partial ordering (2)
=
ordering
AKIT
Inglise
Eesti
#
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
P
p13n
P2MP
P2P (1)
P2P (2)
P2P botnet
P2P network
P2PSIP
P3
PaaS
PACE
PAC file
pack (1)
package (1)
package (2)
package (3)
package (4)
package (5)
package diagram
package format
package manager
packaging (1)
packet
packet analyzer
packet capture
packet delay variation
packet filter
packet filtering
packet flow
packet logging
packet loss
packet monkey
packet repeater
packet sniffer
packet-switched
packet switching
PAD (1)
padding (1)
padding (2)
padding symbol
paddle
PAdES
p-adic norm
padlock
padlocking
page description language
page fault
page hit
page out
page tag
pagination (1)
pagination (2)
pagination (3)
paging (1)
paging (2)
PAI (1)
Paillier cryptosystem
pain threshold
pairing
pairing-based cryptography
pair programming
pairwise coprime set
palm
palm print
PAM
PAN (1)
PAN (2)
pancake coil
panel
panic alarm
panic button
panic content
PAN truncation
paparazzo
paper size
parallel
parallel bus
parallel communication
parallel computing
parallel garbage collector
parallel processing
parameter
parameter association *
parameterize
parameterized class
parameter list
parameter tampering
parasitic virus
parent
parenthesis
parent network (1)
parent network (2)
parent node
parent type
Pareto analysis
Pareto chart
Pareto principle
Paris Convention
parity (1)
parity (2)
parity bit
parked domain
par operator
parse
parser
parsing
partial derivative
partial knowledge
partial ordering (1)
partial ordering (2)
participant
participation
partition (1)
partition (2)
partition (3)
partitioning (1)
partition table
partnering
partner portal
partnership (1)
partnership (2)
part-of-speech tagging *
party
pasigraphy (1)
Pasigraphy (2)
PASR
pass card
passcode
pass/fail criteria
passive attack
passive authentication
passive FTP
passive reconnaissance
passive response
passive threat
passive wiretapping
passphrase
passport
passport card
pass the hash
pass-the-hash attack
passthought
password
password attack
password-authenticated key agreement
password blacklist
password card
password cracker
password cracking
password-entangled key token
password entropy
password generator
password hardening
password hash
password management
password manager
password policy
password protection
password spray
password synchronization
password verification
password verification data
pastebin (1)
pastebin (2)
patch
patch cable
patch cord (1)
patch cord (2)
patching (1)
patching (2)
patch level
patch management
patch panel
patent
patentable subject matter
patent claims
patent declaration
patented subject matter
patenting
patent statement and licensing declaration
path
PATH
path coverage
path traversal
pattern
pattern area
pattern recognition
pause operation
Pawn Storm
pay for privacy
payload (1)
payload (2)
payment card
payment card number
pay-per-click
pay-per-use
paywall
payware
PbD
PBKDF2
PBNAC
P-box transformation
PBX
PC (1)
PC (2)
PCA
PCAP
PCB (1)
PCBC mode
PC blade
PC Cyborg Trojan
PCI DSS
PCIe
PCI-E
PCI Express
PCI SSC
PCoIP
PDA (1)
PDCA model
PDD
PDF (1)
PDF (2)
PDH
PdM
PDM
PDoS attack
PDP (1)
PDT
PDU
PDV
peak time (1)
peak time (2)
peak time (3)
PEAP
pebi-
PED
peer assessment
peer certificate
peer cloud service
peer cloud service provider
peer entity
peer entity authentication
peering
peering point
peer review (1)
peer review (2)
peer-to-peer attack
peer-to-peer file sharing
peer-to-peer network
Pegasus (1)
Pegasus (2)
Pegasus (3)
Pegasus (4)
PEM
pen azimuth
pen elevation
penetration
penetration signature
penetration testing
pen rotation
pen tablet
pentagon (1)
pen test
pen testing
pen tilt along the x axis
pen tilt along the y axis
people aspects of business continuity
people at risk
peopleware
PEP (1)
percent complete
percussive maintenace
perfect backward secrecy
perfect forward secrecy
perfective maintenance
perfect secrecy
perfect security
performance (1)
performance (2)
performance (3)
performance appraisal
performance efficiency *
performance evaluation
performance feature
performance graph
performance management (1)
performance management (2)
performance parameter
performance report
performance reporting
performance test
per-hop behavior
perimeter
perimeter firewall
perimeterless security
perimeter network
perimeter security
periods processing
peripheral (1)
peripheral (2)
peripheral equipment
peripherals
Periscope Group
permalink
permanent cookie
permanent denial-of-service attack
permanent error
permissibility
permission
permissioned ledger
permissionless ledger
permit (1)
permit (2)
permutation
permutation-based anonymization
permutation cipher
perpetual license
persistence (1)
persistence (2)
persistent BIOS infection
persistent cookie
persistent data
persistent data structure
persistent memory
persistent storage
persistent store
persistent threat
persistent URL
person (1)
person (2)
personal area network
personal biometric data
personal computer
personal data
Personal Data Protection Act (Estonia)
personal firewall
personal genetic data
personal identification code
personal information
personalization
personally identifiable financial information
personally identifiable information
personal name
personal risk
personal security (1)
personal security (2)
Personal Security (3)
personal service robot
personal trait
personnel
personnel department
personnel security
personnel skills record *
person of interest
pertinent data
pervasive computing
PESQ
PET (1)
peta-
Peter principle
pet name (1)
Petri net
Petya
PFP (1)
pfSense
PGP
phablet
phage
pharming
PHB
phishing
phlashing
phone
phone banking
phone call
phone call record
phone cloning
phone communication
phone fraud
phoneme
phone scam
photocopier
photoluminescense
photo patch
Photuris
PHP
PHP object injection
phreaker
phreaking
physical access
physical access controls
physical architecture
physical asset
physical attack surface
physical layer
physical object
physical privacy
physical sector
physical security
physical threat
PIA
picklist
picklock
pico-
picocell
piconet
pictogram
picture processing
pidgin
pie chart
PIFI
pig butchering scam
pigeonnet
piggyback attack
piggybacking (1)
piggybacking (2)
piggybacking (3)
piggybacking (4)
piggybacking (5)
PII
PII controller
PII principal
PII processor
pillarbox
pilot project
pilot's licence
pilot study (1)
pilot study (2)
PIM
pin (1)
pinboard
PIN calculator
PIN code
PIN entry device
ping (1)
ping (2)
pingback
ping flood
ping of death
ping pong attack
ping sweep
ping time
PIN lock
PIN pad (1)
PIN pad (2)
pipeline (1)
pipeline (2)
piracy
pirated
pirated software
pitfall
pivot (1)
pivot (2)
Pivot (3)
pivot display
pivoting
pivot table
PivotX
pixel
pixel depth
pixel map
pixel value
PKCS
PKI
placeholder
plagiarism
plain fingerprint image
plaintext (1)
plaintext (2)
plaintext injection attack
plaintext key
plan (1)
plan (2)
plane
Planguage
planned finish date
planned obsolescence
planned start date
planner (1)
planner (2)
planner (3)
planning
plastic
plastic binding
platen (1)
platen (2)
platform
platform as a service
platform capabilities type
platform independent
platform independent model *
platform specific model
plausibility
plausible deniability
playback attack
playbook
playground
PLC
pleasure (1)
plesiochronous
PL/SQL
plug (1)
plug (2)
plug (3)
plug and play
pluggable authentication module
plugin (1)
plugin (2)
plugin (3)
PlugX
PMAC
PMBoK
PNAC
PNG
POC (1)
POC (2)
podcast
podslurping
PoE
POE
POI
Pointcheval-Stern signature
pointer (1)
pointer (2)
pointer record
pointer type
pointing device
point-numbering
point of contact
point of encryption
poInt of interest
point of order k (of an elliptic curve)
point of sale
point-to-multipoint communication
point-to-point
point-to-point key establishment
point-to-point security
polar chart
polarization
polarized light
police authority
policy
policy-based management
policy decision point
policy enforcement point
policy engine
policy interoperability
policy server
Polish notation
political privacy
politics
polling (1a)
polling (1b)
polling (2)
POLP
polycarbonates
polygraph (1)
polygraph (2)
polymorphic generator
polymorphic malware
polymorphic virus
polymorphism
polynomial (1)
polynomial (2)
polynomial equation
polynomial texture mapping
polysemyphobia
poly wheel
Ponzi scheme
pool of data
POP3
populate
population (1)
population (2a)
population (2b)
population (3)
pop-under
pop-up
pop-up blocking
pornado
pornography
pornware
port
portability
portable (1)
portable (2)
portable application
portable computer
portable computing device
portable data terminal
port agility
portal
port channel
port clearing
port filtering
portfolio
port forwarding
porting
port isolation
port knocking
port layer
portlet
port mirroring
port monitoring
portrait (1)
portrait (2)
port replicator
port scan
port scanner
port sweep
port trunking
POS
position (1)
position (2)
position (3)
position (4)
position (5)
position (6)
positional parameter
position information
positive biometric claim
positive-definite bilinear form
positive identification
positive semidefinite cone
positive semidefinite matrix
POS malware
possession factor
postal code
postamble breakpoint
postback URL
postcondition
post dial delay
postfix notation
postincident analysis
postmortem
postmortem dump
post office box
post-quantum cryptography
Post/Redirect/Get *
POST-redirect-GET
PostScript
posttest loop
posture (1)
posture (2)
potential digital evidence
potential improvement *
potentially unwanted software
potential vulnerability
POTS
POW
power (1)
power (2)
power (3)
power (4)
power (5)
power (6)
power (7)
power adapter
power analysis (1)
power brick
power cable *
power fingerprint
power fingerprinting
power harvester
power jack
power over Ethernet
power ratio (1)
power reset
power set
power strip
power supply
power usage effectiveness
power user
PP
ppc
PPD (1)
PPD (2)
PPP (1)
PPP (2)
PPP report
PPTP
practicality
practice (1)
practice run
PRADO (1)
PRADO (2)
prank
pre-alfa version
preamble
preamble breakpoint
precaution
precedence diagram
precedence relationship
precision
precomputation attack
precondition
preconfigured
precursor
predefined (1)
predefined (2)
predefined user profile
predetermined navigation
predicate
predicate logic
predict
predictability
predictable resource location
predicted ASC
predicted claim
prediction *
prediction application security rationale
prediction consumer
prediction framework
prediction initiator
predictive (1)
predictive (2)
predictive coding (1)
predictive coding (2)
predictive maintenance
predictive planning
predictive security
preemptive (1)
preemptive (2)
preference
preference for opt-in
preferences (1)
preferences (2)
prefix
prefix-free representation
prefix notation
preheader
pre-image
preimage
preimage attack
preinstalled malware
preinstalled rootkit
preliminary design review
pre-live
prelive
premaster secret
premises
prepaid
preparation (1)
preparation (2)
preparation for operation
preparedness
preproduction prototype
prerequisite
prescriptive rule
presence
presence information
presence server
presence technology
presentable (1)
presentation (1)
presentation (2)
presentation (3)
presentation attack
presentation attack detection
presentation attack detection feature
presentation attack instrument
presentation layer
presentation mixer
presentation program
present value
preservation
preserve (1)
pre-shared key
press release
pre-study
pretest loop
pretext
preventative
prevention
prevention of hazards and threats
preventive
preventive action
preventive maintenance
preview trailer
PRF
primary account number
primary actor
primary cloud service provider
primary domain
primary domain name
primary Ent
primary information structure
primary key
primary site
prime factorization
prime ideal
prime number
prime time
primitive
primitive type
principal (1)
principal (2)
principal (3)
principal (4)
principal (5)
principal (6)
principal (7)
principal (8)
principal component analysis
principal ideal
principle of factor sparcity
principle of least access
principle of least authority
principle of least privilege
principle of minimal privilege
printed circuit board
printed circuit module
printed documentation
printed RFID
printer (1)
printer (2a)
printer (2b)
printer (2c)
printer (3)
printer steganography
printout
print suppression (1)
print suppression (2)
print-through
prioritize (1)
prioritize (2)
prioritized activity
prioritized list
priority
priority call
PRISM
privacy
privacy by design (1)
privacy by design (2)
privacy engineering
privacy-enhancing technology
privacy filter
privacy guarantee
privacy impact
privacy impact assessment
privacy notice
privacy policy
privacy principles
privacy problem
privacy statement
private address
private branch exchange
private cloud
private element
private IP
private key
private key extraction algorithm
private key generator
private label
private network
private port
private security service provider
private service (1)
private set intersection
private type
private visa
private VLAN
privilege
privilege confusion
privileged
privileged access
privileged account
privileged command
privileged identity management
privileged process
privileged user
privilege elevation
privilege escalation
privilege management
PRNG
proactive routing
probabilistic logic
probabilistic reasoning
probability
probability density function
probability distribution
probability logic
probability measure
probability space
probability theory
probe (1)
probe (2)
problem and modification analysis
problem-oriented language
problem reduction
problem reporting
problem resolution
problem solving
procedural cohesion
procedural knowledge
procedure (1)
procedure (2)
procedure-oriented language
procedure word
proceeding system
process (1)
process (2)
process control device
process control system
processing
processing of personal data
processing of PII
process injection
process mining
processor (1)
processor (2)
processor box (1)
processor box (2)
procurement
procurement auction
procurement documentation
procurement language
procurement management plan
producer (1)
producer (2)
producer (3)
producer (4)
producibility
product (1)
product (2)
product (3)
product and service
product and service
product assurance
product catalog (1)
product catalog (2)
product catalogue (1) *
product catalogue (2)
product cipher
product code (1)
product code (2)
product fraud
production (1)
production (2)
production (3)
production data *
production environment
production file format
production/manufacturing stage
production server
production version
productivity
productivity software
product key
product operation (1)*
product operation (2)
product operation (3)
product operation (4)
product registration key
product scope
product supply engineer
product support
professional competence
professional secret
professional service robot
proficiency
profile
profiler
profiling
program (1a)
program (1b)
program (2)
programmable controller
programmable logic controller
programmatic
programming language
programming paradigm
program product
program-sensitive fault
progressive deployment
progressive web app
progress report
project
project charter
project definition
project engineer
project schedule network diagram
project statement
prologue
promiscuous mode
promote (1)
promote (2)
promote (3)
prompt
prompter
prong
proof (1)
proof (2)
proof (3)
proof (4)
proof (5)
proof (6)
proof of acceptance
proof of citizenship
proof of concept
proof of knowledge
proof of nationality (1)
proof of principle
proof of stake
proof of work (1)
proof of work (2)
proofreader
proof theory
propagate
property (1)
property (2)
property (3)
proportionality
proposal (1)
proposal (2) *
proposer
proposition (1)
proposition (2)
propositional calculus
proprietary format
proprietary information
proprietary privacy
proprietary software
proprietary standard
ProRat
protected session
protection (1)
protection (2)
protection by design (1)
protection by design (2)
protection profile
protection profile evaluation
protection requirement
protective cabinet
protector
Proteus
protocol
protocol analyser
protocol analysis
protocol data unit
protocol fuzzing
protocol model (1)
protocol model (2)
protocol specification
protocol stack
protocol state machine
protocol suite
prototype
prototype-based programming
prototyping
prove
provenance
provision (1)
provision (2)
provision (3)
provisional driving license
provisional passport
provisioning (1)
provisioning (2)
proword
prox card
proximity card
proximity sensor
proxy
proxy attack
proxy cache
proxy object
proxy pivoting
proxy server
proxy Trojan
PRP
PSAP
PSD2
pseudo-anonymization
pseudocode
pseudo-collision attack
pseudomessage *
pseudonym
pseudonymization
pseudonymized biometric data record
pseudonymous remailer
pseudo-operation
pseudo-random
pseudo-random function
pseudo-random number
pseudo-random number generator
pseudo-random number sequence
pseudostate
PSF
PSK
PSSP
PSTN
psychographics
psychological critical incident
psychological education (1)
psychological first aid
PTH attack
PTM
PTMP
PTP
PTR
PTT
public (1)
public (1a)
public (2)
public (3)
public (4)
public (5)
public API
publication (1)
publication (2)
publication (3)
public cloud
public cloud service provider
public confidence
public data
public domain data
public domain software
public element
public good
public information
Public Information Act (Estonia)
public interest (1)
public interest (2)
public key
public key certificate
public-key cryptography
public key encryption
public key information
public key infrastructure
publicly-vetted
public-private partnership
public-safety access point
public-safety answering point
public utility
public warning
public warning system
public web
publishing
PUC
PUE
PUK
pulldown
pull protocol
pull request
pull technology
pulse duration modulation
pulse position modulation
pulse width modulation
pulsing flood
pulsing zombie
pulverize
pump and dump
punctuation mark
Punycode
PUP
pupil
pupil centre
PureCrypter
purge (1)
purge (2)
purpose-built authentication tool
purpose specification
push authentication
push protocol
push technology
push verification
Putter Panda
puzzle (1)
puzzle (2)
puzzle (3)
PVLAN
pwa
PWM
pwn
Pwn2Own
PXE
pyramid scheme
pyranometer
Python
Toimub laadimine
partial ordering (2)
=
ordering
Palun oodake...
Katkesta
Tõrge
partial ordering (2)
=
ordering
Andmete allalaadimisel või töötlemisel esines tehniline tõrge.
Vabandame!
Sulge