Буду признателен, если поделитесь информацией в социальных сетях

 

ОНЛАЙН ВИДЕО КАНАЛ С АСТРАЛЬНЫМ ПАЛОМНИКОМ
 
Задать вопрос можно в мини-чате, а так же в аське и скайпе
Есть вопрос? - найди ответ!  Посмотрите видео-FAQ - там более 700 ответов. ПЕРЕЙТИ
Ответы на вопросы в видео ежедневно c 18.00 (кроме Пт, Сб, Вс)
Посмотреть архив онлайн конференций 
 
  регистрация не обязательна, приглашайте друзей - люблю интересные вопросы
(плеер и звук можно выключить на экране трансляции, если они мешают)

 

 

       

 

Я доступен по любым средствам связи , включая видео
 
аська - 612194455
скайп - juragrek
mail - juragrek@narod.ru
Мобильные телефоны
+79022434302 (Смартс)
+79644902433 (Билайн)
(МТС)
+79158475148
+79806853504
+79106912606
+79106918997

 

 

 

2000 177.pdf
ОСНОВНЫЕ РУБРИКИ САЙТА
МЕНЮ  САЙТА

Главная страница

Обучение

Видеоматериалы автора

Библиотека 12000 книг

Видеокурс. Выход в астрал

Статьи автора по астралу

Статьи по астралу

Практики

Аудиокниги

Музыка

онлайн- видео

Партнерская программа

Фильмы

Программы

Ресурсы сайта

Контактные данные

ВХОД

В ПОРТАЛ

 

Библиотека 12000 книг

Аномальное   

Здоровье

Рейки  

Астрал  

Йога

Религия  

Астрология

Магия

Русь  

Аюрведа  

Масоны

Секс

Бизнес 

НЛП

Сознание

Боевое  

Он и она

Таро  

Вегетарианство  

Ошо

Успех

Восток  

Парапсихология

Философия

Гипноз  

Психология  

Эзотерика  

ДЭИР

Развитие

900 рецептов бизнеса

 

 

Видеоматериалы автора сайта

Практика астрального выхода. Вводная лекция

Боги, эгрегоры и жизнь после

 жизни. Фрагменты видеокурса

О страхах и опасениях, связанных с выходом в астрал
 

Видеокурс астральной практики. Практический пошаговый курс обучения

 

Интервью Астрального паломника
 

Запись телепередачи. Будущее. Перемещение во времени

Призраки в Иваново. Телепередача

 

2000 177.pdf

  215.zip

 

12000

.

-
.

  pdf

 
Copyright, 1998-2000, .. 4


23
23
23
23
23
23
23
23
24
24
24
24
24
25
25
25
25
25
25
26
26
- 26
26
26
26
26
27
27
27
27
27
27
28
28
28
28
- 28
29
29
29
30
30
- 30



Copyright, 1998-2000, .. 5

30
30
30
30
31
32
32
32
32
28147-89 32
34.10-94 32
34.11-94 33
50739-95 33
50922-96 33
33
33
34
34
34
34
34
35
35
35
35
35
35
- 35
36
36
36
36
36
37
37
37
37
37
37
38
38
38
38
38
38



Copyright, 1998-2000, .. 6

39
39
39
39
39
39
40
-1-4 40
41
41
41
41
41
41
41
41
42
42
42
42
43
43
43
43
43
43
44
44
44
44
44
, 45
45
45
45
45
46
46
46
46
46
46
47
47
47
47
47
48



Copyright, 1998-2000, .. 7

48
48
48
48
48
48
48
50
50
50
- 50
51
51
51
51
51
51
51
52
52
52
53
53
53
53
53
53
53
54
55
55
55
55
55
55
55
56
56
56
56
56
56
57
57
58



Copyright, 1998-2000, .. 8

58
58
58
58
58
58
58
58
59
59
59
59
59
60
60
60
60
60
60
60
61
, 61
61
61
61
61
61
62
1233 62
333 62
35 62
608 62
1-7/-587 62
1-7/-316 63
64
64
64
64
64
64
64
65
65
65
65
65
10 65
Ȼ 66

. ߻ 66
,




Copyright, 1998-2000, .. 9


Ȼ 66
.
.
Ȼ 67
.
.
Ȼ 67
.
. .
Ȼ 67
. .
߻ 68
69
69
69
69
69
69
70
70
70
70
70
70
70
71
Ȼ 71
71
71
71
71
71
- 71
72
72
72
72
73
73
73
73
73
- 73
73
74
75
75
75



Copyright, 1998-2000, .. 10

75
76
76
76
76
76
76
76
77
77
77
77
77
77
77
77
334 77
188 78
79
79
79
79
80
- 80
80
81
81
81
81
81
81
82
83
83
84
84
84
84



Copyright, 1998-2000, .. 11

84
84
85
85
85
85
85
86
86
86
86
86
87
- 87
87
87
88
88
A 89
AMERICAN NATIONAL STANDARDS INSTITUTE 89
ANSI 89
ANSI X9.9 89
ANSI X9.17 89
ANSI X9.23 89
ANSI X9.30 89
ANSI X9.31 89
ANSI X9.41 90
ANSI X9.42 90
ANSI X9.44 90
ANSI X9.45 90
ANSI X12.58 90
AUTHENTICODE 90
ASSIST 90
AUTOMATED SYSTEMS SECURITY INCIDENT SUPPORT TEAM 91
AUDIT 91
AUDIT TRAIL 91
AUTHENTICATION 91
ACCESS PERIOD 91
ACCESS CONTROL 91
ACCESS CONTROL LIST 91
. 91
ACCOUNTABILITY 91
ASSURANCE 92
AUTHORIZATION 92
ASYMMETRIC CRYPTOGRAPHY 92
ADAPTIVE CHOSEN CIPHERTEXT ATTACK 92
ARBITRATED PROTOCOL 92



Copyright, 1998-2000, .. 12

ADJUDICATED PROTOCOL 92
AS2805.6.5.3 92
APPLICATION-LEVEL GATEWAY 92
A GUIDE TO UNDERSTANDING AUDIT IN TRUSTED SYSTEMS 93
A GUIDE TO UNDERSTANDING DISCRETIONARY ACCESS CONTROL IN TRUSTED SYSTEMS 93
A GUIDE TO UNDERSTANDING CONFIGURATION MANAGEMENT IN TRUSTED SYSTEMS 93
A GUIDE TO UNDERSTANDING DESIGN DOCUMENTATION IN TRUSTED SYSTEMS 93
A GUIDE TO UNDERSTANDING TRUSTED DISTRIBUTION IN TRUSTED SYSTEMS 94
A GUIDE TO UNDERSTANDING SECURITY MODELING IN TRUSTED SYSTEMS 94
A GUIDE TO UNDERSTANDING TRUSTED FACILITY MANUALS 94
A GUIDE TO UNDERSTANDING IDENTIFICATION AND AUTHENTICATION IN TRUSTED SYSTEMS 94
A GUIDE TO UNDERSTANDING OBJECT REUSE IN TRUSTED SYSTEMS 95
A GUIDE TO UNDERSTANDING TRUSTED RECOVERY IN TRUSTED SYSTEMS 95
A GUIDE TO UNDERSTANDING SECURITY TESTING AND TEST DOCUMENTATION IN TRUSTED
SYSTEMS 95
A GUIDE TO PROCUREMENT OF TRUSTED SYSTEMS: AN INTRODUCTION TO PROCUREMENT
INITIATORS ON COMPUTER SECURITY REQUIREMENTS 95
A GUIDE TO PROCUREMENT OF TRUSTED SYSTEMS: LANGUAGE FOR RFP SPECIFICATIONS AND
STATEMENTS OF WORK AN AID TO PROCUREMENT INITIATORS 95
A GUIDE TO PROCUREMENT OF TRUSTED SYSTEMS: COMPUTER SECURITY CONTRACT DATA
REQUIREMENTS LIST AND DATA ITEM DESCRIPTION TUTORIAL 96
A GUIDE TO PROCUREMENT OF TRUSTED SYSTEMS: HOW TO EVALUATE A BIDDERS
PROPOSAL DOCUMENT AN AID TO PROCUREMENT INITIATORS AND CONTRACTORS 96
A GUIDE TO UNDERSTANDING DATA REMANENCE IN AUTOMATED INFORMATION SYSTEMS 96
A GUIDE TO WRITING THE SECURITY FEATURES USERS GUIDE FOR TRUSTED SYSTEMS 97
A GUIDE TO UNDERSTANDING INFORMATION SYSTEM SECURITY OFFICER RESPONSIBILITIES
FOR AUTOMATED INFORMATION SYSTEMS 97
ACCESSING CONTROLLED ACCESS PROTECTION 97
A GUIDE TO UNDERSTANDING COVERT CHANNEL ANALYSIS OF TRUSTED SYSTEMS 97
AES 97
ADVANCED ENCRYPTION STANDARD 98
AMBER BOOK 98
AQUA BOOK 98
B 99
BLOWFISH 99
BLOCK CIPHER 99
BELL-LAPADULLA MODEL 99
BACKUP PLAN 99
BANKING CIRCULAR 226 99
BC-226 99
BANKING CIRCULAR 229 99
BC-229 99
BLIND SIGNATURE SCHEME 100
BRUTE-FORCE ATTACK 100
BRUTE-FORCE SEARCH 100
BIRTHDAY ATTACK 100
BASTION HOST 101
BRIGHT BLUE BOOK 101
BURGUNDY BOOK 101
BROWN BOOK 101
BLUE BOOK 101
BRIGHT ORANGE BOOK 101



Copyright, 1998-2000, .. 13

C 102
CIPHER 102
CIPHERTEXT 102
CIPHER BLOCK CHAINING 102
CBC 102
CIPHER FEEDBACK 102
CFB 102
CAPSTONE 103
CLIPPER 103
CODE SIGNING 103
CERT 103
COMPUTER EMERGENCY RESPONSE TEAM 103
CIAC 104
COMPUTER INCIDENT ADVISORY CAPABILITY 104
CRYPTOGRAPHY 104
COVERT CHANNELS 104
COVERT STORAGE CHANNEL 105
COVERT TIMING CHANNEL 105
CAPABILITY 105
CONFIDENTIALITY 105
CONTINGENCY PLAN 105
COMPUTER SECURITY AGENCY 105
COMMERCIAL PRODUCT EVALUATION 105
COMMERCIAL COMPUTER SECURITY CENTRE 106
COMPROMISE 106
COUNTERFEIT ACCESS DEVICE AND COMPUTER FRAUD AND ABUSE ACT OF 1984 106
COMPUTER FRAUD AND ABUSE ACT OF 1986 106
COMPUTER SECURITY ACT OF 1987, PL 100-235 106
COMPUTER MISUSE ACT OF 1990 106
CHOSEN PLAINTEXT ATTACK 106
CHOSEN CIPHERTEXT ATTACK 107
CHOSEN MESSAGE ATTACK 107
CIPHERTEXT ONLY ATTACK 107
CHOSEN KEY ATTACK 107
C-36 107
COUNTER METHOD 107
CIPHERTEXT AUTO KEY 107
CTAK 108
CERTIFICATE 108
CERTIFICATE REVOCATION LIST 108
CAPI 108
CRYPTOGRAPHIC APPLICATION PROGRAMMING INTERFACE 108
CRYPTOKI 108
CIRCUIT-LEVEL GATEWAY 108
CHALLENGE-HANDSHAKE AUTHENTICATION PROTOCOL 108
CHAP 109
COMPUTER OPERATIONS AUDIT AND SECURITY TECHNOLOGY 109
COAST 109
COMPUTER SECURITY REQUIREMENTS GUIDANCE FOR APPLYING THE DOD TCSEC IN
SPECIFIC ENVIRONMENTS 109
COMPUTER SECURITY SUBSYSTEM INTERPRETATION OF THE TCSEC 109
CSC-STD-001-83 109
CSC-STD-002-85 110
CSC-STD-003-85 110



Copyright, 1998-2000, .. 14

CSC-STD-004-85 110
D 111
DIGITAL SIGNATURE ALGORITHM 111
DSA 111
DIGITAL SIGNATURE STANDARD 111
DSS 111
DIFFIE-HELLMAN 111
DATA ENCRYPTION STANDARD 111
DES 111
DESX 112
. DATA ENCRYPTION STANDARD 112
DISK SCAVENGING 112
DENIAL OF SERVICE 112
DISCRETIONARY ACCESS CONTROL 112
DEPARTMENT OF DEFENSE 112
DOD 112
DOD GUIDELINES FOR COMPUTER SECURITY 112
DOMAIN 113
DAC 113
DATA SECURITY OFFICER 113
DSO 113
DATA COMPUTER ACT OF 1984 113
DESIGNATED CONFIRMER SIGNATURE 113
DIFFERENTIAL CRYPTANALYSIS 113
DES-EEE3 113
DES-EDE3 114
DES-EEE2 114
DES-EDE2 114
DIGITAL FINGERPRINT 114
DAVIES-MEYER HASH FUNCTION 114
DUAL-HOMED GATEWAY 114
DEMILITARIZED ZONE 114
DMZ 115
DIGITAL ENVELOP 115
DARK LAVENDER BOOK 115
E 116
ELGAMAL 116
ELLIPTIC CURVES 116
ELECTRONIC CODEBOOK 116
ECB 116
EVALUATED PRODUCTS LIST 116
EPL 116
ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 117
ENIGMA 117
E31.20 117
ETEBAC 5 117
EXPONENTIAL KEY AGREEMENT 117
EXHAUSTIVE KEY SEARCH 117
ESCROWED ENCRYPTION STANDARD 117



Copyright, 1998-2000, .. 15

EES 117
F 118
FORTEZZA 118
FEAL 118
FAST DATA ENCIPHERMENT ALGORITHM 118
FLAW 118
FAULT 118
FOREIGN CORRUPT PRACTICES ACT OF 1977 118
FAPKC 118
FAIL-STOP SIGNATURE SCHEME 119
FIREWALL 119
FORUM OF INCIDENT RESPONSE AND SECURITY TEAMS 119
FIRST 119
FEDERAL COMPUTER INCIDENT RESPONSE CAPABILITY 120
FEDCIRC 120
FOREST GREEN BOOK 120
G 121
G-DES 121
GARBAGE COLLECTING 121
GREEDY PROGRAM 121
GREEN BOOK 121
GUESSED PLAINTEXT ATTACK 121
GROUP SIGNATURE 121
GLOSSARY OF COMPUTER SECURITY TERMS 122
GUIDELINES FOR FORMAL VERIFICATION SYSTEMS 122
GUIDELINES FOR WRITING TRUSTED FACILITY MANUALS 122
H 123
HASH 123
HOLE 123
HOT PEACH BOOK 123
I 124
IKP 124
INTERNET KEYED PAYMENTS PROTOCOL 124
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION 124
ISO 124
IEEE P1363 124
IEEE 802.10C 124
IDEA 124
INTERNATIONAL DATA ENCRYPTION ALGORITHM 125
IP-SPOOFING 125
IDENTIFICATION 125
INFORMATION TECHNOLOGY SECURITY EVALUATION CRITERIA 125
ITSEC 125
INTERNAL FEEDBACK 125



