TCA - Trusted Certificate Authority
U kriptografiji, TCA (eng. Trusted Certificate Authority ili Trusted Certification Authority) je osoba koja izdaje digitalne certifikate na nacionalnoj razini.
http://en.wikipedia.org/wiki/Certificate_authority
U kriptografiji, TCA (eng. Trusted Certificate Authority ili Trusted Certification Authority) je osoba koja izdaje digitalne certifikate na nacionalnoj razini.
TCA - Trusted Certificate Authority
In cryptography, a trusted certificate authority or trusted certification authority (TCA) is an entity that issues digital certificates on national level.
In cryptography, a trusted certificate authority or trusted certification authority (TCA) is an entity that issues digital certificates on national level.
http://en.wikipedia.org/wiki/Certificate_authority

TCP - Transmission Control Protocol
Jedan od dva protokola usmjeravanja koja se koriste u Internetu, uspostavlja logičku vezu između krajnjih računala i osigurava pouzdani prijenos. TCP se nalazi na transportnom sloju OSI modela.
http://www.webopedia.com/TERM/T/TCP.html
http://www.networksorcery.com/enp/protocol/tcp.htm
http://searchnetworking.techtarget.com/definition/TCP
Jedan od dva protokola usmjeravanja koja se koriste u Internetu, uspostavlja logičku vezu između krajnjih računala i osigurava pouzdani prijenos. TCP se nalazi na transportnom sloju OSI modela.
TCP - Transmission Control Protocol
One of two transporting protocols in Internet. It establishes a logical connection between the end computers and ensures reliable transmission.
One of two transporting protocols in Internet. It establishes a logical connection between the end computers and ensures reliable transmission.
http://www.webopedia.com/TERM/T/TCP.html
http://www.networksorcery.com/enp/protocol/tcp.htm
http://searchnetworking.techtarget.com/definition/TCP

TEMPEST - Kodni naziv sigurnosne politke
TEMPEST je kodni naziv koji je stvorila Vlada SAD-a. Odnosi se na široko područje sigurnosnih politika, studija i istraživanja. Glavna tema njegovih proučavanja su kompromitirajuća elektromagnetska zračenja elektroničkih uređaja koja mogu prenositi osjetljive informacije. Termin TEMPEST smatra se zastarjelim te se kao zamjena koristi termin EMSEC.
http://en.wikipedia.org/wiki/TEMPEST
http://www.tscm.com/TSCM101tempest.html
http://www.kubieziel.de/blog/uploads/complete_unofficial_tempest_page.pdf
TEMPEST je kodni naziv koji je stvorila Vlada SAD-a. Odnosi se na široko područje sigurnosnih politika, studija i istraživanja. Glavna tema njegovih proučavanja su kompromitirajuća elektromagnetska zračenja elektroničkih uređaja koja mogu prenositi osjetljive informacije. Termin TEMPEST smatra se zastarjelim te se kao zamjena koristi termin EMSEC.
TEMPEST - Kodename of security policy
TEMPEST is a codename invented by the US Government. It refers to a massive area of security policies, studies and researches. Main theme of its studies are compromising electromagnetic emanations of electronic devices that can carry sensitive information. Term TEMPEST is considered out-of-date and term EMSEC is used instead.
TEMPEST is a codename invented by the US Government. It refers to a massive area of security policies, studies and researches. Main theme of its studies are compromising electromagnetic emanations of electronic devices that can carry sensitive information. Term TEMPEST is considered out-of-date and term EMSEC is used instead.
http://en.wikipedia.org/wiki/TEMPEST
http://www.tscm.com/TSCM101tempest.html
http://www.kubieziel.de/blog/uploads/complete_unofficial_tempest_page.pdf

TLS - Transport Layer Security
TLS je kriptografski protokol koji pruža sigurnu komunikaciju Internetom. TLS šifrira dijelove iznad transportnog sloja koristeći simetrične kriptografske ključeve i autentikacijski kod poruka. TLS je nasljednik SSL protokola.
http://searchsecurity.techtarget.com/definition/Transport-Layer-Security-TLS
http://www.techsoup.org/learningcenter/networks/page11959.cfm
http://datatracker.ietf.org/wg/tls/charter/
TLS je kriptografski protokol koji pruža sigurnu komunikaciju Internetom. TLS šifrira dijelove iznad transportnog sloja koristeći simetrične kriptografske ključeve i autentikacijski kod poruka. TLS je nasljednik SSL protokola.
TLS - Transport Layer Security
TLS is a cryptographic protocol that provides communications security over the Internet. TLS encrypts the segments of network connections above the Transport Layer, using symmetric cryptography for privacy and a keyed message authentication code for message reliability. TLS is successor of SSL protocol.
TLS is a cryptographic protocol that provides communications security over the Internet. TLS encrypts the segments of network connections above the Transport Layer, using symmetric cryptography for privacy and a keyed message authentication code for message reliability. TLS is successor of SSL protocol.
http://searchsecurity.techtarget.com/definition/Transport-Layer-Security-TLS
http://www.techsoup.org/learningcenter/networks/page11959.cfm
http://datatracker.ietf.org/wg/tls/charter/

