Examples of using Computer security in English and their translations into Russian
{-}
-
Official
-
Colloquial
This provides maximum protection level against computer security threats arising when exchanging files with external devices.
The Rainbow Series(sometimes known as the Rainbow Books) is a series of computer security standards and guidelines published by the United States government in the 1980s and 1990s.
In computer security, a hash chain is a method to produce many one-time keys from a single key or password.
Such projects would bring together experts in crime prevention, computer security, criminal legislation
reports concerning computer security problems.
Chapter 7 of Computer Security and Cryptography(Konheim, Alan G.,
This provides maximum protection level against computer security threats arising when exchanging files with external devices.
tools to bypass computer security tools.
The Computer Security and Industrial Cryptography research group, commonly called COSIC, is a research
Its audience! consists of those who are interested in computer security, including experts in this field.
Ural Federal University IT programmes include Computer Security,(specialist's degree,
Active computerization and informatization of nuclear industry leads to the need for computer security improvement at nuclear facilities.
Computer security, maintenance and equipment listings, information technology controls, Atlas user access.
In order to enhance computer security, two draft laws were under examination to update Law No. 19.223,
UNDP agreed with the Board's recommendation that it regularly review computer security and communication controls.
Purism manufactures the Librem personal computing devices with a focus on software freedom, computer security, and Internet privacy.
Development and/or use of informational technologies for solving problems of modeling, computer security, including the security of data used in modeling.
Kaspersky Embedded Systems Security runs a single scan of the specified area for viruses and other computer security threats.
is an American independent journalist, computer security researcher, artist, and hacker.
The Maximum protection security level is recommended if you have higher requirements for computer security on your organization's network.