ARC4
=
RC4
AKIT
Inglise
Eesti
#
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
A
A+
a11y
A5/
A5/1
AAA
AAR (1)
AAR (2)
ABAC
abandonware
ABAP
Abelian group
ability
ABIS
abnormal activity
abnormality
abominable environment
abort statement
absolute coordinate
absolute domain name
absolute URL
absolute vector
abstract (1)
abstract (2)
abstract (3)
abstract class
abstract data type
abstract from the birth register
abstraction (1)
abstraction (2)
abstract operation
A/B testing
abuse (1)
abuse (2)
abuse handler
abuser
abusive content (1)
abusive content (2)
AC adapter
accelerator key
acceptable
acceptable biometric capture attempt
acceptable capture attempt
acceptable interruption window
acceptable ranges or formats
acceptable use
acceptable use policy
acceptance (1)
acceptance (2)
acceptance criteria
acceptance of conformity assessment results
acceptance procedures
acceptance report
acceptance test
accepted risk
accept statement
access (1)
access (2)
access attempt
access authority
access badge
access card
access complexity (1)
access complexity (2)
access control (1)
access control (2)
access control certificate
access control decision function
access control decision information
access control enforcement function
access control information
access control list
access control matrix
access control mechanism
access control policy
access control policy rule
access control token
access control vestibule
access credential
access credentials
access for all (1)
access gateway
accessibility
accessibility testing
access key (1)
access key (2)
access key (3)
access level
access list (1)
access list (2)
access log (1)
access log (2)
access management
access matrix
access mode (1)
access modifier
access network
accessor
access path
access period
access permission
access point (1)
access point (2)
access point mapping
access point name
access policy
access profile
access request
access request access control decision information
access request access control information
access request-bound access control information
access right
access rights of the data subject
access time
access to a scheme
access transparency
access type (1)
access type (2)
accident
accidental damage
accidental sample
accommodation (1)
accommodation (2)
Accordion
accountability (1)
accountability (2)
accountable (1)
accountancy
account data
account disabling
account harvesting
accounting (1)
accounting (2)
accounting management
account lockout
account lockout attack
account lockup
account name
accreditation (1)
accreditation (2)
accreditation authority
accreditation body
accredited evaluation agency
accrediting authority
accuracy
accuracy of biometric data
accuracy of measurement
accurate
ACID
ACINT
acknowledge (1)
acknowledge (2)
ACL
acoustic cryptanalysis
acoustic emission
acoustic infection
acoustic intelligence
acoustic microscope
ACOUSTINT
acquire (1)
acquire (2)
acquire (3)
acquired biometric sample
acquirer
acquisition (1)
acquisition (2)
acquisition cost
acquisition of license
acquisition of patent
acquisition profile
ACTA
action (1)
action (2)
action (3)
actionable
action link
action program
activate
activation (1)
activation (2)
activation function
activation key
activation record
active
active adversary
active alert
active attack
active authentication
active content
Active Directory
active impostor attempt
active memory
active reconnaissance
active security testing
active threat (1)
active topology
active wiretapping
ActiveX
ActiveX control
activity (1)
activity (2)
activity (3)
activity (4)
activity (5)
activity diagram
activity monitor (1)
actor
actual
actual level of trust
actuation force
actuator
acyclic dependency principle
adapt
adaptability
adaptability testing
adaptation
adaptation sequence
adapter server
adaptive
adaptive attack
adaptive chosen-ciphertext attack
adaptive chosen-message attack
adaptive chosen-plaintext attack
adaptive control
adaptive maintenance
adaptive planning
Adblock
ad blocker
A/D converter
adder
ADDIE
add-in
adding machine
addition (1)
addition (2)
additional safeguard (1)
additional safeguard (2)
additive group
add-on
add-on security (1)
add-on security (2)
add-on service
address
addressability
address book
address munging
address offset
address of record
address resolution
address space
address space layout randomization
AdES
ADF
ad fraud
adherence to performance criteria
adhesive (1)
adhesive binding
ad hoc
ad hoc network
ad hoc testing
ad hominem
ad injection
adjudicator
adjust (1)
adjust (2)
adjusted size
ADM
administer
administrate
administrative account
administrative privileges
administrator (1)
administrator (2)
Admiralty code
admissibility of evidence
ADMS (1)
ADMS (2)
ADN (1)
adoption (1)
adoption (2)
adoption (3)
adoption document (1)
adornment (1)
ADR (1)
ADS (1)
ADSL
ADT
ADTree
advanced electronic signature
advanced persistent threat
advanced user
Advanced Vector Extensions
advance fee fraud
advantage (1)
advantage (2)
advantage (3)
advantage (4)
advantage (5)
adversarial learning
adversarial machine learning
adversarial model
adversarial training
adversary (1)
adversary (2)
adversary (3)
adverse action (1)
adverse action (2)
advertise (1)
advertise (2)
advisory (1)
advisory (2)
adware
adware remover
AEAD
AES
AES-SIV
AF
affect
affected area
affiliate cookie
affine space
affine transformation
affinity (1)
affinity (2)
affinity (3)
affinity (4)
affinity (5)
affix
AFIS (1)
AFIS (2)
after-action report
after-action review
agenda (1)
agenda (2)
agent
aggregate (1)
aggregate (2)
aggregated
aggregated value (1)
aggregated value (2)
aggregate signature
aggregation
aggregator
agile development
A-GPS
agreement (1)
agreement (2)
agreement group
AH
AI
AI agent
AI component
AIDS
AIN
AI planning
air cap (1)
air cap (2)
air gap (1)
air gap (2)
air gap (3)
air gap bridging
air gap hacking
air-gap malware
air-gapped network
air-gapped system attack
Air Interface Standard
airjet duster
AI system
AJAJ
AJAX
AKIT
alarm
alarm processor
ALE
alert (1)
alert (2)
alertable event
alert management
alert situation
alert threshold
algebra
algebraically closed field
algebraically independent set
algebraic closure (of a field)
algebraic element (of extension field)
algebraic equation
algebraic extension (field)
algebraic group
algebraic number
algebraic number field
algebraic structure
algebraic variety
algorithm
algorithmic complexity
algorithmic monitoring
alias (1)
alias (2)
alias (3)
aliasing (1)
aliasing (2)
Alice
alien's passport (1)
alien's passport (2)
align
all-around defense
all clear
all-hazards
allocability
allocate
allocated space
allocation
allocation of an entitlement
allocator
allow statement
all rights reserved
alphabet (1)
alphabet (2)
alpha character (1)
alpha character (2)
alphanumeric
alphanumeric data
alpha testing
alpha version
alteration
alternate facility
alternate process
alternate site
alternate worksite
alternative design
alternative measure (1)
alt operator
ambient intelligence
ambient temperature (1)
ambient temperature (2)
ambient temperature (3)
ambush
ambush marketing
AMD
AML (1)
AML (2)
Amoeba
amoeba infection
amount (1)
amount (2)
amplification attack
analog
analog data
analog output (1)
analog output (2)
analog output (3)
analog recording device
analog representation
analog signal
analog signature analysis
analog-to-digital converter
analogue form element
analysability
analysis
analysis area
analysis system
analyst
analytical model
analytics
analyzer (1)
analyzer (2)
ancestor
ancestor key of an entity x
ancestor node
anchor
anchor node
Android
AndroRAT
ANF
ANN (1)
annotate
annotation (1)
annotation (2)
annoyware
annualized loss expectancy
annualized rate of occurrence
annual loss
anomalous
anomalous propagation
anomaly
anomaly-based detection
anon
anonymity
anonymization
anonymized
anonymized biometric data record
Anonymous
anonymous (1)
anonymous (2)
anonymous login
anonymous P2P network
anonymous remailer
anoprop
ANPR
ANSI
answered call rate
answering machine
answerphone
ant
antecedent
anthropometric landmark
anthropometric landmark code
antialiasing
anti-anti-forensics
anti-bugging
anti-burglar alarm
anti-copy paper (1)
anti-copy paper (2)
anti-copy pattern
anti-counterfeiting
anti-DoS protection
anti-forensics
anti-jam
anti-laundering software
anti-malware
antimalware
anti-malware scan
anti-money laundering
antipattern
antiphishing
anti-reflection (1)
anti-reflection (2)
antireflexive relation
anti-scan pattern
anti-scan screen
anti-shoplifting
anti-spam
anti-spoof
anti-spyware
antispyware software
anti-Stokes ink
antisymmetric relation
anti-theft
anti-theft device
antivirus
antivirus storm
anycast address
AoIP
AOP
AOSS
Apache
Apache Hadoop
Apache Lucene
Apache Subversion
APC-O
aperture data
API
API call
APIC (Cisco)
APIC (Intel)
API first
API key
API token
APK
APN
app (1)
app (2)
APP (3)
AppArmor
app blocker
appeal (1)
appeal (2)
appeal (3)
appearance
appender
app flipping
Apple
Apple picking
applet
applicable requirement
applicable tax
applicant
application (1)
application (2)
application (3)
application (4)
application (5)
application (6)
application-aware firewall
application behaviour portability
application blacklist
application blocker
application capabilities type
application cloud service
application delivery network
application firewall
application form
application instruction portability
application layer
application layer filtering
application level gateway
application mapping
application marketplace
application metadata portability
application normative framework
application owner
application policy portability
application portability
application profile *
application program
application programming interface
application project
application proxy
applications
application security control
application security life cycle reference model
application security management process
application server
application server
application service provider
application services
application service virtualization
application software
application-specific integrated circuit
application stripe
application syntactic portability
application technique
application virtualization
application whitelist
applied statistics
apply (1)
apply (2)
apply (3)
apply (4)
apportioned effort
appreciation information
appropriate law enforcement and other government officials
appropriate law enforcement and other government officials*
appropriateness recognizability *
appropriation (1)
appropriation (2)
approval
approval authority
approval letter
approve (1)
approved
approved assessment body
approved body
approved device
approved laboratory
approved maintenance organization
approved model
approved surveillance firm
approximate (1)
approximate (2)
approximation
APT
APT1
APT10
APT12
APT16
APT17
APT18
APT19
APT2
APT20
APT27
APT28
APT29
APT3
APT30
APT31
APT32
APT33
APT34
APT35
APT37
APT38
APT39
APT40
APT41
APT5
arbitrary
ARC4
Arcbomb
ARCFOUR
archetype
architect
architecture
archival
archival storage
archive (1)
archive (2)
archive (3)
archive (4)
arc testing
area (1)
area (2)
area at risk
area chart
argument (1)
argument (2)
arithmetic mean
arity
armored virus
ARO
ARP
ARP poisoning
ARP spoofing
ARQ
arrange (1)
arrange (1)
arrange (1) *
arrange (2)
arrange (2)
array (1)
array (2)
array language
array processor
array slice
array type
arrow diagram
arrow function
arrow notation
artefact (1)
artefact (2)
Article 12
artifact (1)
artifact (2)
artifact analysis
artificial
artificial intelligence (1)
artificial intelligence (2)
artificial intelligence system *
artificial neural network
as a service
ASC
ascendant
ascending order
ascending sort
ASCII
ASDF
ASDU
ASIC
ASIR (1)
ASIR (2)
as is
ASLR
ASMP
ASN.1
as-of-date
ASP
aspect (1)
aspect (2)
aspect-oriented programming
aspect ratio
assemble (1)
assemble (2)
assembler
assembly language
assertion
assertion token
assess (1)
assessment*
assessment centre*
assessment checklist
assessment content*
assessment distributor*
assessment form*
assessment of data
assessment report
assessment review body
assessment software*
assessment sponsor*
assessor
asset
asset inventory (1)
asset inventory (2)
asset management
assign (1)
assign (2)
assign (3)
assign (4)
assign (5)
assignment (1)
assignment (2)
assignment (3)
assist (1)
assistive technology
associated document
association (1)
association (2)
association (3)
associative array
associative binary operation
associative entity type
associativity
assumption (1)
assumption (2)
assurance (1)
assurance (2)
assurance (3)
assurance (4)
assurance of quality systems
assured forwarding
ASVS
asymmetric authentication method
asymmetric backdoor
asymmetric cipher
asymmetric cryptographic algorithm
asymmetric cryptographic technique
asymmetric cryptography
asymmetric cryptosystem
asymmetric encryption
asymmetric encryption system
asymmetric key encryption
asymmetric key pair
asymmetric key pair generator
asymmetric key system
asymmetric signature system
asynchronous
asynchronous stream cipher
ATAM
AT command
ATM (1)
ATM (2)
at mark (1)
at mark (2)
ATM bombing
ATM skimming
atomic (1)
atomic (2)
atomicity
attack (1)
attack (2)
attack cost
attack-defense tree
attacker
attack mechanism
attack pattern (1)
attack pattern (2)
attack potential
attack signature
attack surface
attack tree
attack vector
attempt
attendee
attenuation
attestation
attestation identity key
attestation of competence
attestation of professional qualifications
attitude
atto-
attractiveness
attribute
attribute-based access control
attribute-based encryption
attribute data management system
attribute disclosure
attribution (1)
attribution (2)
attribution (3)
audience (1)
audience (2)
audience (3)
audience (4)
audio induction loop system
audio over IP
audit (1)
audit (2)
auditability
audit acknowledgement report
audit activity
audit client
audit conclusion
audit criteria
auditee
auditee organization
audit evidence
audit findings
audit function
auditing organization
audit log
audit logging
audit mode
auditor (1)
auditor (2)
audit plan
audit program
audit programme
audit report (1)
audit report (2)
audit risk
audit scope
audit team
audit tool (1)
audit tool (2)
audit trail (1)
audit trail (2)
audit trail (3)
audit trailing
augmentation (1)
augmentation (2)
augmented assignment
augmented password-authenticated key agreement
augmented reality
AUP
authentic
authenticated Byzantine agreement problem
authenticated Byzantine agreement protocol
authenticated encryption
authenticated identity
authenticated mode
authentication
authentication bypass
authentication certificate
authentication confirmation
authentication context
authentication context class
authentication data
authentication element
authentication exchange
authentication factor
authentication function
authentication information
authentication initiator
authentication key
authentication protocol
authentication protocol run
authentication request
authentication secret
authentication server
authentication solution
authentication tag
authentication ticket
authentication token
authentication tool
authenticity
authentic material good
author (1)
author (2)
author (3)
authoring language
authorised processor (Estonia)
authoritative source
authority (1)
authority (2)
authority (3)
authority (4)
authority (5)
authorization (1)
authorization (2)
authorization certificate
authorization code flow
authorization request
authorization to represent a company
authorized
authorized economic operator
authorized restriction
authorized user
autocompletion
autocorrelation
autodiscovery
autoextend
auto-lock
automated driving
automated fingerprint identification system
automated interpretation
automated interpretation
automated planning and scheduling
automated regression test
automated testing
automatic
automatic boom barrier
automatic control (1)
automatic control (2)
automatic control (3)
automatic document feeder
automatic learning
automatic monitoring
automatic navigation
automatic number-plate recognition
automatic repeat request
automatic summarization *
automatic validation
automatic verification
automation (1)
automation (2)
automaton*
automounter
automounting
autonomic
autonomic computing
autonomous
autonomous
autonomous
autonomous device
autonomous driving
autonomous robot
autonomous system
autonomous vechicle
autonomy*
auto purge
auto rooter
autorun
autotomic signature
auto-update
auto-wipe
availability (1)
availability (2)
availability domain or zone
availability tier
available (1)
available (2)
avatar
AV storm
axiom
Toimub laadimine
ARC4
=
RC4
Palun oodake...
Katkesta
Tõrge
ARC4
=
RC4
Andmete allalaadimisel või töötlemisel esines tehniline tõrge.
Vabandame!
Sulge