- confidential data exchange
- Химическое оружие: конфиденциальный обмен данными
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Confidential (magazine) — A cover of Confidential from 1954, featuring Lana Turner, Winston Churchill, Joe Louis, and Christine Jorgensen. Confidential was a periodical published quarterly from December 1952 to August 1953, and then bi monthly until 1978. It was founded… … Wikipedia
Market Intelligence — (often contracted to MARKINT) is a relatively new intelligence discipline that exploits open source information gathered from global markets. It relies solely on publicly available information such as market prices and ancillary economic and… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Secure channel — In cryptography, a secure channel is a way of transferring data that is resistant to interception and tampering.A confidential channel is a way of transferring data that is resistant to interception, but not necessarily resistant to tampering.An… … Wikipedia
List of file formats — This is an incomplete list, which may never be able to satisfy particular standards for completeness. You can help by expanding it with reliably sourced entries. See also: List of file formats (alphabetical) This is a list of file formats… … Wikipedia
eHealth — This article is about health information technology. For the health insurance marketplace, see eHealthInsurance. eHealth (also written e health) is a relatively recent term for healthcare practice supported by electronic processes and… … Wikipedia
Managed File Transfer — (MFT) In simplest terms, Managed File Transfer (MFT) refers to software and hardware technologies that enable secure and reliable exchange of documents between organizations. [Schroth, C: Loosening the Hierarchy of Cross Company Electronic… … Wikipedia
Cryptographic protocol — A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security related function and applies cryptographic methods. A protocol describes how the algorithms should be used. A… … Wikipedia
IBM Lotus Notes — Lotus Notes IBM Lotus Notes 8 default home screen Developer(s) IBM … Wikipedia
Organized crime — Crime syndicate redirects here. For the DC Comics group of villains, see Crime Syndicate. For other uses, see Organized crime (disambiguation). Al Capone, a name often associated with organized crime … Wikipedia
Croatian security and intelligence system — The core of the security and intelligence system of the Republic of Croatia consists of two security and intelligence agencies: Security and Intelligence Agency (Croatian: Sigurnosno obavještajna agencija or SOA), and Military Security and… … Wikipedia