-
1 protection and secure module
Network technologies: PSMУниверсальный русско-английский словарь > protection and secure module
-
2 модуль защиты и обеспечения секретности
Network technologies: PSM, protection and secure moduleУниверсальный русско-английский словарь > модуль защиты и обеспечения секретности
См. также в других словарях:
Secure voice — (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. Contents 1 History 2 Analog Secure Voice technologies 3 Di … Wikipedia
Secure cryptoprocessor — A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. The purpose of… … Wikipedia
Secure Digital card — Infobox media name = Secure Digital logo = caption = Pair of SD cards type = Memory card encoding = capacity = Standard SD: 8 MB to 4 GB SDHC: 1 GB to 32 GB [pricerunner.com 2008 08 27] (theoretical max for SDHC is 2 TB.) read = write = standard … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Next-Generation Secure Computing Base — The Next Generation Secure Computing Base (NGSCB), formerly known as Palladium, is a software architecture designed by Microsoft which is expected to implement parts of the controversial Trusted Computing concept on future versions of the… … Wikipedia
Buffer overflow protection — refers to various techniques used during software development to enhance the security of executable programs by detecting buffer overflows on stack allocated variables as they occur and preventing them from becoming serious security… … Wikipedia
Business and Industry Review — ▪ 1999 Introduction Overview Annual Average Rates of Growth of Manufacturing Output, 1980 97, Table Pattern of Output, 1994 97, Table Index Numbers of Production, Employment, and Productivity in Manufacturing Industries, Table (For Annual… … Universalium
Trusted Platform Module — In computing, Trusted Platform Module (TPM) is both the name of a published specification detailing a secure cryptoprocessor that can store cryptographic keys that protect information, as well as the general name of implementations of that… … Wikipedia
Hardware Security Module — A Hardware Security Module (often abbreviated to HSM) is a physical device in form of a plug in card or an external security device that can be attached to general purpose computer and servers.The goals of an HSM are the: (a) secure generation,… … Wikipedia
List of Nortel Products and Protocols — List of Nortel Products, and Protocols:Products Application Switching Optimization* Application Accelerator 610 * Application Accelerator 510 * Application Switch 3408E * Application Switch 2424E * Application Switch 2424 SSL E * Application… … Wikipedia
List of computing and IT abbreviations — This is a list of computing and IT acronyms and abbreviations. Contents: 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y … Wikipedia