Словари
Англо-русский словарь по компьютерной безопасности
Слова
Поиск
Слова на "S" в Англо-русском словаре по компьютерной безопасности
(
2
И
П
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Все
SA
SB
SC
SD
SE
SF
SG
SH
SI
SK
SL
SM
SN
SO
SP
SQ
SR
ST
SU
SW
SY
Список всех слов на букву S
Англо-русский словарь по компьютерной безопасности содержит 1584 слова на букву S
Слова, начинающиеся на букву S
S
S/N RATIO
SAA
SABOTAGE
SAFE
SAFE AGAINST CRYPTANALYSIS
SAFE CHANNEL
SAFE COMPUTING SYSTEM
SAFE KEY
SAFE ROOM
SAFE TIME
SAFEGUARD
SAFEGUARDING
SAFEGUARDING SCHEME
SAFETY
SALAMI TECHNIQUE
SALT
SAM
SAMPIE SPACE
SAMPLE
SAMPLE AND HOLD CIRCUIT
SAMPLE DATA
SAMPLE ESTIMATION
SAMPLE SEQUENCE
SAMPLE SPACE
SAMPLE STRING
SAMPLEBASED SCRAMBLER
SAMPLER
SAMPLING FREQUENCY
SAMPLING INTERVAL
SAMPLING PROCESS
SAMPLING RATE
SAMPLING THEOREM
SANITIZING
SAS
SAT SCRAMBLER
SBOX
SCAN
SCANNER
SCANNER DEVICE
SCANNING
SCANNING BUG DETECTOR
SCANNING SENSOR
SCATTERING DIAGRAM
SCAVENGING
SCENARIO
SCHEDULE
SCHEME
SCHIELDED DISTRIBUTED DATA INTERFACE
SCI
SCOCE
SCOMP
SCRAMBLE
SCRAMBLE CODE
SCRAMBLED BIT STREAM
SCRAMBLED CONVERSATION
SCRAMBLED INFORMATION
SCRAMBLED MESSAGE
SCRAMBLED MODE
SCRAMBLED OUTPUT
SCRAMBLED PATTERN
SCRAMBLED REGIME
SCRAMBLED SEQUENCE
SCRAMBLED SIGNAL
SCRAMBLED STRING
SCRAMBLED TELEPHONE
SCRAMBLED TRANSMISSION
SCRAMBLED VOICE
SCRAMBLED WAVEFORM
SCRAMBLER
SCRAMBLER CIRCUIT
SCRAMBLER MODE
SCRAMBLER REGIME
SCRAMBLING
SCRAMBLING ALGORITHM
SCRAMBLING CODE
SCRAMBLING DEVICE
SCRAMBLING EQUIPMENT
SCRAMBLING GENERATOR
SCRAMBLING KEY
SCRAMBLING KEYBOARD
SCRAMBLING MATRIX
SCRAMBLING MECHANISM
SCRAMBLING METHOD
SCRAMBLING OPERATION
SCRAMBLING PARAMETER
SCRAMBLING PROCESS
SCRAMBLING PROGRAM
SCRAMBLING SCHEME
SCRAMBLING SEQUENCE
SCRAMBLING STRING
SCRAMBLING TECHNIQUE
SCRAMBLING TELEPHONE SET
SCREAMER
SCREEN MIMIC
SCREENED OPERATOR
SCREENED PERSONNEL
SCREENING
SCREENING PROCESS
SCREENING WALL
SCRUBBING
SCS
SCSI
SDC
SDDI
SDLC
SDMA
SE
SEAL
SEALED OBJECT
SEARCH
SEARCH ALGORITHM
SEARCH ATTRIBUTE
SEARCH ENDOSCOPE
SEARCH KEY
SEARCH RECEIVER
SEARCH SPACE
SEARCH TEAM
SEARCHED KEY
SECOND CODING
SECOND KEY
SECOND ORDER COMPLEXITY
SECONDAIRE ATTRIBUTE
SECONDARY DOCUMENT
SECONDARY KEY
SECRECY
SECRECY (TELE)COMMUNICATION
SECRECY (TELE)COMMUNICATION
SECRECY CODING
SECRECY COMMUNICATION
SECRECY COMMUNICATION SYSTEM
SECRECY CONTROL
SECRECY CRYPTOSYSTEM
SECRECY OF THE COMMUNICATION
SECRECY SYSTEM
SECRECY TELECOMMUNICATION
SECRET
SECRET (TELE)COMMUNICATION
SECRET (TELE)COMMUNICATION
SECRET AREA
SECRET CLEARANCE
SECRET COMMUNICATION
SECRET DECRYPTING KEY
SECRET HANDSHAKING
SECRET KEY
SECRET KEY ALGORITHM
SECRET KEY CIPHER
SECRET KEY CRYPTOALGORITHM
SECRET KEY CRYPTOALGORITM
SECRET KEY DISTRIBUTION
SECRET KEY ENCRYPTION
SECRET PARAMETER
SECRET PASSWORD
SECRET PHOTOGRAPHY
SECRET SERVICE
SECRET SHARING
SECRET SHARING SCHEME
SECRET SYMPATHETIC INK
SECRET TELECOMMUNICATION
SECRET TRANSFORMATION ALGORITHM
SECRET WIRING PATCH BOARD
SECRET WRITING CARBON PAPER
SECRET ZONE
SECRETCLEARED USER
SECRETKEY (CRYPTO)SYSTEM
SECRETKEY (CRYPTO)SYSTEM
SECRETKEY AGREEMENT
SECRETKEY CRYPTOGRAPHY
SECRETKEY CRYPTOSYSTEM
SECRETKEY SYSTEM
SECRETSHARING SYSTEM
SECTIONAL TIME DIVISION SCRAMBLING
SECURE
SECURE (CRYPTO)SYSTEM
SECURE (CRYPTO)SYSTEM
SECURE (TELE)COMMUNICATION
SECURE (TELE)COMMUNICATION
SECURE ACCESS
SECURE ACCESS FACILITY FOR ENTERPRISE
SECURE ACCESS MANAGEMENT
SECURE ACCESS MANAGEMENT SOFTWARE
SECURE AGAINST EAVESDROPPING
SECURE AREA
SECURE AUTHENTICATION
SECURE BOUNDARY
SECURE BROADCASTING
SECURE CABINET
SECURE CALL
SECURE CARD
SECURE CHANNEL
SECURE CIPHER
SECURE COMMUNICATION
SECURE COMMUNICATION CHANNEL
SECURE COMMUNICATION OVER INSECURE CHANNEL
SECURE COMMUNICATION PROCESSOR
SECURE COMMUNICATION PROCESSOR
SECURE COMMUNICATION PROTOCOL
SECURE COMMUNICATION SERVICE
SECURE COMPUTATION
SECURE CONFIGURATION MANAGEMENT
SECURE CONNECTION PROTOCOL
SECURE CONVERSATION
SECURE COORDINATION
SECURE CRYPTOSYSTEM
SECURE DATA DEVICE
SECURE DATA TRANSFER
SECURE DELEGATION
SECURE ELECTRONIC EXCHANGE OF KEYS
SECURE ENCRYPTION
SECURE ENVIRONMENT
SECURE EVENT LOGGING
SECURE EXCHANGE
SECURE EXCHANGE OF KEYS ALGORITHM
SECURE FAX
SECURE GATEWAY
SECURE HARDWARE
SECURE INFORMATION
SECURE INTERACTION
SECURE INTERCOM
SECURE KEY DISTRIBUTION
SECURE KEY EXCHANGE
SECURE KEY EXCHANGE PROTOCOL
SECURE KEY GENERATOR
SECURE KEY PASSING CHANNEL
SECURE LOCATION
SECURE MEMORY
SECURE MESSAGE
SECURE MESSAGING
SECURE MODE
SECURE MODEM
SECURE NETWORK
SECURE NETWORK SERVER
SECURE OPERATING SYSTEM
SECURE PATH
SECURE PHONE
SECURE PROCESSOR
SECURE REGIME
SECURE ROOM
SECURE SESSION
SECURE SPEECH
SECURE SPEECH SYSTEM
SECURE SPEECH TERMINAL
SECURE STATE
SECURE STORAGE AREA
SECURE SYSTEM
SECURE TELECOMMUNICATION
