CLASSIFIED
LOWLEVER ACCESS PROTOCOL
LOWLIGHT OBSERVATION SYSTEM
LOWLIGHTLEVEL CAMERA
LOWPOWERED TRANSMITTER
LOWRATE DATA CHANNEL
LOWRATE VOCODER
LOWSECURITY SYSTEM
LOWSIDE
LOWSPEED ENCRYPTION
LOWSPEED LINE
LOWSPEED TERMINAL
LPBASED CODER
LPC
LPC VOICE DIGITIZER
LPV VOCODER
LQ
LRU
LS
LSAPI
LU
LUCAS NUMBER
LUCAS SEQUENCE
LUCAS STRING
LUG
LUGGAGE SCREENING
LVM
T: 113