TRA - Trusted Registration Authority
TRA (eng. Trusted Registration Authority) je registarsko tijelo ili agencija odgovorna za održavanje popisa šifri (kodova) na temelju međunarodnih standarda te za izdavanja novih šifri za one koji se žele registrirati.
http://itlaw.wikia.com/wiki/Registration_authority
TRA (eng. Trusted Registration Authority) je registarsko tijelo ili agencija odgovorna za održavanje popisa šifri (kodova) na temelju međunarodnih standarda te za izdavanja novih šifri za one koji se žele registrirati.
TRA - Trusted Registration Authority
TRA (trusted registration authority or maintenance agency) is a body given the responsibility of maintaining lists of codes under international standards and issuing new codes to those wishing to register them.
TRA (trusted registration authority or maintenance agency) is a body given the responsibility of maintaining lists of codes under international standards and issuing new codes to those wishing to register them.
http://itlaw.wikia.com/wiki/Registration_authority

Žig - Oblik industrijskog vlasništva
Žig je zaštićeni simbol koji služi za jedinstvenu identifikaciju proizvoda ili usluga. Koriste ih pojedinci, poslovne organizacije ili neki drugi entiteti kako bi kupci lakše mogli prepoznati njihove proizvode i usluge.
http://www.dziv.hr/hr/intelektualno-vlasnistvo/zigovi/
http://hr.wikipedia.org/wiki/%C5%BDig http://en.wikipedia.org/wiki/Trademark
Žig je zaštićeni simbol koji služi za jedinstvenu identifikaciju proizvoda ili usluga. Koriste ih pojedinci, poslovne organizacije ili neki drugi entiteti kako bi kupci lakše mogli prepoznati njihove proizvode i usluge.
Trademark - Form of industrial property
A trademark is protected symbol which is used to uniquely identify a product or service. They are used by individuals, business organizations or other entities to help customers to identify their products and services.
A trademark is protected symbol which is used to uniquely identify a product or service. They are used by individuals, business organizations or other entities to help customers to identify their products and services.
http://www.dziv.hr/hr/intelektualno-vlasnistvo/zigovi/
http://hr.wikipedia.org/wiki/%C5%BDig http://en.wikipedia.org/wiki/Trademark

Trojanski konj - Zloćudni program koji se pretvara kao legitimna aplikacija
Trojanski konj je oblik zloćudnog programa koji se pretvara kao legitimna aplikacija. U početku se pretvara kao da obavlja korisnu funkcionalnost za korisnika, no u pozadini izvodi štetne radnje (na primjer, krađa informacija). Za razliku od crva, ovaj oblik zloćudnih programa se ne širi samostalno.
http://www.webopedia.com/TERM/T/Trojan_horse.html
http://www.zsis.hr/site/Preporuke/Virusicrviitrojanskikonji/tabid/100/Default.aspx
http://searchsecurity.techtarget.com/definition/Trojan-horse
Trojanski konj je oblik zloćudnog programa koji se pretvara kao legitimna aplikacija. U početku se pretvara kao da obavlja korisnu funkcionalnost za korisnika, no u pozadini izvodi štetne radnje (na primjer, krađa informacija). Za razliku od crva, ovaj oblik zloćudnih programa se ne širi samostalno.
Trojan horse - A destructive program that masquerades as an application
A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system. Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as destructive.
A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system. Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as destructive.
http://www.webopedia.com/TERM/T/Trojan_horse.html
http://www.zsis.hr/site/Preporuke/Virusicrviitrojanskikonji/tabid/100/Default.aspx
http://searchsecurity.techtarget.com/definition/Trojan-horse

TTL - Time to live
U IP protokolu TTL označava koliko još usmjeritelja podatkovni paket smije proći prije nego dođe do odredišta. Neki drugi protokoli TTL-om označavaju koliko dugo neka informacija smije postojati prije nego se odbaci jer je zastarjela
http://searchnetworking.techtarget.com/definition/time-to-live
http://kb.mediatemple.net/questions/908/Understanding+TTL+%28time-to-live%29
U IP protokolu TTL označava koliko još usmjeritelja podatkovni paket smije proći prije nego dođe do odredišta. Neki drugi protokoli TTL-om označavaju koliko dugo neka informacija smije postojati prije nego se odbaci jer je zastarjela
TTL - Time to live
Time to Live is a field in the Internet Protocol (IP) datagram that specifies how many more hops a packet can travel before being discarded or returned. It is used in other protocols to specify how long is some information valid.
Time to Live is a field in the Internet Protocol (IP) datagram that specifies how many more hops a packet can travel before being discarded or returned. It is used in other protocols to specify how long is some information valid.
http://searchnetworking.techtarget.com/definition/time-to-live
http://kb.mediatemple.net/questions/908/Understanding+TTL+%28time-to-live%29

Twofish - Simetrični kriptografski algoritam za šifriranje blokova podataka.
Simetrični kriptografski algoritam za šifriranje blokova podataka veličine 128 bita. Koristi ključ veličine 256 bita, predstavlja pobpoljšanu verziju alogiritma Blowfish.
http://searchsecurity.techtarget.com/definition/Twofish
http://www.ucertify.com/article/what-is-twofish.html
Simetrični kriptografski algoritam za šifriranje blokova podataka veličine 128 bita. Koristi ključ veličine 256 bita, predstavlja pobpoljšanu verziju alogiritma Blowfish.
Twofish - A symmetric key block cipher.
In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but was not selected for standardisation. Twofish is related to the earlier block cipher Blowfish.
In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but was not selected for standardisation. Twofish is related to the earlier block cipher Blowfish.
http://searchsecurity.techtarget.com/definition/Twofish
http://www.ucertify.com/article/what-is-twofish.html

Broj pojmova u bazi: 237 |
Uzorci za traženje u bazi: 360 |
Posljednja izmjena: 10.05.2016. 16:24 |
Online posjetitelja: 2 (0 korisnika)
| 1.0.0