SECURE TELECOMMUNICATION OVER INSECURE CHANNEL
SECURE TELEPHONE
SECURE TELEPHONE CONVERSATION
SECURE TELEPHONE TERMINAL
SECURE TELEPHONE UNIT
SECURE TERMINAL UNIT
SECURE TRAFFIC
SECURE TRANSACTION
SECURE TRANSMISSION
SECURE TRANSMISSION PATH
SECURE VOICE
SECURE VOICE (TELE)COMMUNICATION
SECURE VOICE (TELE)COMMUNICATION
SECURE VOICE ADAPTER
SECURE VOICE CODER
SECURE VOICE COMMUNICATION
SECURE VOICE MODULE
SECURE VOICE SIGNAL
SECURE VOICE TELECOMMUNICATION
SECURE VOICE TERMINAL
SECURE VOICE TRANSMISSION
SECURE VOICE TWOWAY RADIO
SECURE ZONE
SECURED CHANNEL
SECURED DATA
SECURETOSECURE (TELE)COMMUNICATION
SECURETOSECURE (TELE)COMMUNICATION
SECURETOSECURE COMMUNICATION
SECURETOSECURE TELECOMMUNICATION
SECURING
SECURITY
SECURITY ACCESS
SECURITY ACCESS CONTROLLER
SECURITY ACCESS SYSTEM
SECURITY ACCREDITATION
SECURITY ACTIONS PLAN
SECURITY ACTIVITY
SECURITY ADMINISTRATOR
SECURITY AGAINST EAVESDROPPING
SECURITY AGAINST ILLEGAL CONDUCT
SECURITY ALARM
SECURITY ANALYSIS
SECURITY ARCHITECTURE
SECURITY ARRANGEMENT
SECURITY ASSURANCE
SECURITY ATTRIBUTES
SECURITY AUDIT
SECURITY AUDIT TRAIL
SECURITY AUTHORITY
SECURITY AWARENESS
SECURITY BARRIER
SECURITY BIT
SECURITY BLACKOUT
SECURITY BLANKET
SECURITY BOUNDARY
SECURITY BREACH
SECURITY BURGLAR
SECURITY BY ANALYSIS
SECURITY BY ANALYSIS METHOD
SECURITY BY ANALYSIS TECHNIQUE
SECURITY CATEGORY
SECURITY CERTIFICATION
SECURITY CHECK
SECURITY CLASS
SECURITY CLASSIFICATION
SECURITY CLEARANCE
SECURITY CODE
SECURITY COMMAND POST
SECURITY COMPLIANCE MODEL
SECURITY COMPLIANT CHANNEL
SECURITY COMPROMISE
SECURITY CONSTRAINT
SECURITY CONTAINER
SECURITY CONTROL
SECURITY CONTROL CENTER
SECURITY CONTROL INFORMATION
SECURITY CONTROL MICROPROCESSOR
SECURITY COUNTERMEASURES
SECURITY CYBERPUNK
SECURITY DATABASE
SECURITY DEPTH
SECURITY DESIGN ISSUE
SECURITY DIRECTIVE
SECURITY DOMAIN
SECURITY DOWNGRADING
SECURITY ELEMENT
SECURITY ENFORCEMENT
SECURITY ENFORCEMENT MECHANISM
SECURITY ENGINEERING
SECURITY ENTRANCE BOOTH
SECURITY EQUIPMENT
SECURITY ERASURE
SECURITY EVALUATION
SECURITY EVALUATION CLASS
SECURITY EVENT
SECURITY EXPOSURE
SECURITY FACILITIES
SECURITY FAILURE
SECURITY FENCE
SECURITY FETCH PROTECTION
SECURITY FILTER
SECURITY FIRMWARE
SECURITY FLAW
SECURITY FRIENDLY
SECURITY GAP
SECURITY GUARD
SECURITY HACKER
SECURITY HARDWARE
SECURITY HAZARD
SECURITY HOLE
SECURITY INCIDENCE RESPONSE
SECURITY INCIDENT
SECURITY INDOCTRINATION
SECURITY INFORMATICS
SECURITY INFRACTION
SECURITY INSPECTION
SECURITY INTEGER
SECURITY KERNEL
SECURITY KERNEL INTERCOM
SECURITY KEY
SECURITY LABEL
SECURITY LABELLING
SECURITY LAWSUIT
SECURITY LEAK
SECURITY LEAKAGE
SECURITY LEVEL
SECURITY LOCK
SECURITY LOG
SECURITY LOOP
SECURITY MANAGEMENT
SECURITY MANAGEMENT CENTER
SECURITY MANAGEMENT INFORMATION BASE
SECURITY MANAGEMENT MECHANISM
SECURITY MANAGEMENT SERVICE
SECURITY MANAGER
SECURITY MANAGER'S WORKSTATION
SECURITY MARKING
SECURITY MEASURES
SECURITY MECHANISM
SECURITY METHOD
SECURITY MISMATCH
SECURITY MODEL
SECURITY MODULE
SECURITY MONITOR
SECURITY MONITORING SYSTEM
SECURITY OBJECT
SECURITY OFFICER
SECURITY OPERATION
SECURITY OPTION
SECURITY PACKAGE
SECURITY PARAMETER
SECURITY PARTITION
SECURITY PERIMETER
SECURITY PERIOD
SECURITY PERSONNEL
SECURITY POLICE MODEL
SECURITY POLICY
SECURITY POLICY STATEMENT
SECURITY PROCEDURE
SECURITY PROCESSING MODE
SECURITY PROCESSING REGIME
SECURITY PROCESSOR
SECURITY PROFILE
SECURITY PROGRAM
SECURITY PROPERTY MATRIX
SECURITY PROTECTION
SECURITY PROTECTION CHIP
SECURITY PROTECTION MODULE
SECURITY PROTOCOL
SECURITY RANGE
SECURITY RATING
SECURITY RECOVERY
SECURITY REGULATION
SECURITY REQUIREMENTS
SECURITY RESOURCE
SECURITY RESTRICTION
SECURITY RISK
SECURITY ROBOT
SECURITY RULES
SECURITY SAFEGUARD
SECURITY SCREENING
SECURITY SCREENING SYSTEM
SECURITY SENSITIVE INFORMATION
SECURITY SERVICE
SECURITY SIGNAL
SECURITY SOFTWARE
SECURITY SPACE
SECURITY STAFF
SECURITY STANDARD
SECURITY STATION
SECURITY STRATEGY
SECURITY STRENGTH OF CRYPTOSYSTEM
SECURITY STRUCTURE
SECURITY SUBJECT
SECURITY SUPPORT MEASURES
SECURITY TARGET ZONE
SECURITY TASK FORCE
SECURITY TECHNIQUE
SECURITY TERMINAL
SECURITY TEST
SECURITY TEST(ING)
SECURITY TEST(ING)
SECURITY TESTING
SECURITY THREAT
SECURITY TIME
SECURITY TRANSMITTER
SECURITY TRAVELLER
SECURITY UNIT
SECURITY UPGRADING
SECURITY VIOLATION
SECURITY VULNERABILITY
SECURITY WEAKNESS
SECURITYCONSCIOUS TERMINAL
SECURITYCONSISTENT DATA FLOW
SECURITYENCHANCING PRODUCT
SECURITYENFORCING MODULE
SECURITYORIENTED OPERATING SYSTEM
SECURITYRELATAD PROCESS
SECURITYRELATED DATA
SECURITYRELATED DUTY
SECURITYRELATED FUNCTION
SECURITYRELATED SERVICE
SECURITYRELATED SOFTWARE
SECURITYRELEVANT
SECURITYRELEVANT CODE
SECURITYRELEVANT COEFFICIENT
SECURITYRELEVANT EVENT
SECURITYRELEVANT EVENT DETECTION
SECURITYRELEVANT FACTOR
