Словари
Англо-русский словарь по компьютерной безопасности
Слова
Поиск
Слова на "P" в Англо-русском словаре по компьютерной безопасности
(
2
И
П
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Все
PA
PB
PC
PD
PE
PG
PH
PI
PK
PL
PM
PN
PO
PP
PR
PS
PT
PU
PV
PW
Список всех слов на букву P
Англо-русский словарь по компьютерной безопасности содержит 1174 слова на букву P
Слова, начинающиеся на букву P
PABX
PAC
PAC KEY
PACKAGE
PACKAGING
PACKET (TELE)COMMUNICATION
PACKET (TELE)COMMUNICATION
PACKET ASSEMBLY AND DISASSEMBLY
PACKET COMMUNICATION
PACKET CONTROL
PACKET ENCRYPTION
PACKET SWITCH
PACKET SWITCHED NETWORK
PACKET SWITCHING
PACKET TELECOMMUNICATION
PACKET TERMINAL
PACKET TRANSFER MODE
PACKETIZED AUTOMATIC ROUTING INTEGRATED SYSTEM
PACKETMODE ENCRYPTION
PACKETMODE TERMINAL
PAD
PAD
PAD CHARACTER
PAD SYMBOL
PADDED MESSAGE
PADDING
PADDING BIT
PADDING FIELD
PADLOCKING SECURITY
PAGE DESCRIPTION LANGUAGE
PAIR
PAIRED COMPARISON
PAIRWISE AUTHENTICATION
PAIRWISE KEY
PAIRWISE SHARED SECRET
PALMPRINT
PAMA
PAN
PANEL
PANNING SPECTRUM ANALYZER
PANORAMIC PROTOCOL ANALYZER
PANORAMIC SURVEILLANCE RECEIVER
PAPER
PAPERLESS OFFICE
PAPERTAPE KEY
PARALLEL DATA QUERY
PARALLEL LINE BUG
PARALLEL LISTENING
PARALLEL LISTENING ATTACK
PARALLEL LISTENING BREAKER
PARALLEL TELEPHONE TAP
PARALLEL TELEPHONE TAP(PING)
PARALLEL TELEPHONE TAP(PING)
PARALLEL TELEPHONE TAPPING
PARALLELTOSERIAL CONVERSION
PARAMETER
PARAMETER CODING
PARAMETER MISMATCH
PARAMETER SET
PARAMETER SETTING
PARAMETER SPACE
PARAMETER SPECIFICATION
PARAMETRIC ESTIMATION
PARAMETRIZATION
PARAPHRASE
PARASITIC TAP
PARASITIC TAP(PING)
PARASITIC TAP(PING)
PARASITIC TAPPING
PARETIAL FUNCTION
PARIS
PARITY
PARITY (CHECK )BIT
PARITY (CHECK )BIT
PARITY BIT
PARITY CHECK
PARITY CHECK BIT
PARITY CHECK CIRCUIT
PARITY CHECK CODE
PARITY CHECK MATRIX
PARITY CHECK(ING)
PARITY CHECK(ING)
PARITY CHECKING
PARITY ERROR
PARITYPROTECTED KEY
PAROLE
PARTIAL INFORMATION
PARTIAL SEQUENCE
PARTIAL STRING
PARTIALLY KNOWN PLAINTEXT CRYPTANALYSIS
PARTIALLY ORDERED SET
PARTITION
PARTITIONED DATABASE
PARTITIONED SECURITY MODE
PARTITIONED SECURITY REGIME
PARTNER
PARTY
PASS
PASS KEY
PASS SECRET
PASSAGE
PASSALGORITHM
PASSCARD
PASSCODE
PASSING
PASSIVE (INFORMATION )INTERCEPT(ION)
PASSIVE (INFORMATION )INTERCEPT(ION)
PASSIVE (INFORMATION )INTERCEPT(ION)
PASSIVE (INFORMATION )INTERCEPT(ION)
PASSIVE ATTACK
PASSIVE EAVESDROPPER
PASSIVE INFILTRATION
PASSIVE INFORMATION INTERCEPT
PASSIVE INFORMATION INTERCEPTION
PASSIVE INTERCEPT
PASSIVE INTERCEPTION
PASSIVE PROTECTION
PASSIVE SURVEILLANCE
PASSIVE THREAT
PASSIVE WIRETAPPING
PASSNUMBER
PASSPHRASE
PASSTHROUGH TECHNIQUE
PASSWORD
PASSWORD ACCESS
PASSWORD ACCESS CONTROL
PASSWORD ALGORITHM
PASSWORD ASSIGNEMENT
PASSWORD AUTHENTICATION
PASSWORD CAPABILITY
PASSWORD CHANGE MODULE
PASSWORD CHECK
PASSWORD CHECKING PROGRAM
PASSWORD CONTROL
PASSWORD CONTROL CIRCUMVENTION
PASSWORD CRACKING
PASSWORD CRACKING ALGORITHM
PASSWORD ENCRYPTION ALGORITHM
PASSWORD ENTRY DEVICE
PASSWORD EXPIRATION
PASSWORD FILE
PASSWORD GENERATION ALGORITHM
PASSWORD GENERATION DEVICE
PASSWORD GENERATOR
PASSWORD GRABBER
PASSWORD GUESSABILITY
PASSWORD GUESSER
PASSWORD HOLDER
PASSWORD IMAGE
PASSWORD LEVEL
PASSWORD LIFETIME
PASSWORD MANAGEMENT
PASSWORD METHOD
PASSWORD PHRASE
PASSWORD PROCEDURE
PASSWORD PROPAGATION
PASSWORD PROTECTION
PASSWORD PROTECTION MECHANISM
PASSWORD REPEATABILITY
PASSWORD SECURITY
PASSWORD SECURITY SYSTEM
PASSWORD SELECTION
PASSWORD SPACE
PASSWORD TABLE
PASSWORD TECHNIQUE
PASSWORD UPDATE
PASSWORD UPDATING
PASSWORD USAGE STANDARD
PASSWORD VIOLATION
PASSWORDBASED ACCESS
PASSWORDBASED ACCESS CONTROL
PASSWORDBASED ACCESS CONTROL SYSTEM
PASSWORDBASED AUTHENTICATION
PASSWORDBASED USER ID
PASSWORDBASED USER IDENTIFICATION
PASSWORDCALLBACK ACCESS
PASSWORDCONTROLLED INTERCOM
PASSWORDING
PASSWORDPROTECTED
PASSWORDPROTECTED KEY
PASSWORDPROTECTED SOFTWARE
PASSWORDPROTECTED TERMINAL
PAST INFORMATION
PATCHING
PATENT PROTECTION
PATENT REPETITION
PATH
PATTERN
PATTERN MATCHING
PATTERN MATCHING ATTACK
PATTERN RECOGNITION
PATTERN WORD
PATTERNLESSNESS
PAYPHONE
PBOX
PC
PCA
PCB
PCL
PCM
PCMCIA
PDA
PDB
PDF
PDL
PDQ
PDU
PEER AUTHENTICATION
PEER ENTITY
PEER ENTITY AUTHORIZATION
PEER INTERACTION
PEER RELATION
PEERTOPEER (TELE)COMMUNICATION
PEERTOPEER (TELE)COMMUNICATION
PEERTOPEER AUTHENTICATION
PEERTOPEER COMMUNICATION
PEERTOPEER PROTOCOL
PEERTOPEER TELECOMMUNICATION
PENALTY
PENDING KEY
PENETRATE SAFEGUARD
PENETRATION
PENETRATION AIDS
PENETRATION DELAY
PENETRATION DIRECTION
PENETRATION METHOD
PENETRATION PATH
PENETRATION PERSON
PENETRATION RESISTANCE
PENETRATION TEAM
PENETRATION TECHNIQUE
PENETRATION TEST
PENETRATION TEST(ING)
PENETRATION TEST(ING)
PENETRATION TESTING
PENETRATION WORK COEFFICIENT
PENETRATION WORK FACTOR
PENETRATOR ENTRAPMENT
PENTAGRAPH
PENUP/PENDOWN SIGNALS
PEOPLE SECURITY
PERCALL KEY
PERCENTAGE SUPERVISION
PERCEPTION
PERCONNECTION CONTROL INFORMATION
PERCONNECTION KEY
PERFECT SECRECY
PERFECT SECRECY (CRYPTO)SYSTEM
PERFECT SECRECY (CRYPTO)SYSTEM
PERFECT SECRECY CRYPTOSYSTEM
PERFECT SECRECY SYSTEM
PERFECTLY RANDOM KEY
PERFECTLY RANDOM SEQUENCE
PERFECTLY RANDOM STRING
PERFORMANCE DEGRADATION
PERFORMANCE EVALUATION
PERFORMANCE MONITOR
PERIMETER
PERIMETER ALARM SYSTEM
PERIMETER FENCE
PERIMETER INTRUSION DETECTION SYSTEM
PERIMETER PROTECTION
PERIMETER SECURITY
PERIOD
PERIODIC CIPHER
PERIODIC KEY
PERIODIC SEQUENCE
PERIODIC SHIFTED ALPHABET CIPHER
PERIODIC STREAM CIPHER
PERIODIC STRING
PERIODIC SUBSTITUTION CIPHER
PERIODICITY
PERIPHERAL DEVICE
PERIPHERAL INTERCOM
PERMANENT KEY
PERMANENT VIRTUAL CIRCUIT
PERMANENT VIRTUAL CONNECTION
PERMISSION
PERMISSION FUNCTION
PERMIT ACCESS
PERMITTED ACCESS
PERMITTED ACTION
PERMITTED ACTIVITY
PERMUTATION
PERMUTATION ALGORITHM
PERMUTATION BLOCK
PERMUTATION BOX
PERMUTATION CODE
PERMUTATION FUNCTION
PERMUTATION GENERATOR
PERMUTATION MATRIX
PERMUTATION POLINOMIAL
PERMUTATION SCRAMBLING
PERMUTATION TABLE
PERMUTATION TRANSFORM
PERMUTATION TRANSFORM(ATION)
PERMUTATION TRANSFORM(ATION)
PERMUTATION TRANSFORMATION
PERMUTED ALPHABET
PERMUTER
PERSESSION KEY
PERSON
PERSON AUTHENTICATION CODE
PERSONAL ACCESS NUMBER
PERSONAL ALARM DEVICE
PERSONAL AUTHENTICATIOH SYSTEM
PERSONAL AUTHENTICATION
PERSONAL AUTHENTICATION CODE
PERSONAL AUTHENTICATION DEVICE
PERSONAL AUTHENTICATION TOKEN
PERSONAL CODE
PERSONAL COMMUNICATION NETWORK
PERSONAL COMPUTER
PERSONAL COMPUTER
PERSONAL COMPUTER MEMORY CARD INTERNATIONAL ASSOCIATION
PERSONAL CU
PERSONAL DATA
PERSONAL DIGITAL ASSISTANT
PERSONAL FEATURE ACCESS
PERSONAL ID
PERSONAL IDENTIFICATION CODE
PERSONAL IDENTIFICATION KEY
PERSONAL IDENTIFICATION MEANS
PERSONAL IDENTIFICATION NUMBER CARD
PERSONAL IDENTIFIER
PERSONAL IDENTIFIER PRESENTATION
PERSONAL IDENTIFYING NUMBER
PERSONAL IDENTITY VERIFICATION
PERSONAL INFORMATION
PERSONAL INFORMATION MANAGER
PERSONAL KEY
PERSONAL KEY CARD
PERSONAL KEY CRYPTOGRAPHY
PERSONAL PASSWORD
PERSONAL RECOGNITION
PERSONAL RIGHT
PERSONAL SECURITY CHECK
PERSONAL SECURITY CLEARANCE
PERSONAL SECURITY CONTROL
PERSONAL VERIFICATION INFORMATION
PERSONALIZATION
PERSONNEL
PERSONNEL BADGE
PERSONNEL SCREENING
PERSONNEL SEARCH
PERSONNEL SECURITY
PERSONNEL SECURITY INVESTIGATION
PERTURBATION METHOD
PERTURBATION TECHNIQUE
PERVASIVE SECURITY MECHANISM
PG
PGA
PGP
PHONE
PHONE ADAPTER
PHONE BUG
PHONE COUPLER
PHONE EAVESDROPPING
PHONE LINE ACCESS
PHONE MESSAGE
PHONE SCRAMBLER
PHONE SECURITY
PHONE SECURITY SYSTEM
PHONE TAP
PHONE TAP(PING)
PHONE TAP(PING)
PHONE TAPPING
PHONEBACK SYSTEM
PHONEME SYNTHESIZER
PHONEMIC SEQUENCE
PHONEMIC STRING
PHONETAPPING
PHONETIC CODE
PHONETIC STRUCTURE
PHONETIC VOCODER
PHONY
PHOTOELECTRIC ALARM
PHOTOELECTRIC SCANNER
PHOTOGRAFIC ID
PHOTOGRAFIC IDENTIFICATION
PHOTOGRAPHY
PHRASE
PHYSICAL ACCESS
PHYSICAL ACCESS CONTROL
PHYSICAL ACCESSIBILITY
PHYSICAL ATTACK
PHYSICAL AUTHENTICATION
PHYSICAL CHARACTERISTIC
PHYSICAL DESTRUCTION
PHYSICAL ENTITY
PHYSICAL ENTRY
PHYSICAL ID
PHYSICAL IDENTIFICATION
PHYSICAL IDENTIFIER
PHYSICAL IDENTITY
PHYSICAL INSPECTION
PHYSICAL INTRUDER
PHYSICAL KEY
PHYSICAL KEY FOR POWERON
PHYSICAL LAYER ENCRYPTION
PHYSICAL MEDIUM ATTACHMENT
PHYSICAL OBJECT
PHYSICAL OBSTACLE
PHYSICAL PROTECTION
PHYSICAL PROTECTION DEVICE
PHYSICAL RESTRICTION
PHYSICAL SECURITY
PHYSICAL TAMPERING
PHYSICAL TAP
PHYSICAL TAP(PING)
PHYSICAL TAP(PING)
PHYSICAL TAPPING
PHYSICAL WIRETAPPING
PHYSICALLY LOCKED ROOM
PHYSICALLY PROTECTED AREA
PHYSICALLY RESTRICTED ACCESS
PHYSICALLY SECURE CHANNEL
PHYSICALLY SECURE DEVICE
PHYSICALLY SECURE ENVIRONMENT
PHYSIOLOGICAL AUTHENTICATION
PIC
PICKET FENCE CIPHER
PICKUP
PICTURE ID
PICTURE IDENTIFIER
PICTURE IMAGE COMPRESSION
PIF
PIGGIBACK INFILTRATION
PIGGIBACKING
PIGGYBACK ACKNOWLEDGEMENT
PIGGYBACK ENTRY
PILOT TONE SYNCHRONIZATION
PIM
PIN
PIN ACCESS CODE
PIN AUTHENTICATION
PIN GRID ARRAY
PIRACY
PIRATED PROGRAM
PIRATED SOFTWARE
PKA
PKCS
PKEY
PL
PLAIN (TELE)COMMUNICATION
PLAIN (TELE)COMMUNICATION
PLAIN CODE
PLAIN CODEBOOK ENCRYPTION
PLAIN COMMUNICATION
PLAIN COMPONENT
PLAIN LANGUAGE INFORMATION
PLAIN LANGUAGE MESSAGE
PLAIN LANGUAGE TEXT
PLAIN RADIO CONVERSATION
PLAIN TELECOMMUNICATION
PLAIN TEXT
PLAIN TEXT CHAIN
PLAIN TEXT INFORMATION
PLAIN TEXT PASSWORD
PLAIN/CRYPTO CHANGEOVER
PLAINTEXT
PLAINTEXT ALPHABET
PLAINTEXT ALPHABET SYMBOL
PLAINTEXT BLOCK
PLAINTEXT BLOCK CHAINING
PLAINTEXT BYPASS
PLAINTEXT CHARACTER
PLAINTEXT CRYPTANALYSIS
PLAINTEXT DATA
PLAINTEXT DOCUMENT
PLAINTEXT FEEDBACK
PLAINTEXT FILE
PLAINTEXT LETTER
PLAINTEXT MESSAGE
PLAINTEXT REDUNDANCE
PLAINTEXT RESTORATION
PLAINTEXT SEQUENCE
PLAINTEXT SPACE
PLAINTEXT STRING
PLAINTEXT SYMBOL
PLAINTEXT W.F.
PLAINTEXTCIPHERTEXT CHECK
PLAINTEXTCIPHERTEXT PAIR
PLAINTEXTCIPHERTEXT RELATION
PLAINTEXTCIPHERTEXT TRANSFORM
PLAINTEXTCIPHERTEXT TRANSFORM(ATION)
PLAINTEXTCIPHERTEXT TRANSFORM(ATION)
PLAINTEXTCIPHERTEXT TRANSFORMATION
PLAINTEXTTOCIPHERTEXT CORRESPONDENCE
PLAINTTOCRYPTO
PLAN
PLANT THE BUG
PLANTER
PLAYBACK
PLAYBACK ATTACK
PLAYBACK THREAT
PLAYFAIR CIPHER
PLUGANDPLAY
PLUGCOMPATIBLE MANUFACTURER
PLUGIN ENCRYPTOR MODULE
PLUGIN SECURITY CARD
PMA
PN SEQUENCE
PN SEQUENCE GENERATOR
PN STRING
PNP
POCKET PASS
POINT
POINT ESTIMATOR
POINT OF VULNERABILITY
POINT PROTECTION
POINT SECURITY
POINTOFSALE ENCRYPTION
POINTORING SYSTEM
POINTTOMULTIPOINT (TELE)COMMUNICATION
POINTTOMULTIPOINT (TELE)COMMUNICATION
POINTTOMULTIPOINT COMMUNICATION
POINTTOMULTIPOINT TELECOMMUNICATION
POINTTOPOINT CIRCUIT
POINTTOPOINT COMMUNICATION LINK
POINTTOPOINT CONVERSATION
POINTTOPOINT CRYPTOGRAPHY
POINTTOPOINT ENCRYPTION
POINTTOPOINT LINE
POINTTOPOINT MAPPING
POINTTOPOINT PROTOCOL
POINTTOPOINT PROTOCOL
POINTTOPOINT SYSTEM
POLICECONNECTED ALARM
POLICECONNECTED ALARM SYSTEM
POLICY
POLINDROMIC NUMBER
POLINOMIAL
POLINOMIAL EQUATION
POLINOMIAL INTERPOLATION
POLINOMIAL OVER FINITE FIELD
POLINOMIAL PREDICTION
POLINOMIAL TIME STATISTICAL TEST
POLINOMIAL TIME STATISTICAL TEST(ING)
POLINOMIAL TIME STATISTICAL TEST(ING)
POLINOMIAL TIME STATISTICAL TESTING
POLLING
POLLING SIGNAL
POLLUTION
POLYALPHABETIC
POLYALPHABETIC KEY
POLYALPHABETIC SUBSTITUTE
POLYALPHABETIC SUBSTITUTION
POLYALPHABETIC SUBSTITUTION CIPHER
POLYCIPHER SECURITY DEVICE
POLYGRAM
POLYGRAM CIPHER
POLYGRAPH
POLYGRAPH TEST
POLYGRAPH TEST(ING)
POLYGRAPH TEST(ING)
POLYGRAPH TESTING
POLYGRAPHIC SUBSTITUTE
POLYGRAPHIC SUBSTITUTION
POLYNOMIAL ALGORITHM
POLYNOMIAL APPROXIMATION
POLYNOMIAL CHECK SEQUENCE
POLYNOMIAL CHECK STRING
POLYNOMIAL CODE
POLYNOMIAL COMPLEXITY
POLYNOMIAL DERIVED KEY
POLYNOMIAL EXPRESSION
POLYNOMIAL FUNCTION
POLYNOMIAL MAPPING
POLYNOMIAL MATRIX
POLYNOMIAL MULTIPLICATION
POLYNOMIAL RING
POLYNOMIAL SECURITY
POLYNOMIAL SEQUENCE
POLYNOMIAL STRING
POLYNOMIAL TIME
POLYNOMIAL TIME ALGORITHM
POLYNOMIAL TIME APPROXIMATION
POLYNOMIAL TIME COMPLEXITY
POLYNOMIAL TIME COMPUTABLE FUNCTION
POLYNOMIALTIME OPERATION
POLYTIME
POORLY SELECTED KEY
PORT
PORT PROTECTION
PORT PROTECTION DEVICE
PORTABLE DOCUMENT FORMAT
PORTABLE MEDIUM
PORTABLE OPERATING SYSTEMS INTERFACE
POSET
POSITION
POSITION SYNCHRONIZATION
POSITIONAL CODE
POSITIONALLY DEPENDENT CIPHER
POSITIVE ACKNOWLEDGEMENT
POSITIVE ID
POSITIVE IDENTIFICATION
POSITIVE INTEGER
POSIX
POSSESOR
POSSIBLE SOLUTION
POST
POST
POSTAMBLE
POSTENCRYPTION CODING
POSTENCRYPTOR
POSTPROCESSING
POSTSELECTION
POSTULATES
POTENTIAL INTRUDER
POTENTIAL VULNERABILITY
POWER
POWER FAILURE PROTECTION
POWER FUNCTION
POWER LOSS PROTECTION
POWER POLINOMIAL
POWER PROTECTION
POWER RESIDUE
POWERLINE BUG
POWERMAIN TRANSMITTER
POWERPC REFERENCE PLATFORM
PPL
PPP
PR SEQUENCE
PR STRING
PRACTICAL SECURITY
PRACTICAL SECURITY (CRYPTO)SYSTEM
PRACTICAL SECURITY (CRYPTO)SYSTEM
PRACTICAL SECURITY CRYPTOSYSTEM
PRACTICAL SECURITY SYSTEM
PREAMBLE
PREAMBLE SYNCHRONIZATION
PREARRANGED FORMAT
PREARRANGED KEY
PREARRANGED SEQUENCE
PREARRANGED STRING
PREARRANGED TIME
PREASSIGNED
PREASSIGNED MULTIPLE ACCESS
PREAUTHENTICATION
PREBLOCKING
PRECEDENCE TABLE
PRECINCT
PRECIPHERING
PRECOMPUTATION
PREDETERMINED KEY
PREDICTABILITY
PREDICTABLE PASSWORD
PREDICTING ALGORITHM
PREDICTION
PREDICTION ALGORITHM
PREDICTION ERROR
PREDICTIVE CODER
PREDICTIVE CODING
PREDICTOR
PREDICTOR FILTER
PREEMPLOYMENT SCREENING
PREENCRYPTION CODING
PREENCRYPTOR
PREFERENCE
PREFERENCE RELATION
PREFERENCE THEORY
PREFIX
PREHIRING INVESTIGATION
PRELOADED KEY
PRELOADING
PREMATURE DISCLOSURE
PREP
PREPLAY
PREPROCESSING
PREPROCESSING CODE
PREPROCESSOR
PRESCRIPT
PRESENCE DETECTOR
PRESENTATION
PRESENTATION GRAPHICS
PRESENTED PASSWORD
PRESERVATION
PRESERVING INTEGRITY PROTOCOL
PRESET TIME
PRESSTOTALK MODE
PRESSTOTALK REGIME
PRESSURE MALL
PRETENDER
PRETTY GOOD PRIVACY
PREVENTATIVE CONTROL
PREVENTION
PREVENTIVE MEASURES
PREVENTIVE SECURITY
PRIMALITY
PRIMALITY PROBLEM
PRIMALITY TEST
PRIMALITY TEST(ING)
PRIMALITY TEST(ING)
PRIMALITY TESTING
PRIMALITY TESTING ALGORITHM
PRIMARY ALPHABET
PRIMARY DOCUMENT
PRIMARY KEY
PRIMARY PASSWORD
PRIME
PRIME COEFFICIENT
PRIME DIVISOR
PRIME FACTOR
PRIME FACTORIZATION
PRIME GENERATION
PRIME INTEGER
PRIME NUMBER GENERATOR
PRIME NUMBER THEOREM
PRIME PAIR
PRIMENESS
PRIMENESS TEST
PRIMENESS TEST(ING)
PRIMENESS TEST(ING)
PRIMENESS TESTING
PRIMING KEY
PRIMITIVE ATTRIBUTE
PRIMITIVE OPERATION
PRIMITIVE POLINOMIAL
PRIMITIVITY TEST
PRINCIPAL
PRINCIPLE
PRINT
PRINT OUT
PRINT SUPPRESSION
PRINTABLE KEY
PRINTED CIRCUIT BOARD
PRINTER CONTROL LANGUAGE
PRIORITIZING
PRIORITY
PRIORITY ACCESS CONTROL
PRIORITY CALL
PRIORITY CHANNEL
PRIORITY CLASS
PRIORITY CODE
PRIORITY INDICATOR
PRIORITY INVERSION
PRIORITY RANK
PRIORITY ROUTING
PRIORITY RULE
PRIORITY SERVICE
PRIORITY TRANSMISSION
PRIORITYBASED RANDOM ACCESS NETWORK
PRIVACY
PRIVACY ASSURANCE
PRIVACY CODE
PRIVACY CRYPTOSYSTEM
PRIVACY DEVICE
PRIVACY HOMOMORPHISM
PRIVACY ISSUE
PRIVACY KEY
PRIVACY LIFETIME
PRIVACY LOCK
PRIVACY MARK
