- non-compromised
- Общая лексика: бескомпромиссный
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Non-regression testing — (NRT) is an approach of software testing. The purpose of non regression testing is to verify that, after introducing or updating a given software application, previous software functions have not been compromised. This is aimed at preventing… … Wikipedia
Non-response bias — occurs in statistical surveys if the answers of respondents differ from the potential answers of those who did not answer. Contents 1 Example 2 Test 3 Related terminology 4 See also … Wikipedia
Non-invasive intracranial pressure measurement methods — Increased intracranial pressure (ICP) is one of the major causes of secondary brain ischemia that accompanies a variety of pathological conditions, most notably, traumatic brain injury (TBI), stroke, and intracranial hemorrhages. However, aside… … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Mission Compromised — is a novel written in 2002 by Oliver North and Joe Musser that details the story of one of the most secretive military units in history. It is officially fiction but in later interviews North mentions that he changed names, dates, and places so… … Wikipedia
Pirate decryption — most often refers to the reception of compromised pay TV or pay radio signals without authorization from the original broadcaster. The term pirate in this case is used in the sense of copyright infringement and has little or nothing to do with… … Wikipedia
Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… … Wikipedia
Warez — Not to be confused with Juárez. Demonstration in Sweden in support of file sharing, 2006 … Wikipedia
Clandestine HUMINT asset recruiting — This article is a subset article under Human Intelligence. For a complete hierarchical list of articles, see the intelligence cycle management hierarchy. Concepts here are also associated with counterintelligence. This article deals with the… … Wikipedia
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia