АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Macro virusMail bombMalicious codeMalware, malicious softwareMan-in-the-middleMan-in-the-middle attackManagementManagementMandatory access controlMandatory access controlManipulation detectionManipulation detectionMapping free of error propagationMapping free of error propagationMaskueradeMaster keyMaurer universal testMedium strength of functionMeet-in-the-middle attackMeet-in-the-middle methodMemory using attack, memory-used search attackMemory using cryptanalysisMemory-scraping attacksMessageMessage authenticationMessage authentication codeMessage authentication code modeMessage authentication code modeMessage authentication code, seal, integrity check valueMessage authentication protocolMessage integrityMisuseMixing propertyMixing transformMobile content management (MCM)Mobile device management (MDM)ModelMonitoringMonitoringMonitoring attackMoving probable word attackMoving probable word cryptanalysisMulti-factor authenticationMultilevel securityMultilevel securityMultiple digital signatureMutual authentication