- digitally encrypted voice communication
- Безопасность: телефонная связь с цифровым шифрованием речи
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
U.S. Coast Guard radio stations — The United States Coast Guard maintains radio stations for communication between Coast Guard units, Coast Guard units and other government entities, and Coast Guard units and the general public. Most commnications take place on the VHF marine… … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Digital AMPS — IS 54 and IS 136 are second generation (2G) mobile phone systems, known as Digital AMPS (D AMPS). It was once prevalent throughout the Americas, particularly in the United States and Canada. D AMPS is considered end of life, and existing networks … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Network switching subsystem — (NSS) (or GSM core network) is the component of a GSM system that carries out call switching and mobility management functions for mobile phones roaming on the network of base stations. It is owned and deployed by mobile phone operators and… … Wikipedia
BlackBerry — This article is about the wireless e mail device. For the fruit, see Blackberry. For other uses, see Blackberry (disambiguation) … Wikipedia
Email — This article is about the communications medium. For the former manufacturing conglomerate, see Email Limited. The at sign, a part of every SMTP email address[1] Electronic mail, commonly known as email or e mail, is a method of exchanging… … Wikipedia
Technical features new to Windows Vista — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features … Wikipedia
Microsoft Office 2007 — applications shown on Windows Vista (clockwise from top left: Excel, Word, OneNote, PowerPoint … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia