Словари
Англо-русский словарь по компьютерной безопасности
Слова
Поиск
Слова на "R" в Англо-русском словаре по компьютерной безопасности
(
2
И
П
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Все
RA
RC
RD
RE
RF
RG
RH
RI
RJ
RL
RM
RN
RO
RP
RQ
RS
RT
RU
Список всех слов на букву R
Англо-русский словарь по компьютерной безопасности содержит 632 слова на букву R
Слова, начинающиеся на букву R
RACF
RADIATING DEVICE
RADIATION
RADIATION DETECTION
RADIATION EMITTING CABLE
RADIATION MONITOR
RADIATION PROTECTED
RADIATION SECURITY
RADIATION TEST
RADIO
RADIO BUG
RADIO BUGGING DEVICE
RADIO EAVESDROPPING
RADIO EAVESDROPPING DEVICE
RADIO FREQUENCY BUGGING DEVICE
RADIO FREQUENCY DETECTOR
RADIO FREQUENCY FLOODING
RADIO FREQUENCY ID
RADIO FREQUENCY IDENTIFICATION
RADIO FREQUENCY INTERFERENCE EMISSION
RADIO MONITORING SERVICE
RADIO PAGING SYSTEM
RADIO RECONNAISSANCE SERVICE
RADIO SEARCH
RADIO SECURITY
RADIO TAG
RADIO TAP TRANSMITTER
RADIODELIVERED COMPUTER INFECTOR
RADIODELIVERED COMPUTER VIRUS
RADIOMONITORING
RADIOPHONE
RAFTING CODE SCRAMBLING
RAID
RAINBOW SERIES
RAMPANT
RANDOM
RANDOM BIT GENERATOR
RANDOM BIT PATTERN GENERATOR
RANDOM CIPHER
RANDOM CIPHERING
RANDOM CODE GENERATOR
RANDOM CODING THEOREM
RANDOM COEFFICIENT
RANDOM CRYPTANALYSIS
RANDOM DISTRIBUTION
RANDOM EFFECTS MODEL
RANDOM ENCRYPTION
RANDOM ERROR
RANDOM ERROR CORRECTING CODE
RANDOM EVENT
RANDOM FACTOR
RANDOM INFORMATION
RANDOM INITIALIZATION
RANDOM KEY
RANDOM KEY CRYPTANALYSIS
RANDOM KEY GENERATOR
RANDOM KEY SEQUENCE
RANDOM KEY STRING
RANDOM MAPPING
RANDOM MASKING
RANDOM MESSAGE ATTACK
RANDOM MODIFICATION
RANDOM NUMBER
RANDOM NUMBER GENERATOR
RANDOM NUMBER SEQUENCE
RANDOM NUMBER SOURCE
RANDOM NUMBER STRING
RANDOM PASSWORD
RANDOM PASSWORD GENERATOR
RANDOM PERMUTATION
RANDOM PROCESS
RANDOM SAMPLE
RANDOM SEARCH
RANDOM SEED
RANDOM SET
RANDOM STREAM
RANDOM VARIABLE
RANDOMIZATION
RANDOMIZED BLOCK
RANDOMIZED DATA
RANDOMIZED ENCRYPTION
RANDOMIZED INFORMATION
RANDOMIZED TEXT
RANDOMIZER
RANDOMIZING
RANDOMIZING ALGORITHM
RANDOMIZLNG SEQUENCE
RANDOMIZLNG STRING
RANDOMLY CHOSEN BIT
RANDOMLY CHOSEN KEY
RANDOMLY CHOSEN PASSWORD
RANDOMLY GENERATED
RANDOMLY GENERATED KEY
RANDOMLY SELECTED
RANDOMLY SELECTED KEY
RANDOMNESS
RANDOMNESS OF SEQUENCE
RANDOMNESS POSTULATES
RANDOMNESS TEST
RANDOMNESS TEST(ING)
RANDOMNESS TEST(ING)
RANDOMNESS TESTING
RANDOMSPURIOUS PADDING
RANGE
RANGE OF FUNCTION
RANGE REDUCTION COEFFICIENT
RANGE REDUCTION FACTOR
RANGED DATA
RANK
RANK STATISTICS
RAPID (CRYPTO)SYSTEM
RAPID (CRYPTO)SYSTEM
RAPID CRYPTOSYSTEM
RAPID SYSTEM
RAPID TRANSPORT PROTOCOL
RAS
RATE
RATE OF KEY CHANGE
RATING
RATIO
RATIONAL NUMBER
RC
RDA
RDBMS
READ
READ ACCESS
READ BACK KEY
READ INTO MEMORY
READ PROTECTION
READABLE PLAINTEXT
READER
READING
READING DEVICE
READING TEST
READOUT PROTECTION
READPROTECTED
REAL NUMBER
REAL TIME VOCODER
REAL TRAFFIC
REALTIME CALCULATION
REALTIME CODING
REALTIME DECRYPTING
REALTIME DECRYPTION
REALTIME ENCRYPTION
REALTIME MODE
REALTIME OPERATING SYSTEM
REALTIME REGIME
REALTIME SENSOR
REARRANGEMENT
REASSIGNED KEY
REAUTHENTICATION
REBLOCK
RECEIVE LEVEL
RECEIVE TERMINAL
RECEIVED MESSAGE
RECEIVER
RECEIVER TERMINAL
RECEIVER'S KEY
RECEIVING CIPHERING UNIT
RECEIVING ENTITY
RECEIVING MODEM
RECEPTION
RECERD SCREENING
RECESSION ANALYSIS
RECHECK
RECIPIENT
RECIPIENT CRYPTO UNIT
RECIPIENT'S KEY
RECIPROCAL CIPHER
RECIPROCAL NUMBER
RECIPROCAL NUMBER (CRYPTO)SYSTEM
RECIPROCAL NUMBER (CRYPTO)SYSTEM
RECIPROCAL NUMBER CRYPTOSYSTEM
RECIPROCAL NUMBER SYSTEM
RECIPROCAL PROCESS
RECIRCULATING SHIFT REGISTER
RECLASSIFY
RECOGNITION
RECOGNITION ALGORITHM
RECOGNITION BADGE
RECOGNITION CODE
RECOGNITION SIGNAL
RECOGNIZER
RECOMPUTATION
RECONFIGURATION
RECONSTITUTION
RECONSTRUCTED PLAINTEXT
RECONSTRUCTED VOICE
RECONSTRUCTION
RECONVERSION
RECORD
RECORD ACCESS
RECORD KEY
RECORD LOCK
RECORD LOCK(OUT)
RECORD LOCK(OUT)
RECORD LOCKOUT
RECORD REMOVAL CODE
RECORD TRAFFIC
RECORDED INFORMATION
RECORDER
RECORDING
RECOVER A PLAINTEXT
RECOVERABILITY
RECOVERABLE QUEUING SERVICE
RECOVERED PLAINTEXT
RECOVERED SIGNAL
RECOVERED TEXT
RECOVERED VOICE
RECOVERED VOICE QUALITY
RECOVERY
RECOVERY ACTION
RECOVERY ACTIVITY
RECOVERY DISK
RECOVERY MECHANISM
RECOVERY PLAN
RECOVERY PROCEDURE
RECOVERY TIME
RECOVERY WORK
RECREATABILITY
RECREATE THE KEY
RECURRENCE
RECURRENCE RELATION
RECURRENT
RECURRENT SEQUENCE
RECURRENT STRING
RECURRING SEQUENCE
RECURRING STRING
RECURSION
RECURSION LENGTH
RECURSIVE ALGORITHM
RECURSIVE FUNCTION
RED BOX
RED DATA
RED DESIGNATION
RED INFORMATION
RED SIDE
REDBLACK CONCEPT
REDBLACK ISOLATION
REDBLACK SEPARATION
REDGREENBLUE
REDIAL
REDSIDE SECURITY
REDUCE REDUNDANCE
REDUCED INSTRUCTION SET COMPUTER
REDUCED RESIDUE
REDUCIBILITY
REDUCTION
REDUNDANCE
REDUNDANCE BIT
REDUNDANCE CHECK
REDUNDANCE REDUCTION
REDUNDANT ARRAY OF INEXPENSIVE DRIVES (DISKS)
REDUNDANT ARRAY OF INEXPENSIVE DRIVES (DISKS)
REDUNDANT BIT
REDUNDANT CODE
REDUNDANT INFORMATION
REDUNDANT LANGUAGE
REENCRYPTION
REENTRY
REESTABLISHING
REFECTION
REFERENCE MONITOR
REFERENCE PARAMETER
REFERENCE RECORD
REFERENCE RECORD(ING)
REFERENCE RECORD(ING)
REFERENCE RECORDING
REFERENCE SEQUENCE
REFERENCE SIGNATURE
REFERENCE STRING
REGENERATIVE TERMINAL
REGIME
REGISTER
REGISTER BANK
REGISTER LENGTH
REGISTRY
REGULAR TELEPHONE LINE
REGULATION
REINITIALISATION
REINJECTED SHIFT REGISTER
REINVERTER
REINVERTING
REKEYING
RELABELING
RELATED DATA CRYPTANALYSIS
RELATED KEY
RELATEDKEY CRYPTANALYSIS
RELATION
RELATIONAL ALGEBRA
RELATIONAL DATABASE MANAGEMENT SYSTEM
RELATIONAL OPERATION
RELATIONAL QUERY BY EXAMPLE
RELEASE
RELEASE OF MESSAGE CONTENTS ATTACK
RELEVANT
RELEVANT INFORMATION
RELIABILITY
RELIABILITY
RELIABILITY LEVEL
RELIABILITY THREAT
RELIABLE (TELE)COMMUNICATION
RELIABLE (TELE)COMMUNICATION
RELIABLE COMMUNICATION
RELIABLE DATA
RELIABLE OPERATION
RELIABLE PROTECTION
RELIABLE TELECOMMUNICATION
RELOAD THE KEY
REMAINDER
REMAINENCE
REMAINING KEY
REMEDIAL ACTION
REMEDIAL ACTIVITY
REMEMBERED PASSWORD
REMNANT DATA
REMOTE
REMOTE ACCESS
REMOTE ACCESS CONTROL
REMOTE ACCESS SERVER
REMOTE CONTROL
REMOTE CONTROL KEY ERASURE
REMOTE CONTROL SYSTEM
REMOTE DATABASE ACCESS
REMOTE ID
REMOTE IDENTIFICATION
REMOTE INPUT
REMOTE INPUT/OUTPUT DEVICE
REMOTE JOB ENTRY
REMOTE KEY
REMOTE KEY ENTRY
REMOTE KEY LOADING
REMOTE KEYING
REMOTE LOGIN
REMOTE MONITORING
REMOTE OBJECT ACCESS MECHANISM
REMOTE PROCEDURE CALL
REMOTE PROGRAM LOAD
REMOTE TERMINAL
REMOTE TERMINAL USER
REMOTELY ACCESSED COMPUTER SYSTEM
REMOTELY ACTIVATED TRANSMITTER
REMOTELY ENTERED DATA
REMOVAL
REMOVAL DATA MEDIUM
RENAMING
REORDER
REORDERING
REPEATABILITY
REPEATABLE ENCRYPTION
REPEATATIVE ENCRYPTION
REPEATED ENCRYPTION
REPEATED EVENT
REPEATED KEY LOADING
REPEATED LISTENING
REPEATED LOGIN ATTEMPT
REPEATED REQUEST
REPEATER
REPEATING
REPEATING KEY
REPETITION
REPETITION CYCLE
REPLACEABLE MODULE
REPLACEMENT
REPLAY
REPLAY OF COMPROMISED KEY
REPLAY PROTECTION
REPLICA
REPLICATED DATA
REPLICATED INFORMATION
REPLICATION
REPORT
REPORT PROGRAM GENERATOR
REPORTING LINE
REPOSITORY
REPRESENTATION
REPRODUCING INFECTOR
REPRODUCING VIRUS
REPRODUCTION
REPROGRAMMING
REPROGRAPHY
REPUDIATION
REQUEST
REQUESTER
REQUESTRESPONSE PROTOCOL
REQUIRED SECURITY LEVEL
REQUIREMENT
RERADIATION
REREAD
REROUTING
RESCIND ACCESS
RESCRAMBLING
RESEARCH
RESERVE KEY
RESET BUTTON
RESET PASSWORD
RESHAPE
RESIDENT TERMINAL KEY
RESIDUAL CONTENT
RESIDUAL INTELLIGIBILITY
RESIDUAL RISK
RESIDUAL SOFTWARE
RESIDUAL UNCERTAINTY
RESIDUAL VULNERABILITY
RESIDUE
RESIDUE (CRYPTO)SYSTEM
RESIDUE (CRYPTO)SYSTEM
RESIDUE ARITHMETIC
RESIDUE CLASS
RESIDUE CODE
RESIDUE CODING
RESIDUE CRYPTOSYSTEM
RESIDUE NUMBER ARITHMETIC
RESIDUE POLYNOMIAL CODE
RESIDUE SET
RESIDUE SYSTEM
RESIDUOSITY PROBLEM
RESILIENCE
RESISTANCE
RESISTANCE TO ATTACK
RESISTANCE TO CRYPTOANALYSIS
RESISTANCE TO CRYPTOANALYTIC ATTACK
RESISTANCE TO INTERFERENCE
RESISTANT CIPHER
RESOLUTION
RESOLUTION OF ENCRYPTION
RESOURCE
RESOURCE ACCESS
RESOURCE ACCESS CONTROL FACILITY
RESOURCE ACCESS CONTROL FACILITY
RESOURCE ALLOCATION
RESOURCE HOGGING
RESOURCE LOCK
RESOURCE LOCK(OUT)
RESOURCE LOCK(OUT)
RESOURCE LOCKOUT
RESOURCE MANAGEMENT
RESOURCE PASSWORD
RESOURCE SHARING
RESOURCELIMITED CRYPTANALYST
RESPONCE PERSONNEL
RESPONSE
RESPONSE TIME
RESPONSIBILITY
RESTART
RESTORABILITY
RESTORATION
RESTORATION METHOD
RESTORATION TECHNIQUE
RESTORED MESSAGE
RESTRICTED
RESTRICTED ACCESS
RESTRICTED ACCESS RULES
RESTRICTED AREA
RESTRICTED DATA
RESTRICTED INFORMATION
RESTRICTION
RESTRICTIVE LABEL
RESYNCHRONIZATION
RETIME
RETIMING
RETINA PATTERN VERIFICATION
RETINA PRINT
RETINA SCANNER
RETINA SIGNATURE
RETINAL BLOODVESSEL PATTERN
RETINAL PATTERN
RETINAL PRINT
RETINAL SCAN
RETINAL SCANNER
RETINAL SCANNING
RETINOGRAM
RETIRED KEY
RETRANMISSION
RETRANMISSION OF THE ERROR MESSAGE
RETRIEVAL
RETRIEVAL CODE
RETROFIT
RETRY
RETRY ATTEMPT
RETURN CALL VERIFICATION
RETURN CHANNEL
RETURNED PASSWORD
REUSABLE PASSWORD
REUSE
REVEALED KEY
REVERIFICATION
REVERSAL SCRAMBLING
REVERSE ENGINEERING
REVERSE ID
REVERSE IDENTIFICATION
REVERSE MAPPING
REVERSE TRANSFORM
REVERSE TRANSFORM(ATION)
REVERSE TRANSFORM(ATION)
