Словари
Англо-русский словарь по компьютерной безопасности
Слова
Поиск
Слова на "U" в Англо-русском словаре по компьютерной безопасности
(
2
И
П
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Все
UA
UB
UD
UI
UL
UM
UN
UP
UR
US
UT
UU
Список всех слов на букву U
Англо-русский словарь по компьютерной безопасности содержит 329 слов на букву U
Слова, начинающиеся на букву U
UART
UBIQUITUOS ACCESS
UBS INFORMATION
UDF
UDM
UIC
UID
ULP
ULTRASONIC ALARM
ULTRASURVIVABLE
UMIG
UNACCEPTABLE INTRUDER
UNACCEPTABLE MESSAGE
UNAMBIGUITY
UNAMBIGUOUS ID
UNAMBIGUOUS IDENTIFICATION
UNANTHORISED FUNCTIONALITY
UNANTHORIZED DATA
UNANTHORIZED DIALIN
UNANTHORIZED DISCLOSURE
UNANTICIPATED INTERRUPTION
UNATTENDED ACCESS
UNATTENDED OPERATION
UNAUTHENTIC MESSAGE
UNAUTHORISED (TELE)COMMUNICATION
UNAUTHORISED (TELE)COMMUNICATION
UNAUTHORISED COMMUNICATION
UNAUTHORISED TELECOMMUNICATION
UNAUTHORISED TRANSMISSION
UNAUTHORIZED
UNAUTHORIZED ACCESS
UNAUTHORIZED ACCESS BLOCKING
UNAUTHORIZED ACTIVITY
UNAUTHORIZED ALTERATION
UNAUTHORIZED APPLICATION
UNAUTHORIZED COPYING
UNAUTHORIZED DECRYPTING
UNAUTHORIZED DECRYPTION
UNAUTHORIZED DISSEMINATION
UNAUTHORIZED ENTRANCE
UNAUTHORIZED ENTRY
UNAUTHORIZED INDIVIDUAL
UNAUTHORIZED INFORMATION
UNAUTHORIZED INFORMATION GENERATION
UNAUTHORIZED LISTENER
UNAUTHORIZED LOGIN
UNAUTHORIZED MODIFICATION
UNAUTHORIZED MONITOR
UNAUTHORIZED OPENING
UNAUTHORIZED OPERATION
UNAUTHORIZED OUTSIDER
UNAUTHORIZED PARTY
UNAUTHORIZED PASSAGE
UNAUTHORIZED PASSWORD
UNAUTHORIZED PENETRATION
UNAUTHORIZED PERSON
UNAUTHORIZED PROCESS
UNAUTHORIZED PROGRAM
UNAUTHORIZED READING
UNAUTHORIZED RECEIVER
UNAUTHORIZED RECEPTION
UNAUTHORIZED RELEASE
UNAUTHORIZED TERMINAL
UNAUTHORIZED TRAFFIC
UNAUTHORIZED TRANSMITTER
UNAUTHORIZED USE
UNAUTHORIZED USER
UNBOOTABLE DISK
UNBREAKABILITY
UNBREAKABLE (CRYPTO)SYSTEM
UNBREAKABLE (CRYPTO)SYSTEM
UNBREAKABLE ALGORITHM
UNBREAKABLE CODE
UNBREAKABLE CRYPTOALGORITHM
UNBREAKABLE CRYPTOALGORITM
UNBREAKABLE CRYPTOSYSTEM
UNBREAKABLE KEY
UNBREAKABLE SECURITY
UNBREAKABLE SYSTEM
UNC
UNCERTAINTY
UNCHANGABLE KEY
UNCLASSIFIED
UNCLASSIFIED BUT SENSITIVE INFORMATION
UNCLASSIFIED INFORMATION
UNCLASSIFIED NETWORK
UNCLASSIFIED SECURITY LEVEL
UNCLEARED
UNCLEARED PERSONNEL
UNCOMPROMISED KEY
UNCONCEALED PLAINTEXT
UNCONDITIONAL AUTHENTICATION
UNCONDITIONAL SECRECY
UNCONDITIONAL SECURITY
UNCONDITIONALLY CRYPTOSECURE
UNCONDITIONALLY SECURE
UNCONDITIONALLY SECURE CIPHER
UNCONDITIONNALLY SECURE SYSTEM
UNCONTROLLED ENVIRONMENT
UNCONTROLLED TERMINAL
UNCOPYABLE
UNCOPYABLE DISK
UNCORRELATED SEQUENCE
UNCORRELATED STRING
UNDECIPHERABILITY
UNDECTDABLE PROBLEM
UNDEGRADED SPEECH
UNDENIABLE SIGNATURE
UNDERCLASSIFICATION
UNDERMINE THE SECURITY
UNDERUTILIZATION
UNDESIRED EVENT
UNDETECTABLE ACCESS
UNDETECTED ERROR
UNDETECTED MONITOR
UNDETECTED PENETRATION
UNDIRECTED (TELE)COMMUNICATION
UNDIRECTED (TELE)COMMUNICATION
UNDIRECTED COMMUNICATION
UNDIRECTED TELECOMMUNICATION
UNDUPLICATABLE KEY
UNENCIPHERED TEXT
UNENCRYPTED
UNESCORTED ACCESS
UNESCORTED ENTRANCE
UNFACTORABLE
UNFORGEABILITY
UNFORGEABLE ID
UNFORGEABLE IDENTIFIER
UNFORGEABLE SIGNATURE
UNI
UNICITY
UNICITY DISTANCE
UNICITY POINT
UNIDIRECTIONAL CHANNEL
UNIDIRECTIONAL FUNCTION
UNIDIRECTIONAL HANDSHAKING
UNIDIRECTIONAL PROPERTY
UNIFORM DATA MODEL
UNIFORM DISTRIBUTION
UNIFORM SEQUENCE
UNIFORM STRING
UNINTELLIGIBLE
UNINTENDED ACCESS
UNINTENDED ACCESS PATH
UNINTENDED RECEIVER
UNINTENTIONAL EAVESDROPPING
UNINTENTIONAL EMISSION
UNINTENTIONAL HUMAN ERROR
UNINTENTIONAL THREAT
UNINTERCEPTABLE
UNINTERRUPTED OPERATION
UNINTERRUPTIBLE POWER SUPPLIER
UNINTERRUPTIBLE POWER SUPPLY
UNINTERRUPTIBLE POWER SYSTEM
UNIQUE DECIPHERABILITY
UNIQUE DECRYPTING
UNIQUE DECRYPTION
UNIQUE FACTORIZATION
UNIQUE FACTORIZATION THEOREM
UNIQUE ID
UNIQUE IDENTIFIER
UNIQUE SOLUTION
UNIQUE SUBSTITUTE
UNIQUE SUBSTITUTION
UNIQUELY ENCRYPTABLE
UNIT
UNITED STATES STANDARD
UNIVERSAL ASYNCHRONOUS RECEIVER/TRANSMITTER
UNIVERSAL ID
UNIVERSAL IDENTIFIER
UNIVERSAL KEY
UNIVERSAL MESSAGING INTEROPERABILITY GROUP
UNIVERSAL REMOTE PROCEDURE CALL
UNIVERSALLY ACCESSIBLE KEY
UNIVOCAL CORRESPONDENCE
UNIX TO UNIX COPY PROGRAM
UNKEYED SUBSTITUTE
UNKEYED SUBSTITUTION
UNKNOWN ID
UNKNOWN IDENTIFIER
UNKNOWN KEY
UNKNOWN PARAMETER
UNLIMITED ACCESS
UNLOCK THE CIPHER
UNMODIFIABLE
UNORDERED SEQUENCE
UNORDERED STRING
UNPATTERNED SEQUENCE
UNPATTERNED STRING
UNPREDICTABILITY
UNPREDICTABLE CODE
UNPREDICTABLE KEY
UNPREDICTABLE SEQUENCE
UNPREDICTABLE STRING
UNPROTECTED LINE
UNPROTECTED STATE
UNPUBLISHED KEY
UNREADABLE DATA
UNREADABLE KEY
UNRECOVERABLE MESSAGE
UNRESTRICTED ACCESS
UNSAFE
UNSCHEDULED JOB
UNSCRAMBLER
UNSCRAMBLING
UNSCRAMBLING PROCESS
UNSECURED CONNECTION
UNSHIELDED TWISTED PAIR
UNSOLICITED INPUT
UNSOPHISTICATED USER
UNSUBVERTIBLE ACCESS CONTROL
UNSUCCESSFUL ATTEMPT
UNTAMPERED KEY
UNTAPPABLE
UNTAPPABLE CHANNEL
UNTRACEABILITY
UNTRUSTWORTHY INFORMATION
UNTRUSTWORTHY PROGRAM
UNWANTED TRANSMISSION
UNWARRANTED ACCESS
UNWARY
UP FREQUENCY HOPPING
UPDATE
UPDATED KEY
UPDATING
UPDATING PROCEDURE
UPDISTURBED TRANSMISSION
UPGRADE REGISTRY
UPGRADED SECURITY
UPGRADING
UPLINK
UPLINK CHANNEL
UPPER LAYER PROTOCOL
UPS
UPTIME
URPC
USABILITY
USABLE RADIO FREQUENCY SPECTRUM
USAGE RIGHT
USE
USED KEY
USEFUL INFORMATION
USEONCE PASSWORD
USER
USER ACCEPTABILITY
USER ACCESS
USER ACCESS PRIVILEGE
USER ACTIVITY
USER ACTIVITY ANALYSIS
USER ACTIVITY LOG
USER AGENT
USER ANONYMITY
USER APPLICATION NETWORK
USER AREA
USER AUTHENTICATION
USER CHANNEL
USER DEVICE
USER ENVIRONMENT
USER ID
USER IDENTIFICATION CODE
USER IDENTIFICATION NUMBER
USER IDENTIFICATION TOKEN
USER IDENTIFIER
USER INFORMATION
USER ISOLATION
USER KEY
USER LANGUAGE
USER LOCK
USER LOCK(OUT)
USER LOCK(OUT)
USER LOCKOUT
USER MUTUAL AUTHENTICATION
USER ORIENTED ENCRYPTION
USER PASSWORD
USER PERSONNEL
USER PROFILE
USER PROGRAMMABLE STRUCTURE KEY
USER REQUEST INTERPRETER
USER REQUIREMENTS
USER TERMINAL
USER TO USER (TELE)COMMUNICATION
USER TO USER (TELE)COMMUNICATION
USER TO USER COMMUNICATION
USER TO USER TELECOMMUNICATION
USER TRANSPARENCY
USER VALIDATION
USER'S CLEARANCE
USER'S CODE
USER'S DATA
USER'S DOMAIN
USER'S PERSONAL KEY
USER(TO)NETWORK INTERFACE
USER(TO)NETWORK INTERFACE
USER/COMPUTER (TELE)COMMUNICATION
USER/COMPUTER (TELE)COMMUNICATION
USER/COMPUTER COMMUNICATION
USER/COMPUTER TELECOMMUNICATION
USERASSIGNED KEY
USERAUTHORIZED KEY
USERCHANGEABLE PASSWORD
USERCHOSEN PASSWORD
USERDEFINED
USERDEFINED FUNCTION
USERDEFINED KEY
USERENTERED
USERENTERED KEY
USERENTERED PASSWORD
USERFRIENDLY
USERID
USERKEYED
USERLEVEL KEY
USERLEVEL KEY MANAGEMENT
USERMODIFIED ALGORITHM
USERNAME ACCESS
USERNETWORK ACCESS
USERPROGRAMMABLE
USERROLEBASED SECURITY
USERSCOOTED KEY
USERSELECTED CODE
USERSELECTED PARAMETER
USERSELECTED PASSWORD
USERSPECIFIC ENCRYPTION
USERSUPPLIED INFORMATION
USERTOUSER ENCRYPTION
USERTOUSER INFORMATION
USS
UTP
UUCP
T: 69