PRIVACY PERMISSION
PRIVACY PROBLEM
PRIVACY PROTECTION
PRIVACY RIGHT
PRIVACY SYSTEM
PRIVACY TRANSFORM
PRIVACY TRANSFORM(ATION)
PRIVACY TRANSFORM(ATION)
PRIVACY TRANSFORMATION
PRIVACY UNIT
PRIVACYPROTECTED MESSAGE
PRIVATE
PRIVATE AUTOMATIC BRANCH EXCHANGE
PRIVATE CHANNEL
PRIVATE COMPONENT
PRIVATE CONVERSATION
PRIVATE CRYPTO(GRAPHIC )ALGORITHM
PRIVATE CRYPTO(GRAPHIC )ALGORITHM
PRIVATE CRYPTOALGORITM
PRIVATE CRYPTOGRAPHIC ALGORITHM
PRIVATE DATA
PRIVATE ID
PRIVATE IDENTIFIER
PRIVATE INFORMATION
PRIVATE KEY
PRIVATE KEY (CRYPTO)SYSTEM
PRIVATE KEY (CRYPTO)SYSTEM
PRIVATE KEY CRYPTOALGORITHM
PRIVATE KEY CRYPTOALGORITM
PRIVATE KEY CRYPTOGRAPHY
PRIVATE KEY CRYPTOSYSTEM
PRIVATE KEY DISTRIBUTION
PRIVATE KEY ENCRYPTION
PRIVATE KEY SYSTEM
PRIVATE LINE INTERCOM
PRIVATE MESSAGE
PRIVATE MODE
PRIVATE OPERATION
PRIVATE PROTOCOL
PRIVATE REGIME
PRIVATE SECTOR CRYPTOGRAPHY
PRIVATE SESSION KEY
PRIVATE TRANSFORM
PRIVATE TRANSFORM(ATION)
PRIVATE TRANSFORM(ATION)
PRIVATE TRANSFORMATION
PRIVATELY OWNED DATA
PRIVILEDGE GRAB
PRIVILEDGED USER
PRIVILEGE
PRIVILEGE ATTRIBUTES
PRIVILEGE CODE
PRIVILEGE LEVEL
PRIVILEGE RIGHT
PRIVILEGE SEPARATION
PRIVILEGE VIOLATION
PRIVILEGEBASED ACCESS CONTROL
PRIVILEGED ACCESS
PRIVILEGED INFORMATION
PRIVILEGED MODE
PRIVILEGED PASSWORD
PRIVILEGED REGIME
PRN GENERATOR
PRN KEY
PRNG
PROBABALISTIC POLYNOMIAL TIME
PROBABILISTIC ALGORITHM
PROBABILISTIC APPROACH
PROBABILISTIC COMPLETENESS
PROBABILISTIC DECODING
PROBABILISTIC ENCRYPTION
PROBABILISTIC KEY GENERATION
PROBABILISTIC LOGIC
PROBABILISTIC PRILNALITY TEST
PROBABILISTIC PRILNALITY TESTING
PROBABILISTIC PRIMALITY TEST(ING)
PROBABILISTIC PRIMALITY TEST(ING)
PROBABILISTIC PROCESS
PROBABILISTIC TEST
PROBABILITY
PROBABILITY DISTRIBUTION FUNCTION
PROBABILITY PROCESS
PROBABILITY SPACE
PROBABILITY THEORY
PROBABLE ERROR
PROBABLE KEY
PROBABLE MESSAGE CRYPTANALYSIS
PROBABLE PRIME
PROBABLE WORD
PROBABLE WORD CRYPTANALYSIS
PROBABLE WORD METHOD
PROBABLE WORD SEARCH
PROBABLE WORD TECHNIQUE
PROBE
PROBLEM
PROCEDURAL AUDIT
PROCEDURAL CONTROL
PROCEDURAL ERROR
PROCEDURAL SECURITY
PROCEDURAL VIOLATION
PROCEDURAL VULNERABILITY
PROCEDURE
PROCEDURE OF SELFTESTING
PROCESS
PROCESS ISOLATION
PROCESSED DATA
PROCESSING
PROCESSING DEVICE
PROCESSING PATH
PROCESSING SECURITY
PROCESSING SPEED
PROCESSOR
PROCESSPROCESS EXCHANGE
PROCESSTOPROCESS LINKING
PRODUCT
PRODUCT CIPHER
PRODUCT ENCRYPTION
PRODUCT OPERATION
PRODUCT WITH EMBEDDED CRYPTOGRAPHY
PROFESSIONAL BURGLAR
PROFESSIONAL CRYPTOLOGIST
PROFESSIONAL CYBERPUNK
PROFESSIONAL HACKER
PROFESSIONAL TRAVELLER
PROFESSIONAL WORKSTATION
PROFILE
PROFORMA MESSAGE
PROGRAM
PROGRAM COMPATIBILITY
PROGRAM INFORMATION FILE
PROGRAM PROCEDURE
PROGRAM TEMPORARY FIXES
PROGRAMCONTROLLED KEY
PROGRAMMABLE (EN)CRYPTOR
PROGRAMMABLE (EN)CRYPTOR
PROGRAMMABLE CODE
PROGRAMMABLE CODE CHANGING
PROGRAMMABLE CRYPTOR
PROGRAMMABLE ENCRYPTOR
PROGRAMMABLE LOGIC ARRAY
PROGRAMMABLE MODEM
PROGRAMMING LANGUAGE
PROGRAMMING TRICK
PROGRAMTOPROGRAM (TELE)COMMUNICATION
PROGRAMTOPROGRAM (TELE)COMMUNICATION
PROGRAMTOPROGRAM COMMUNICATION
PROGRAMTOPROGRAM TELECOMMUNICATION
PROHIBITED (TELE)COMMUNICATION
PROHIBITED (TELE)COMMUNICATION
PROHIBITED COMMUNICATION
PROHIBITED TELECOMMUNICATION
PROHIBITION
PROJECTOR
PROLIFIC PROGRAM
PRONOUNCEABLE PASSWORD
PROOF
PROOF OF IDENTITY PROTOCOL
PROOF PROCEDURE
PROOF RULES
PROOFING
PROPAGATION
PROPAGATION DELAY
PROPER AUTHORITY
PROPER KEY
PROPERLY CLEARED USER
PROPERTY
PROPRIETARY (CRYPTO)SYSTEM
PROPRIETARY (CRYPTO)SYSTEM
PROPRIETARY CRYPTOALGORITHM
PROPRIETARY CRYPTOALGORITM
PROPRIETARY CRYPTOSYSTEM
PROPRIETARY ENCRYPTION
PROPRIETARY ENCRYPTION ALGORITHM
PROPRIETARY INFORMATION
PROPRIETARY SYSTEM
PROSCRIBED
PROTECTED
PROTECTED (TELE)COMMUNICATION
PROTECTED (TELE)COMMUNICATION
PROTECTED ACCESS
PROTECTED AREA
PROTECTED COMMUNICATION
PROTECTED CONNECTION
PROTECTED DATA
PROTECTED DISK
PROTECTED DOMAIN
PROTECTED FIELD
PROTECTED FILE
PROTECTED HEADER
PROTECTED HEADING
PROTECTED INFORMATION
PROTECTED ITEM
PROTECTED KEY
PROTECTED MODE
PROTECTED OBJECT
PROTECTED PASSWORD
PROTECTED PROGRAM
PROTECTED REGIME
PROTECTED RESOURCE
PROTECTED SOFTWARE
PROTECTED SPACE
PROTECTED STOR(AG)E
PROTECTED STOR(AG)E
PROTECTED STORAGE
PROTECTED STORE
PROTECTED SYSTEM
PROTECTED TELECOMMUNICATION
PROTECTED TRANSMISSION
PROTECTED VOLUME
PROTECTION
PROTECTION AGAINST COMPROMISING EMANATION
PROTECTION AGAINST EAVESDROPPING
PROTECTION ALGORITHM
PROTECTION ATTRIBUTES
PROTECTION BIT
PROTECTION CERTIFICATE
PROTECTION CLASS
PROTECTION COMMAND
PROTECTION CRITERION
PROTECTION DATA
PROTECTION DECISION
PROTECTION DEVICE
PROTECTION DURING PROCESSING
PROTECTION ENVIRONMENT
PROTECTION FACILITIES
PROTECTION GROUP
PROTECTION HARDWARE
PROTECTION KEY
PROTECTION KEY STOR(AG)E
PROTECTION KEY STOR(AG)E
PROTECTION KEY STORAGE
PROTECTION KEY STORE
PROTECTION LANGUAGE
PROTECTION LOCK
PROTECTION MEASURES
PROTECTION MECHANISM
PROTECTION MECHANISM ALGORITHM
PROTECTION MODEL
PROTECTION PARAMETER
PROTECTION POLICY
PROTECTION PROCEDURE
PROTECTION RING
PROTECTION SERVICE
PROTECTION SOFTWARE
PROTECTION SPECIFICATION
PROTECTION STRATEGY
1
2
T: 176