REVERSE TRANSFORMATION
REVERSED ALPHABET
REVERSED TIME SEGMENTATION
REVERSIBLE ENCRYPTION
REVERSIBLE FUNCTION
REVERSIBLE OPERATION
REVERSIBLE TRANSFORM
REVERSIBLE TRANSFORM(ATION)
REVERSIBLE TRANSFORM(ATION)
REVERSIBLE TRANSFORMATION
REVERTIVE SYNCHRONIZATION
REVIEW
REVOCATION
REVOCATION OF PASSWORD
REVOCATION RIGHT
REVOCE
REVOKE ACCESS
RF BUGGING DEVICE
RFI EMISSION
RGB
RHYTM
RIGHT
RIGHTS CHECK
RING
RING OUT BUG
RISC
RISK
RISK ANALYSIS
RISK ANALYSIS MATRIX
RISK ASSESSMENT
RISK COEFFICIENT
RISK FACTOR
RISK INDEX
RISK PROFILE
RISKBASED DECISION
RIVESTSHAMIRADLEMAN (CRYPTO)SYSTEM
RIVESTSHAMIRADLEMAN (CRYPTO)SYSTEM
RIVESTSHAMIRADLEMAN ALGORITHM
RIVESTSHAMIRADLEMAN CRYPTOSYSTEM
RIVESTSHAMIRADLEMAN SYSTEM
RJE
RLE
RMON
RN
RN GENERATOR
ROASTER MODE
ROASTER REGIME
ROBOT
ROBUST (TELE)COMMUNICATION
ROBUST (TELE)COMMUNICATION
ROBUST COMMUNICATION
ROBUST TELECOMMUNICATION
ROBUSTNESS
ROGUE PROGRAM
ROLEBASED CRYPTANALYSIS
ROLLING BAND SPLITTER
ROLLING CODE INVERSION
ROLLING KEY
ROLLING MODE
ROLLING REGIME
ROLLING SPEECH SCRAMBLER
ROOM
ROOM ACCESS CONTROL
ROOM BUG
ROOM EAVESDROPPING
ROOT USER
ROTATIONS PER MINUTE
ROTOR (CRYPTO)SYSTEM
ROTOR (CRYPTO)SYSTEM
ROTOR CRYPTOSYSTEM
ROTOR MACHINE
ROTOR SYSTEM
ROUND
ROUND KEY
ROUTE
ROUTE TRANSPOSITION CIPHER
ROUTER
ROUTINE
ROUTINE CHECKING
ROUTING
ROUTING ALGORITHM
ROUTING CODE
ROUTING CONTROL
ROUTING GATEWAY
ROUTING INFORMATION
ROUTING TABLE
RPC
RPG
RPL
RPM
RQBE
RQS
RSA ALGORITHM
RSA B SAFE ALGORITHM
RSA CARD
RSA CRYPTOSYSTEM
RSA DIGITAL SIGNATURE
RSA KEY PAIR
RSA PUBLIC KEY
RSA PUBLIC KEY (CRYPTO)SYSTEM
RSA PUBLIC KEY (CRYPTO)SYSTEM
RSA PUBLIC KEY CRYPTOSYSTEM
RSA PUBLIC KEY DISTRIBUTION
RSA PUBLIC KEY SYSTEM
RSA SYSTEM
RSABASED ENCRYPTION SCHEME
RSABASED SIGNATURE
RSAENCRYPTED MESSAGE
RSASIGNED MESSAGE
RTH RESIDUE (CRYPTO)SYSTEM
RTH RESIDUE (CRYPTO)SYSTEM
RTH RESIDUE CRYPTOSYSTEM
RTH RESIDUE SYSTEM
RTOS
RTP
RUBBISH SEARCH
RUBOUT
RUGGED
RULE
RULE C
RULE E
RULEBASED ACCESS CONTROL
RULEBASED SECURITY
RULEBASED SECURITY POLICY
RULES
RUN PERMUTED SEQUENCE
RUN PERMUTED STRING
RUNLENGTH CODE
RUNLENGTH ENCODING
RUNLENGTHLIMITED CODE
RUNNING KEY
RUNNING KEY CIPHER
RUNNING KEY GENERATOR
RUNNING KEY SEQUENCE
RUNNING KEY STRING
RUNNING ONLINE DATA
RUNTIME VALIDATION MECHANISM
T: 219