-
1 host-based authentication
Сетевые технологии: проверка подлинности по узлуУниверсальный англо-русский словарь > host-based authentication
-
2 HBA
1) Общая лексика: health and beauty aids2) Военный термин: home base3) Техника: horizontal baffle assembly4) Грубое выражение: Head Bobbing Asshole5) Сокращение: Housing Builders Association6) Вычислительная техника: Host Bus Adapter (SCSI), адаптер главной шины7) СМИ: Harvest Broadcasting Association8) Деловая лексика: High Bandwidth Access9) Безопасность: Hardware Based Authentication, Host Based Authentication10) Расширение файла: Host Bus Adapter -
3 HbA
1) Общая лексика: health and beauty aids2) Военный термин: home base3) Техника: horizontal baffle assembly4) Грубое выражение: Head Bobbing Asshole5) Сокращение: Housing Builders Association6) Вычислительная техника: Host Bus Adapter (SCSI), адаптер главной шины7) СМИ: Harvest Broadcasting Association8) Деловая лексика: High Bandwidth Access9) Безопасность: Hardware Based Authentication, Host Based Authentication10) Расширение файла: Host Bus Adapter -
4 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
5 protocol
- analog networking protocol - cache coherence protocol
- card isolation protocol - character count protocol - cryptographic protocol
- data compression protocol - digital voice messaging networking protocol - error-correction protocol - interior gateway protocol
- interior gateway routing protocol
- internal message protocol
- Internet protocol
- internet protocol
- Internet control message protocol
- internet control message protocol
- Internet gateway routing protocol - IP multicast protocol - link access protocol-digital
- link access protocol for modems - packetized ensemble protocol
- password authentication protocol
- point to point protocol
- point to point multi-link protocol
- point to point tunneling protocol - routing information protocol
- SCSI interlocked protocol - session protocol
- session initiation protocol - stated protocol
- stateful protocol
- stateless protocol
- synchronous protocol - transmission control protocol - transport protocol
- transport protocol class 0
- transport protocol class 4 -
6 protocol
- analog networking protocol
- AppleTalk remote access protocol
- autonomous virtual network protocol
- bandwidth allocation control protocol
- bit-oriented protocol
- bootstrap protocol
- border gateway protocol
- byte-oriented protocol
- cache coherence protocol
- card isolation protocol
- challenge handshake authentication protocol
- character count protocol
- character-controlled protocol
- character-oriented protocol
- client-to-client protocol
- common management information protocol
- communications protocol
- compressed serial line Internet protocol
- connectionless network layer protocol
- connectionless network protocol
- connectionless protocol
- connectionless transport protocol
- connection-oriented protocol
- cryptographic protocol
- data compression protocol
- data link control protocol
- digital data communication message protocol
- digital networking protocol
- digital voice messaging networking protocol
- directory access protocol
- distance vector multicast routing protocol
- dynamic host configuration protocol
- dynamic serial line Internet protocol
- end system to intermediate system protocol
- error-correction protocol
- extended simple mail transfer protocol
- exterior gateway protocol
- fiber channel protocol
- file transfer protocol
- flexible wide-area protocol
- generic packetized protocol
- hot standby router protocol
- hypertext transfer protocol
- image access protocol
- interior gateway protocol
- interior gateway routing protocol
- internal message protocol
- Internet control message protocol
- internet control message protocol
- Internet gateway routing protocol
- Internet group management protocol
- internet group management protocol
- internet inter-ORB protocol
- Internet mail access protocol
- Internet protocol
- internet protocol
- Internet relay chat protocol
- interworking protocol
- IP multicast protocol
- layer-2 tunneling protocol
- lightweight directory access protocol
- link access protocol for modems
- link access protocol
- link access protocol-balanced
- link access protocol-digital
- link control protocol
- manufacturing automation protocol
- medium access control protocol
- message transport protocol
- Microcom networking protocol
- modulation protocol
- multicast file transfer protocol
- multi-link access protocol-digital
- multiprotocol gateway control protocol
- multi-vendor integration protocol
- NetWare core protocol
- NetWare link service protocol
- network control protocols
- network news transfer protocol
- network service protocol
- network time protocol
- next-hop routing protocol
- nonroutable protocol
- packetized ensemble protocol
- password authentication protocol
- point to point multi-link protocol
- point to point protocol
- point to point tunneling protocol
- post office protocol
- proprietary protocol
- proxy address resolution protocol
- radio link protocol
- random-access protocol
- real-time control protocol
- real-time streaming protocol
- real-time transport protocol
- resource reservation protocol
- reverse address resolution protocol
- Rock Ridge interchange protocol
- routable protocol
- router discovery protocol
- routing information protocol
- routing protocol
- SCSI interlocked protocol
- secure hypertext transfer protocol
- serial bus protocol
- serial line access protocol
- serial line Internet protocol
- service advertising protocol
- session initiation protocol
- session protocol
- simple gateway management protocol
- simple mail transfer protocol
- simple management protocol
- simple network management protocol
- socket protocol
- stated protocol
- stateful protocol
- stateless protocol
- synchronous protocol
- system use shared protocol
- technical/office protocol
- time-triggered protocol
- track protocol
- transmission control protocol Internet protocol
- transmission control protocol over/based on Internet protocol
- transmission control protocol
- transport layer protocol
- transport protocol class 0
- transport protocol class 4
- transport protocol
- upper layer protocol
- user datagram protocol
- voice over Internet protocol
- voice-channel protocol
- wireless application protocolThe New English-Russian Dictionary of Radio-electronics > protocol
См. также в других словарях:
Authentication Header — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
Digest access authentication — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Dynamic Host Configuration Protocol — DHCP redirects here. For other uses, see DHCP (disambiguation). A DHCP Server settings tab The Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol for hosts on Internet Protocol (IP) networks. Computers that are… … Wikipedia
Array controller based encryption — Within a storage network, encryption of data may occur at different hardware levels. Array controller based encryption describes the encryption of data occurring at the disk array controller before being sent to the disk drives. This article will … Wikipedia
Closed-loop authentication — Closed loop authentication, as applied to computer network communication, refers to a mechanism whereby one party verifies the purported identity of another party by requiring them to supply a copy of a token transmitted to the canonical or… … Wikipedia
Challenge-Handshake Authentication Protocol — In computing, the Challenge Handshake Authentication Protocol (CHAP) authenticates a user or network host to an authenticating entity. That entity may be, for example, an Internet service provider. CHAP is specified in RFC 1994. CHAP provides… … Wikipedia
Secure Password Authentication — is a protocol used to authenticate with a Simple Mail Transfer Protocol (SMTP) server. The protocol is attributed to Microsoft, but it is not an original protocol, but based on the NTLM authentication scheme.NTLM Authentication Scheme for… … Wikipedia
Challenge-handshake authentication protocol — In computing, the Challenge Handshake Authentication Protocol (CHAP) authenticates a user or network host to an authenticating entity. That entity may be, for example, an Internet access provider. RFC 1994: PPP Challenge Handshake Authentication… … Wikipedia
Cost-based anti-spam systems — Since spam occurs primarily because it is so cheap to send, a proposed set of solutions require that senders pay some cost in order to send spam, making it prohibitively expensive for spammers. Contents 1 Stamps 2 Proof of work systems 3 Bonds or … Wikipedia
HBA — Host Bus Adapter (Computing » General) Host Bus Adapter (Computing » Drivers) ** Home Builders Association (Community » Non Profit Organizations) * Health And Beauty Aids (Business » General) * Host Based Authentication (Computing » Security) *… … Abbreviations dictionary