non-compromised

non-compromised
Общая лексика: бескомпромиссный

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Поможем сделать НИР

Смотреть что такое "non-compromised" в других словарях:

  • Non-regression testing — (NRT) is an approach of software testing. The purpose of non regression testing is to verify that, after introducing or updating a given software application, previous software functions have not been compromised. This is aimed at preventing… …   Wikipedia

  • Non-response bias — occurs in statistical surveys if the answers of respondents differ from the potential answers of those who did not answer. Contents 1 Example 2 Test 3 Related terminology 4 See also …   Wikipedia

  • Non-invasive intracranial pressure measurement methods — Increased intracranial pressure (ICP) is one of the major causes of secondary brain ischemia that accompanies a variety of pathological conditions, most notably, traumatic brain injury (TBI), stroke, and intracranial hemorrhages. However, aside… …   Wikipedia

  • Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible …   Wikipedia

  • Mission Compromised — is a novel written in 2002 by Oliver North and Joe Musser that details the story of one of the most secretive military units in history. It is officially fiction but in later interviews North mentions that he changed names, dates, and places so… …   Wikipedia

  • Pirate decryption — most often refers to the reception of compromised pay TV or pay radio signals without authorization from the original broadcaster. The term pirate in this case is used in the sense of copyright infringement and has little or nothing to do with… …   Wikipedia

  • Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… …   Wikipedia

  • Warez — Not to be confused with Juárez. Demonstration in Sweden in support of file sharing, 2006 …   Wikipedia

  • Clandestine HUMINT asset recruiting — This article is a subset article under Human Intelligence. For a complete hierarchical list of articles, see the intelligence cycle management hierarchy. Concepts here are also associated with counterintelligence. This article deals with the… …   Wikipedia

  • Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… …   Wikipedia

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»