Examples of using Encryption technologies in English and their translations into Bulgarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Supports a wide range of encryption technologies.
We use encryption technologies that are recognized as accepted standards within the IT sector.
PayPal uses one of the market's leading encryption technologies.
We protect this information via encryption technologies and by limiting the access of employees to the data bases.
For example, we may use antivirus systems,firewalls and data encryption technologies.
During World War Il, one of the most important encryption technologies used by the German military was known as the Enigma.
Network configuration, including TCP/IP, Domain Name System(DNS), virtual private networks,firewalls, and encryption technologies.
Digital signatures provide security that is based in encryption technologies, and help mitigate risk associated with electronic business transactions.
Secure your computers and sensitive data with anti-virus, anti-spyware, firewall, NAC,DLP and encryption technologies in one solution.
By now it's become quite obvious that many VPN encryption technologies are certified and developed by the National Institute of Standards and Technology. .
Understanding of network configuration, including TCP/IP, Domain Name System(DNS), virtual private networks(VPNs),firewalls, and encryption technologies.
We use the industry? s leading data encryption technologies and our dedicated team of anti-fraud experts works around-the-clock to monitor transactions.
An exception for encryption research permits circumvention of access control measures, and the development of the technologicalmeans to do so, in order to identify flaws and vulnerabilities of encryption technologies.
However, because we cannot guarantee the complete security of these encryption technologies, please use caution when submitting personal information online.
(37)Service providers who offer electronic communications services should inform end- users of measures they can take to protect the security of their communications for instance by using specific types of software or encryption technologies.
We have made a substantial investment in our server, database, backup,firewall and encryption technologies to protect the information that we collect and process.
ISPs who offer electronic communication services over the Internet should inform user andsubscribers of measures they can take to protect the security of communications for instance by using specific types of software or encryption technologies[29].
We have made a substantial investment in our server, database, backup,firewall and encryption technologies to protect the information that we collect and process.
(37) Service providers who offer electronic communications services should inform end- users of measures they can take to protect the security of their communications for instance by using specific types of software or encryption technologies.
In cybersecurity and defence,supercomputers are used for developing efficient encryption technologies, and in combination with artificial intelligence for understanding and responding to cyberattacks.
Service providers who offer publicly available electronic communications services over the Internet should inform users andsubscribers of measures they can take to protect the security of their communications for instance by using specific types of software or encryption technologies.
High-Performance Computing is also essential for national security and defence,for example when developing complex encryption technologies, tracking and responding to cyberattacks, deploying efficient forensics or in nuclear simulations.
(37) Service providers who offer electronic communications services should inform end- users of measures they can take to protect the security of their communications for instance by using specific types of software or encryption technologies.
Your information will be kept in a secure environment protected by a combination of physical andtechnical measures such as encryption technologies or authentication systems to prevent any loss, misuse, alteration, disclosure, destruction, theft or unauthorised access.
Providers of public electronic communications networks or of publicly available electronic communications services should inform users of particular and significant security threats and of measures they can take to protect the security of their communications,for instance by using specific types of software or encryption technologies.
High-Performance Computing is also essential for national security and defence,for example when developing complex encryption technologies, tracking and responding to cyberattacks, deploying efficient forensics or in nuclear simulations.
Providers of public electronic communications networks or of publicly available electronic communications services should inform users of particular and significant security threats and of measures they can take to protect the security of their communications,for instance by using specific types of software or encryption technologies.
High-Performance Computing is also essential for national security and defence,for example when developing complex encryption technologies, tracking and responding to cyberattacks, deploying efficient forensics or in nuclear simulations.
IntelliPoker has made a substantial investment in its server, database, backup,firewall and encryption technologies, deployed in the form of state-of-the-art security architecture, to protect the information collected by IntelliPoker.