SECURITYRELEVANT INFORMATION
SECURITYRELEVANT OPERATION
SECURITYSENSITIVE
SECURITYSENSITIVE AREA
SEE
SEED
SEED DATA
SEED KEY
SEED NUMBER
SEED SEQUENCE
SEED STRING
SEED VALUE
SEEK
SEEK ACCESS
SEEK ALGORITHM
SEEKING ENTRY PERSON
SEGMENT
SEGMENT SCRAMBLER
SEGMENTATION
SELECTED KEY
SELECTION
SELECTIVE ACCESS
SELECTIVE CALL
SELECTIVE EAVESDROPPING
SELECTIVE ENCRYPTION
SELECTIVE FIELD PROTECTION
SELECTIVE KEY DISTRIBUTION
SELECTIVE PACKET ENCRYPTION
SELECTIVE QUANTIZATION
SELECTIVE RECEPTION
SELFAUTHENTICATED DIGITAL SIGNATURE
SELFAUTHENTICATION
SELFBLOCKING
SELFCHECKING
SELFCHECKING CIRCUIT
SELFCHECKING CODE
SELFCLOCKING REGISTER
SELFCONTAINED
SELFCONTAINED SYSTEM
SELFCONTAINED UNIT
SELFCREATED PASSWORD
SELFDESTRUCTING
SELFDESTRUCTING BADGE
SELFDESTRUCTION
SELFDESTRUCTION DEVICE
SELFDEVELOPED SOFTWARE
SELFGENERATED PASSWORD
SELFINVERSE
SELFORGANIZING
SELFPOWERED
SELFPROTECTED
SELFREDUCIBILITY
SELFSYNCHONIZATION
SELFSYNCHRONIZING (EN)CRYPTOR
SELFSYNCHRONIZING (EN)CRYPTOR
SELFSYNCHRONIZING CIPHER
SELFSYNCHRONIZING CRYPTOR
SELFSYNCHRONIZING ENCRYPTOR
SELFSYNCHRONIZING KEY GENERATOR
SELFSYNCHRONIZING SCHEME
SELFSYNCHRONIZING SCRAMBLER
SELFSYNCHRONIZING SYSTEM
SELFTEST
SELFTESTING
SELFVERIFICATION
SEMANTIC CONTENT
SEMIWEAK KEY
SENDER
SENDER IDENTITY AUTHENTICATION
SENDER SIGNATURE
SENDING ENTITY
SENDRECEIVE TRANSITION
SENSITIVE (TELE)COMMUNICATION
SENSITIVE (TELE)COMMUNICATION
SENSITIVE APPLICATION
SENSITIVE COMMUNICATION
SENSITIVE COMPARTMENTED INFORMATION
SENSITIVE DATA
SENSITIVE DATA ACCESS
SENSITIVE DATA PROTECTION
SENSITIVE DOCUMENT
SENSITIVE FILE
SENSITIVE INFORMATION
SENSITIVE RESIDUE
SENSITIVE TELECOMMUNICATION
SENSITIVENONSENSLTIVE SEPARATION
SENSITIVITY
SENSITIVITY CLASS
SENSITIVITY CLASSIFICATION
SENSITIVITY LABEL
SENSITIVITY LEVEL
SENSOR
SENTRY
SEPARATE FROM MESSAGE SIGNATURE
SEPARATION
SEQUENCE
SEQUENCE CIPHER
SEQUENCE CONCATENATION
SEQUENCE GENERATOR
SEQUENCE LENGTH
SEQUENCE NUMBER STAMP
SEQUENCE NUMBERING
SEQUENCE PERIOD
SEQUENCER
SEQUENCING
SEQUENCING KEY
SEQUENTIAL ANALYSIS
SEQUENTIAL DECODING
SEQUENTIAL SEARCH
SERIAL ENCRYPTION
SERIAL LINE ACCESS PROTOCOL
SERIALTOPARALLEL CONVERSION
SERIES LINE BUG
SERIES TAP
SERIES TAP(PING)
SERIES TAP(PING)
SERIES TAPPING
SERVER
SERVICE
SERVICE ACCESS
SERVICE ACCESS CODE
SERVICE ACCESS POINT
SERVICE BIT
SERVICE CHARACTER
SERVICE CLASS
SERVICE DELAY
SERVICE DENIAL
SERVICE FUNCTIONS
SERVICE HOST
SERVICE KEY
SERVICE MANAGEMENT SYSTEM
SERVICE PROGRAM
SERVICE PROVIDER
SERVICE SYMBOL
SES
SESSION
SESSION CRYPTOGRAPHY
SESSION INITIALIZATION
SESSION KEY
SESSION LEVEL ENCRYPTION
SESSION PASSWORD
SESSION PROTECTION
SESSION REQUEST
SESSIONAL PRIVILEGE
SET
SET ALGEBRA
SET KEY OPERATION
SETKEY
SETS
SETTHEORETICAL MODEL
SETTING
SETUP
SEVENLAYER MODEL
SFS
SGML
SH
SHADOW FILE
SHADOW REGISTER
SHADOW SYSTEM
SHANNON CAPACITY
SHANNON ENTROPY
SHANNON THEORY APPROACH
SHANNON'S THEOREM
SHANNON'S THEORY OF SECRECY
SHARE KEY
SHAREABLE
SHARED
SHARED COMMON KEY
SHARED CONTROL SCHEME
SHARED FILE
SHARED FILE SERVER
SHARED INFORMATION
SHARED KEY
SHARED KEY (CRYPTO)SYSTEM
SHARED KEY (CRYPTO)SYSTEM
SHARED KEY CRYPTOSYSTEM
SHARED KEY SYSTEM
SHARED MAIL BOX
SHARED RESOURCE
SHARED SECRET
SHARED VERIFICATION SCHEME
SHAREHOLDER
SHAREWARE
SHARING
SHARING SECRET PROBLEM
SHIELDED BUILDING
SHIELDED ENCLOSURE
SHIELDED ROOM
SHIELDED TERMINAL
SHIELDED TWISTED PAIR
SHIELDING
SHIFT
SHIFT REGISTER
SHIFT REGISTER (CRYPTO)SYSTEM
SHIFT REGISTER (CRYPTO)SYSTEM
SHIFT REGISTER CRYPTOSYSTEM
SHIFT REGISTER SEQUENCE
SHIFT REGISTER STRING
SHIFT REGISTER SYSTEM
SHIFT REGISTER WITH NONLINEAR LOGIC
SHIRTPOCKET SIZE
SHOCK PROOF
SHODDY
SHOPLIFTING
SHORT BLOCK
SHORT CUT
SHORT CUT CRYPTANALYSIS
SHORT CUT METHOD
SHORT CUT SOLUTION
SHORT CUT TECHNIQUE
SHORT TIME PROTECTION
SHORTEST PATH ALGORITHM
SHORTTERM KEY
SHORTTERM PROTECTION
SHORTTERM SECURITY
SHORTTIME ANALYSIS
SHOTGUN MICRO
SHOTGUN MICRO(PHONE)
SHOTGUN MICRO(PHONE)
SHOTGUN MICROPHONE
SHOTGUN MIKE
SHREDDER
SHUFFLE
SHUT OFF THE PASSWORD
SIDE
SIDE INFORMATION
SIDESTEPPING
SIEVE
SIEVE ALGORITHM
SIEVE METHOD
SIEVE OF ERATOSTHENES
SIEVE TECHNIQUE
SIEVING
SIG
SIGINT
SIGMA
SIGMAGE
SIGN
SIGN MODULATION
SIGNAL
SIGNAL AMBIGUITY
SIGNAL AMBIGUITY FUNCTION
SIGNAL ANALYZER
SIGNAL CONDITIONING UNIT
SIGNAL CONDITIONNER
SIGNAL DEGRADATION
SIGNAL DISGUISING
SIGNAL DROPCUB
SIGNAL INTELLIGENCE
SIGNAL INVERSION
SIGNAL LOSS
SIGNAL MICROPROCESSOR
SIGNAL PROCESSING
SIGNAL PROCESSING ALGORITHM
SIGNAL RECONSTRUCTION ALGORITHM
SIGNAL SECURITY
SIGNAL SECURITY VIOLATION
SIGNAL SEQUENCE
SIGNAL SET
SIGNAL STRENGTH
SIGNAL STRING
SIGNAL TRANSFER POINT
SIGNAL TRUNCATION
SIGNAL UNIT
SIGNALING
SIGNALIZER
SIGNALLING DEVICE
SIGNALS
SIGNALTODISTORTION RATIO
SIGNALTONOISE RATIO
SIGNATURE
SIGNATURE ALGORITHM
SIGNATURE AUTHENTICATION KEY
SIGNATURE AUTHENTICATION PROTOCOL
SIGNATURE BLOCK
SIGNATURE CHANNEL
SIGNATURE DYNAMICS
SIGNATURE GENERATION KEY
SIGNATURE GENERATOR
SIGNATURE KEY
SIGNATURE PROTECTION
SIGNATURE PROTECTION METHOD
SIGNATURE PROTECTION TECHNIQUE
SIGNATURE RECOGNITION
SIGNATURE SCHEME
SIGNATURE SERVICE
SIGNATURE TOKEN
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION DEVICE
SIGNATURE VERIFICATION SYSTEM
SIGNATURE VERIFIER
SIGNATUREBASED BIOMETRIC SYSTEM
SIGNED (TELE)COMMUNICATION
SIGNED (TELE)COMMUNICATION
SIGNED COMMUNICATION
SIGNED MESSAGE
SIGNED TELECOMMUNICATION
SIGNED TEXT
SIGNER
SIGNIFICANT INFORMATION
SIGNIN OPERATION
SIGNING KEY
SIGNOFF
SIGNOFF PROCEDURE
SIGNON
SIGNON ATTEMPT
SIGNON PROCEDURE
SIGNON SESSION
SILENT OPERATION
SILENT ROOM
SILENT TRANSMISSION
SILICIC SOLUTION
SIMMONS' THEORY OF AUTHENTICITY
SIMPLE AUTHENTICATION
SIMPLE MAIL TRANSFER PROTOCOL
SIMPLE MANAGEMENT PROTOCOL
SIMPLE PASSWORD
SIMPLE SECURITY
SIMPLE SECURITY CONDITION
SIMPLE SECURITY PROPERTY
SIMPLE SECURITY RULE
SIMPLE SUBSTITUTE
SIMPLE SUBSTITUTION
SIMPLE SUBSTITUTION CIPHER
SIMPLE TRANSPOSITION CIPHER
SIMPLEX
SIMPLEX CHANNEL
SIMPLEX MODE
SIMPLEX REGIME
SIMPLEX SCRAMBLER
SIMULATION MODEL
SIMULTANEONS ACCESS
SIMULTANEOUS
SIMULTANEOUS TRANSMISSION OF SPEECH AND DATA
SINC
SINGLE ATTACHMENT STATION
SINGLE BIT CIPHER FEEDBACK
SINGLE CALL ACCESS
SINGLE CODE INVERTER
SINGLE DOMAIN DATA COMMUNICATION NETWORK
SINGLE ENCRYPTION
SINGLE KEY
SINGLE KEY CRYPTOALGORITHM
SINGLE KEY CRYPTOALGORITM
SINGLE KEY ENCRYPTION
SINGLE KEY NETWORK
SINGLE LENGTH KEY
SINGLE LEVEL SYSTEM
SINGLE SUBSTITUTE
SINGLE SUBSTITUTION
SINGLE SUBSTITUTION CIPHER
SINGLEDIMENSION SCRAMBLER
SINGLEDOMAIN (TELE)COMMUNICATION
SINGLEDOMAIN (TELE)COMMUNICATION
SINGLEDOMAIN COMMUNICATION
SINGLEDOMAIN TELECOMMUNICATION
SINGLEFUNCTION CARD
SINGLEIMAGE NETWORK COMPUTING
SINGLEKEY (CRYPTO)SYSTEM
SINGLEKEY (CRYPTO)SYSTEM
SINGLEKEY ALGORITHM
SINGLEKEY CRYPTOSYSTEM
SINGLEKEY SYSTEM
SINGLELETTER FREQUENCY
SINGLELETTER FREQUENCY CRYPTANALYSIS
SINGLELEVEL DEVICE
SINGLELEVEL USER
SINGLEUNIT
SINGLEUSE PASSWORD
SINGLEVALUED
SINGLEVALUED ENCRYPTION
SINGLEVALUED FUNCTION
SINGULAR MATRIX
SINGULARITY
SITE
SITE ACCESS
SITE ACCESS CONTROL
SITE PROTECTION
SITUATION
SITUATIONAL FACTORS
SIZE
SIZELIMITED KEY
SK
SKEY
SKILLED INTRUDER
SKIPJACK
SLACK BYTE
SLAP
SLAVE KEY
SLAVE KEY FILL
SLEEPER PROGRAM
SLIDING WINDOW
