- cryptographic clearance
- разрешение на пользование шифрсвязью; допуск к шифровальной работе
English-Russian military dictionary. 2014.
English-Russian military dictionary. 2014.
List of U.S. security clearance terms — The followings list of terms is used to indicate type, level, or scope of security clearance and background investigation in the United States.Security clearance descriptors often appear in employment advertisements, as employers generally prefer … Wikipedia
Classified information in the United States — For information on practices in other countries, see Classified information. The United States government classification system is currently established under Executive Order 13526, the latest in a long series of executive orders on the topic.[1] … Wikipedia
Les Earnest — Lester Donald Earnest was born in the United States on December 17, 1930. He began his career as a computer programmer in 1954 during a stint as a U.S. Navy Aviation Electronics Officer Digital Computer Project Officer at Naval Air Development… … Wikipedia
Pearl Harbor advance-knowledge debate — The Pearl Harbor advance knowledge debate is a dispute over what, if any, advance knowledge American officials had of Japan s December 7, 1941 attack on Pearl Harbor.Ever since the Japanese attack there has been debate as to how and why the… … Wikipedia
Credential — For the record label, see Credential Recordings. A credential is an attestation of qualification, competence, or authority issued to an individual by a third party with a relevant or de facto authority or assumed competence to do so. Examples of… … Wikipedia
Digital credential — Digital credentials are the digital equivalent of paper based credentials. Just as a paper based credential could be a passport, a Driver s license, a membership certificate or some kind of ticket to obtain some service, such as a cinema ticket… … Wikipedia
Intelligence cycle security — This article is part of a series under the intelligence cycle management, and deals with protection of the intelligence cycle. For a hierarchical list of articles, see the intelligence cycle management hierarchy. National intelligence programs,… … Wikipedia
Classified information — Top Secret redirects here. For other uses, see Top Secret (disambiguation). Unclassified redirects here. See also, Unclassified (album). State secrets redirects here. See also, state secrets privilege. A typical classified document. Page 13 of a… … Wikipedia
STU-III — is a family of secure telephones introduced in 1987 by the NSA for use by the United States government, its contractors, and its allies. STU III desk units look much like typical office telephones, plug into a standard telephone wall jack and can … Wikipedia
Marder (IFV) — Marder 1 A Marder IFV Type Infantry fighting vehicle Place of origin … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia