-
1 AUthentication Center
Information technology: AUC (GSM, Mobile-Systems)Универсальный русско-английский словарь > AUthentication Center
-
2 authentication center
Information technology: AUC (GSM, Mobile-Systems)Универсальный русско-английский словарь > authentication center
-
3 Authentication Header
Универсальный русско-английский словарь > Authentication Header
-
4 Authentication Service
Универсальный русско-английский словарь > Authentication Service
-
5 information authentication
аутентификация информацииEnglish-Russian cryptological dictionary > information authentication
-
6 (IP) Authentication Header
Information technology: AH (IPSEC, IPV6, RFC 1826, VPN)Универсальный русско-английский словарь > (IP) Authentication Header
-
7 (PPP) Challenge Handshake Authentication Protocol
Information technology: CHAP (PPP, RFC 1334/1994)Универсальный русско-английский словарь > (PPP) Challenge Handshake Authentication Protocol
-
8 Challenge-Response Authentication Mechanism
Information technology: CRAMУниверсальный русско-английский словарь > Challenge-Response Authentication Mechanism
-
9 Digest Access Authentication
Универсальный русско-английский словарь > Digest Access Authentication
-
10 Distributed Authentication Security Service
Information technology: DASS (RFC 1507)Универсальный русско-английский словарь > Distributed Authentication Security Service
-
11 Distributed Password Authentication
Information technology: DPAУниверсальный русско-английский словарь > Distributed Password Authentication
-
12 Financial Institution Message Authentication Standard
Универсальный русско-английский словарь > Financial Institution Message Authentication Standard
-
13 Graphic Identification and Authentication
Information technology: GINAУниверсальный русско-английский словарь > Graphic Identification and Authentication
-
14 Human Authentication Application Program Interface
Универсальный русско-английский словарь > Human Authentication Application Program Interface
-
15 Identification and Authentication
Information technology: IAУниверсальный русско-английский словарь > Identification and Authentication
-
16 Java Authentication and Authorization Service
Универсальный русско-английский словарь > Java Authentication and Authorization Service
-
17 Medicated Digest Authentication
Универсальный русско-английский словарь > Medicated Digest Authentication
-
18 MicroSoft Challenge Handshake Authentication Protocol
Универсальный русско-английский словарь > MicroSoft Challenge Handshake Authentication Protocol
-
19 Microsoft Challenge Handshake Authentication Protocol
Универсальный русско-английский словарь > Microsoft Challenge Handshake Authentication Protocol
-
20 Microsoft Challenge-Handshake Authentication Protocol
Information technology: MSCHAPУниверсальный русско-английский словарь > Microsoft Challenge-Handshake Authentication Protocol
См. также в других словарях:
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Information assurance — (IA) is the practice of managing information related risks. More specifically, IA practitioners seek to protect and defend information and information systems by ensuring confidentiality, integrity, authentication, availability, and non… … Wikipedia
Authentication server — Authentication servers are servers that provide authentication services to users or other systems. Users and other servers authenticate to such a server, and receive cryptographic tickets. These tickets are then exchanged with one another to… … Wikipedia
Information privacy — Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally… … Wikipedia
Information forensics — is the science of investigation into systemic processes that produce information. Systemic processes utilize primarily computing and communication technologies to capture, treat, store and transmit data. Manual processes complement technology… … Wikipedia
Information technology law — (or IT Law) is a set of recent legal enactments, currently in existence in several countries, which governs the process and dissemination of information digitally. These legal enactments cover a broad gambit of different aspects relating to… … Wikipedia
information assurance — Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. This includes providing for restoration of information systems by… … Military dictionary
Authentication Open Service Interface Definition — The Authentication Open Service Interface Definition (OSID) is an O.K.I. specification which supports invoking an authentication process. OSIDs are programmatic interfaces which comprise a Service Oriented Architecture for designing and building… … Wikipedia
information system — Introduction an integrated set of components for collecting, storing, processing, and communicating information (information science). Business firms, other organizations, and individuals in contemporary society rely on information systems… … Universalium
Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… … Wikipedia