Copyright, 1998-2000, .. 16

ITERATED BLOCK CIPHER 126
INTRUSION 126
INTRUSION DETECTION 126
INTRUSION DETECTION SYSTEM 126
IPSEC 126
IP SECURITY PROTOCOL 126
. INTERNET SECURITY ASSOCIATION & KEY MANAGEMENT PROTOCOL 127
ISAKMP ! .
INTEGRITY 127
INTRODUCTION TO CERTIFICATION AND ACCREDITATION CONCEPTS 127
INTERNET SECURITY ASSOCIATION & KEY MANAGEMENT PROTOCOL 127
ISAKMP 127
IKE 127
INTERNET KEY EXCHANGE 127
K 129
KNAPSACK 129
KERBEROS 129
KNOWN PLAINTEXT ATTACK 129
KEY 129
KEY STREAM GENERATOR 129
KEY AUTO KEY 129
KAK 129
KEY SCHEDULE 129
KEY MANAGEMENT 130
KEY GENERATION 130
KEY DISTRIBUTION 130
KEY STORAGE 130
KEY DELETION 130
KEY RECOVERY 130
KEY CRUNCHING 130
KEY ESCROW 130
L 132
LUC 132
LEAST PRIVILEGE 132
LINK ENCRYPTION 132
LOOPHOLE 132
LABEL 132
LINEAR FEEDBACK SHIFT REGISTER 132
LFSR 132
LAYER 2 FORWARDING 132
L2F 133
LAYER 2 TUNNELING PROTOCOL 133
L2TP 133
LIGHT YELLOW BOOK 133
LIGHT BLUE BOOK 133
LIGHT PINK BOOK 133
M 134



Copyright, 1998-2000, .. 17

MERKLES TREE 134
MCELIECE CRYPTOSYSTEM 134
MIME OBJECT SECURITY SERVICE 134
MOSS 134
MAC 134
MD2 134
MD4 135
MD5 135
MASQUERADE 135
MANDATORY ACCESS CONTROL 135
MULTILEVEL SECURITY 135
M-209 CONVERTER 135
MESSAGE AUTHENTICATION CODE 135
MESSAGE INTEGRITY CHECK 136
MESSAGE SECURITY PROTOCOL 136
MSP 136
MAN-IN-THE-MIDDLE 136
MIDDLEPERSON ATTACK 136
MESSAGE DIGEST 136
N 137
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 137
NIST 137
NBS 137
NATIONAL SECURITY AGENCY 137
NSA 137
NASIRC 137
NASA AUTOMATED SYSTEMS INCIDENT RESPONSE CAPABILITY 137
NATIONAL COMPUTER SECURITY CENTER 138
NCSC 138
NONREPUDIATION 138
NEW DIRECTIONS IN CRYPTOGRAPHY 138
NIEDERREITER CRYPTOSYSTEM 138
NCSC-TG-001 138
NCSC-TG-002 138
NCSC-TG-003 139
NCSC-TG-004 139
NCSC-TG-005 139
NCSC-TG-006 139
NCSC-TG-007 139
NCSC-TG-008 139
NCSC-TG-009 139
NCSC-TG-010 139
NCSC-TG-011 139
NCSC-TG-013 139
NCSC-TG-014 139
NCSC-TG-015 140
NCSC-TG-016 140
NCSC-TG-017 140
NCSC-TG-018 140
NCSC-TG-019 140
NCSC-TG-020 140
NCSC-TG-021 140



Copyright, 1998-2000, .. 18

NCSC-TG-022 140
NCSC-TG-023 140
NCSC-TG-024 140
NCSC-TG-025 140
NCSC-TG-026 141
NCSC-TG-027 141
NCSC-TG-028 141
NCSC-TG-029 141
NCSC-TG-030 141
NEON ORANGE BOOK 141
O 142
ONE-TIME PAD 142
OUTPUT FEEDBACK 142
OFB 142
OBJECT SIGNING 142
ORANGE BOOK 142
OBJECT 142
OBJECT REUSE 142
OMBA-123 143
OPUS NOVUM 143
ONE-WAY FUNCTION 143
ONE-TIME SIGNATURE 143
OAKLEY 143
P 144
PKCS 144
PKCS #1 144
PKCS #3 144
PKCS #5 144
PKCS #6 144
PKCS #7 144
PKCS #8 144
PKCS #9 144
PKCS #10 145
PKCS #11 145
PUBLIC-KEY CRYPTOGRAPHY STANDARDS 145
PUBLIC KEY 145
PRIVATE KEY 145
PRIVACY ENHANCED MAIL 145
PEM 146
PEM-MIME 146
PCT 146
PRIVATE COMMUNICATION TECHNOLOGY 146
POINT-TO-POINT TUNNELING PROTOCOL 146
PPTP 146
PRINCIPAL 146
PREFERRED PRODUCTS LIST 147
PPL 147
PROCESS 147
PROTOCOL 147



Copyright, 1998-2000, .. 19

PLAINTEXT 147
PUBLIC-KEY CRYPTOGRAPHY 147
PRIVACY ACT OF 1974 147
PURCHASE KEY ATTACK 147
PURPLE 147
POLYGRAPHIA 148
PROPAGATING CIPHER BLOCK CHAINING 148
PCBC 148
PLAINTEXT BLOCK CHAINING 148
PBC 148
PACKET-FILTERING FIREWALL 148
PROXY 148
PROXY SERVER 149
PASSWORD AUTHENTICATION PROTOCOL 149
PAP 149
PERSONAL INFORMATION EXCHANGE 149
PFX 149
PARTIAL KEY ESCROW 149
PASSWORD MANAGEMENT GUIDELINE 150
PINK BOOK 150
PURPLE BOOK 150
Q 151
QUANTUM CRYPTOGRAPHY 151
R 152
RSA 152
RC2 152
RC4 153
RC5 153
RISK ANALYSIS 153
RAINBOW SERIES 153
RECOVERY PLAN 153
RECOVERY PROCEDURES 153
REFERENCE MONITOR CONCEPT 153
REPUDATION 153
RUBBER HOSE CRYPTANALYSIS 154
RED 154
RUNNING KEY GENERATOR 154
RABIN SIGNATURE SCHEME 154
RSA-129 154
RDES 154
RADIUS 155
REMOTE AUTHENTICATION DIAL-IN USER SERVICE 155
REMANENCE 155
RAMP PROGRAM DOCUMENT 155
RED BOOK 155
S 156
SET 156



Copyright, 1998-2000, .. 20

SECURE ELECTRONIC TRANSACTION 156
SSL 156
SECURE SOCKETS LAYER 156
S/WAN 156
SECURE WIDE AREA NETWORK 156
S\MIME 157
STREAM CIPHER 157
SKIPJACK 157
S1 157
SEAL 157
SOFTWARE-OPTIMIZED ENCRYPTION ALGORITHM 157
SCREENING EXTERNAL ACCESS LINK 158
SAFER 158
SECURE AND FAST ENCRYPTION ROUTINE 158
SHA 158
SHS 158
SECURE HYPERTEXT TRANSFER PROTOCOL 159
S-HTTP 159
SIMPLE KEY MANAGEMENT FOR INTERNET PROTOCOL 159
SKIP 159
SNIFFING 159
SPOOFING 160
SALAMI ATTACK 160
SECURITY POLICY 160
SECURITY CLEARANCE 160
SUBJECT 160
SECURE STATE 160
SECURITY FLAW 161
SECURITY HOLE 161
SECURITY KERNEL 161
SECURITY LEVEL 161
SECRET-KEY CRYPTOGRAPHY 161
SYMMETRIC CRYPTOGRAPHY 161
SIGABA 161
SUBTILITAS DE SUBTILITAE RERUM 161
SYNCHRONOUS STREAM CIPHER 161
SELF SYNCHRONOUS STREAM CIPHER 162
SELF ENFORCING PROTOCOL 162
SELF-AUTHENTICATING SIGNATURE SCHEME 162
SNDES 162
SECRET SHARING SCHEME 162
SHAMIRS SECRET SHARING SCHEME 162
SECURE COURIER 162
SECURITY ZONE 162
STATEFUL INSPECTION FIREWALL 163
SECURITY COORDINATION CENTER 163
SCC 163
SILVER BOOK 163
T 164
TRIPLE DES 164
TRAPDOOR 164
TROJAN HORSE 164



Copyright, 1998-2000, .. 21

TRUSTED COMPUTING BASE 164
TCB 164
TEMPEST 164
THREAT 164
TRUSTED PATH 164
TRUSTED COMPUTER SECURITY EVALUATION CRITERIA 165
TCSEC 165
THE TRUSTED NETWORK INTERPRETATION OF DEPARTMENT OF DEFENSE TRUSTED
COMPUTER SYSTEM EVALUATION GUIDELINES 165
TIMESTAMPING 166
TIMED-RELEASE CRYPTOSYSTEM 166
TIMELOCK PUZZLES 166
TECHNICAL CRITERIA FOR EVALUATION OF COMMERCIAL SECURITY PRODUCTS 166
TRAP DOOR ONE-WAY FUNCTION 166
TESSERA 166
TERMINAL ACCESS CONTROL ACCESS SYSTEM 166
TACACS 167
TACACS+ 167
TRANSPORT LAYER SECURE PROTOCOL 167
TLSP 167
TRAFFIC ANALYSIS 167
TECHNICAL RATIONAL BEHIND CSC-STD-003-85: COMPUTER SECURITY REQUIREMENTS
GUIDANCE FOR APPLYING THE DOD TCSEC IN SPECIFIC ENVIRONMENTS 167
TRUSTED PRODUCT EVALUATIONS A GUIDE FOR VENDORS 168
TRUSTED PRODUCT EVALUATION PROGRAM 168
TPEP 168
TNI 168
TRUSTED NETWORK ENVIRONMENTS GUIDELINE GUIDANCE FOR APPLYING THE TNI 168
TRUSTED PRODUCT EVALUATION QUESTIONNAIRE 168
TRUSTED UNIX WORKING GROUP (TRUSIX) RATIONALE FOR SELECTING ACCESS CONTROL
LIST FEATURES FOR THE UNIX SYSTEM 169
TRUSTED DATABASE MANAGEMENT SYSTEM INTERPRETATION OF THE TCSEC 169
TDI 169
TAN BOOK 169
TEAL GREEN BOOK 169
TURQUOISE BOOK 169
U 170
UNAUTHORIZED ACCESS 170
UNDENIABLE SIGNATURE SCHEME 170
V 171
VERIFICATION 171
VULNERABILITY 171
VIOLATOR 171
VIRTUAL PRIVATE NETWORK 171
VPN 171
VENICE BLUE BOOK 171
VIOLET BOOK 171
W 172


WORM 172
WHITE BOOK 172
WHITENING 172
X 173
X.400 173
X.435 173
X.509 173
EXTENDED TERMINAL ACCESS CONTROL ACCESS SYSTEM 173
XTACACS 173
X-FORCE 173
Y 175
YELLOW BOOK 175
YELLOW-GREEN BOOK 175
5 176
5200.28-STD 176
177

 

12000

.

-

 

 

 

!  

,   !

 

 

 

 

 

 

   Directrix.ru - ,  SPLINEX: - Referal.ru Rambex - - WWW.SABRINA.RU   YandeG  ,  ,    .RU Faststart -  ,   ,    @Mail.ru/ http://www.topmagia.ru/topo/   .Ru    , Top 100.  , Top 100. TOP Webcat.info; ,   , , . ProtoPlex: , , , , !
Directrix.ru - ,  KATIT.ru - , , 100 -   lineage2 Goon