Перевод: с английского на русский

с русского на английский

unauthorized equipment

См. также в других словарях:

  • communications security equipment — Equipment designed to provide security to telecommunications by converting information to a form unintelligible to an unauthorized interceptor and by reconverting such information to its original form for authorized recipients, as well as… …   Military dictionary

  • COMSEC equipment — is equipment designed to provide security to telecommunications (COMSEC) using cryptography.ee alsoCOMSEC Equipment designated as telecommunications security (TSEC), Joint Electronic Type Designation System, and controlled cryptographic item… …   Wikipedia

  • Conficker — Common name Aliases Mal/Conficker A(Sophos) Win32/Conficker.A (CA) W32.Downadup (Symantec) W32/Downadup.A (F Secure) Conficker.A (Panda) Net Worm.Win32.Kido.bt ( …   Wikipedia

  • самовольно включенное в сеть оборудование — — [Л.Г.Суменко. Англо русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.] Тематики информационные технологии в целом EN unauthorized equipment …   Справочник технического переводчика

  • call restrictor —    Equipment inserted in an outgoing dial trunk that restricts calls to forbidden or unauthorized codes …   IT glossary of terms, acronyms and abbreviations

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Government contract — Contracting with the U.S. Government is based on many of the same principles as commercial contracting andcan be very profitable, but is sufficiently different from commercial contracting to require special care.Persons entering into commercial… …   Wikipedia

  • Government procurement in the United States — is based on many of the same principles as commercial contracting, but is subject to special laws and regulation as described below. Persons entering into commercial contracts are pretty much free to do anything that they can agree on. Each… …   Wikipedia

  • Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Anti-frogman techniques — are security methods developed to protect watercraft, ports and installations, and other sensitive resources both in or nearby vulnerable waterways from potential threats or intrusions by frogmen or other divers.Risks and threats to be defended… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»