-
1 user security matrix
Information technology: USMУниверсальный русско-английский словарь > user security matrix
-
2 таблица защиты пользователей
Русско-английский словарь по нефти и газу > таблица защиты пользователей
-
3 таблица защиты пользователей
Русско-английский словарь по информационным технологиям > таблица защиты пользователей
-
4 таблица защиты пользователей
Information technology: user security matrix, usmУниверсальный русско-английский словарь > таблица защиты пользователей
См. также в других словарях:
Security Identifier — In the context of the Microsoft Windows NT line of operating systems, a Security Identifier (commonly abbreviated SID) is a unique name (an alphanumeric character string) which is assigned by a Windows Domain controller during the log on process… … Wikipedia
List of User Friendly characters — User Friendly characters are the characters that feature on the webcomic User Friendly. Contents 1 Main characters 1.1 A.J. 1.2 The Chief 1.3 Dust Puppy … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… … Wikipedia
National Industrial Security Program — The National Industrial Security Program, or NISP, is the nominal authority (in the United States) for managing the needs of private industry to access classified information. The NISP was established in 1993 by Executive Order 12829.[1] The… … Wikipedia
Hacker (computer security) — This article is part of a series on … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Dot matrix — For other uses including the printer and display types, and fictional characters of this name, see Dot matrix (disambiguation). Bling Bling : Dot matrix style skywriting. A dot matrix is a 2 dimensional array of LED used to represent characters,… … Wikipedia
Separation of protection and security — In computer sciences the separation of protection and security is a design choice. Wulf et al. identified protection as a mechanism and security as a policy,[1] therefore making the protection security distinction a particular case of the… … Wikipedia
DNS cache poisoning — is a security or data integrity compromise in the Domain Name System (DNS). The compromise occurs when data is introduced into a DNS name server s cache database that did not originate from authoritative DNS sources. It may be a deliberate… … Wikipedia
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium