- data encryption device
- шифратор даннных
English-Russian cryptological dictionary . 2014.
English-Russian cryptological dictionary . 2014.
Data Protection API — DPAPI (Data Protection Application Programming Interface) is a simple cryptographic application programming interface available as a built in component in Windows 2000 and later versions of Microsoft Windows operating systems. In theory the Data… … Wikipedia
data haven — /ˈdeɪtə heɪvən/ (say daytuh hayvuhn) noun a digital data storage device, offering complete privacy, especially from government regulation, by means of data encryption and location in a state which does not have laws allowing legal access …
Data remanence — is the residual representation of data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that… … Wikipedia
Data security — is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. Data security is part of the larger practice of… … Wikipedia
Data erasure — (also called data clearing or data wiping) is a software based method of overwriting data that completely destroys all electronic data residing on a hard disk drive or other digital media. Permanent data erasure goes beyond basic file deletion… … Wikipedia
Data synchronization — is the process of establishing consistency among data from a source to a target data storage and vice versa and the continuous harmonization of the data over time. It is fundamental to a wide variety of applications, including file… … Wikipedia
Data Shredder — Developer(s) CBL Datenrettung Stable release 1.0.1 / April 3, 2007; 4 years ago (2007 04 03) Operating system Windows, MS DOS x86 … Wikipedia
Data deduplication — In computing, data deduplication is a specialized data compression technique for eliminating coarse grained redundant data. The technique is used to improve storage utilization and can also be applied to network data transfers to reduce the… … Wikipedia
Encryption — Encrypt redirects here. For the film, see Encrypt (film). This article is about algorithms for encryption and decryption. For an overview of cryptographic technology in general, see Cryptography. In cryptography, encryption is the process of… … Wikipedia
Device mapper — In the Linux kernel, the device mapper serves as a generic framework to map one block device onto another. It forms the foundation of LVM2 and EVMS, software RAIDs, dm crypt disk encryption, and offers additional features such as file system… … Wikipedia
Device independent file format — DVI stands for device independent. There also is an article about device independent. Device independent (DVI) Evince previewing a DVI file. Note that referenced images are not displayed, because they are not part of the DVI file. Images will be… … Wikipedia