SLIDING WINDOW METHOD
SLIDING WINDOW TECHNIQUE
SLIDING WINDOW TIME ELEMENT SCRAMBLER
SLOT
SM
SMA
SMALL COMPUTER SYSTEM INTERFACE
SMALL KEY
SMALLEST PRIME COEFFICIENT
SMALLEST PRIME FACTOR
SMART CARD
SMART CARD
SMART CARD READER
SMART CARD SECURITY SYSTEM
SMART CARD TERMINAL
SMART ENERGY SYSTEM
SMART TERMINAL
SMART TOKEN SECURITY
SMARTCARD
SMDS
SMF
SMOOTH NUMBER
SMP
SMT
SMTP
SNA
SNAP
SNEAK INFECTOR
SNEAK PATH
SNEAK VIRUS
SNIFFED PROGRAM
SOCIAL COEFFICIENT
SOCIAL FACTOR
SOFT LOGIC
SOFTWARE
SOFTWARE BUG
SOFTWARE CIPHERING
SOFTWARE CODE
SOFTWARE COMPATIBILITY
SOFTWARE COMPLEXITY
SOFTWARE COPYRIGHT PROTECTION
SOFTWARE CRYPTOGRAPHY
SOFTWARE ENCRYPTION
SOFTWARE ENGINEERING ENVIRONMENT
SOFTWARE ID
SOFTWARE IDENTIFICATION
SOFTWARE IMPLEMENTATION
SOFTWARE IMPLEMENTATION OF THE DES
SOFTWARE INFECTOR
SOFTWARE INTEGER
SOFTWARE KERNEL
SOFTWARE KEY
SOFTWARE LOCK
SOFTWARE MARKET
SOFTWARE MODEL
SOFTWARE MODULE
SOFTWARE PIRACY
SOFTWARE PROTECTION
SOFTWARE PROTECTION DEVICE
SOFTWARE PROTECTION SYSTEM
SOFTWARE PUBLISHERS ASSOCIATION
SOFTWARE QUALITY ASSURANCE
SOFTWARE REDUNDANCE
SOFTWARE SAFEGUARD
SOFTWARE SECURITY
SOFTWARE SECURITY PRODUCT
SOFTWARE SUPPLIER
SOFTWARE TIME BOMB
SOFTWARE TOOLS
SOFTWARE TRANSFORM
SOFTWARE TRANSFORM(ATION)
SOFTWARE TRANSFORM(ATION)
SOFTWARE TRANSFORMATION
SOFTWARE VIRUS
SOFTWAREBASED ACCESS CONTROL SYSTEM
SOFTWAREBASED ENCRYPTION
SOFTWAREBASED PASSWORD
SOFTWAREBASED SECURITY
SOLUTION
SOLUTION OF HIGH PROBABILITY
SOLUTION SPACE
SOLVABLE CIPHER
SOLVE
SOLVE A CIPHER
SOLVE BY CRYPTANALYSIS
SOLVE THE CRYPTOGRAM
SOLVED CIPHER
SOLVING ALGORITHM
SONOGRAMM
SOPHISTICATED (CRYPTO)SYSTEM
SOPHISTICATED (CRYPTO)SYSTEM
SOPHISTICATED CRIMINAL
SOPHISTICATED CRYPTOSYSTEM
SOPHISTICATED EAVESDROPPER
SOPHISTICATED ENCRYPTION DEVICE
SOPHISTICATED INTRUDER
SOPHISTICATED SYSTEM
SORTING
SOUNDNESS
SOURCE
SOURCE ALPHABET
SOURCE AUTHENTICATION
SOURCE CODER
SOURCE CODING
SOURCE CRYPTOR
SOURCE DATA
SOURCE DOCUMENT
SOURCE KEY
SOURCE LABEL
SOURCE LANGUAGE
SOURCE REPUDIATION
SOURCE ROUTE BRIDGING
SOURCE ROUTING
SOURCE ROUTING PROTOCOL
SOURCE STATION
SOURCEDESTINATION PAIR
SOURCETODESTINATION ENCRYPTION
SPA
SPACE
SPACE COMPLEXITY
SPACEDIVISION MULTIPLE ACCESS
SPACETIME DIVISION MULTIPLE ACCESS
SPACETIME SYSTEM
SPACING
SPAN
SPARE KEY
SPARSITY
SPC
SPEAK THE PASSWORD
SPEAKER
SPEAKER ID
SPEAKER IDENTIFICATION
SPEAKER RECOGNITION
1
2
T: 88