- high-security coding
- Безопасность: кодирование с высоким уровнем безопасности
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Coding conventions — are a set of guidelines for a specific programming language that recommend programming style, practices and methods for each aspect of a piece program written in this language. These conventions usually cover file organization, indentation,… … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Homeland Security Advisory System — HSAS redirects here. For the rock band, see Hagar Schon Aaronson Shrieve. For the UK terror threat level system, see UK Threat Levels. Homeland Security Advisory System color chart In the United States, the Homeland Security Advisory System was a … Wikipedia
Hacker (computer security) — This article is part of a series on … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
List of Stuyvesant High School people — This article lists notable people associated with Stuyvesant High School in New York City, New York, organized into rough professional areas and listed in order by their graduating class. MathematicsStuyvesant High School has produced a steady… … Wikipedia
Nanyang Girls' High School — 南洋女子中学校 勤慎端朴 Diligence, Prudence, Respectability, Simplicity Location Bukit Timah, Information … Wikipedia
Mobile business intelligence — For a general overview, see Business intelligence. Mobile Business Intelligence (Mobile BI or Mobile Intelligence) refers to the distribution of business data to mobile devices such as smartphones and tablet computers. Business intelligence (BI)… … Wikipedia
Quantum cryptography — Quantum cryptography, or quantum key distribution (QKD), uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt… … Wikipedia
Assembly language — See the terminology section below for information regarding inconsistent use of the terms assembly and assembler. Motorola MC6800 Assembly Language An assembly language is a low level programming language for computers, microprocessors,… … Wikipedia
ZigBee — module. The €1 coin, shown for size reference, is about 23 mm (0.9 inch) in diameter. ZigBee is a specification for a suite of high level communication protocols using small, low power digital radios based on an IEEE 802 standard for personal… … Wikipedia