-
1 Network Security Server
Network technologies: NSSУниверсальный русско-английский словарь > Network Security Server
-
2 Directory and Security Server
Network technologies: DSSУниверсальный русско-английский словарь > Directory and Security Server
-
3 сетевой сервер безопасности
Security: network security serverУниверсальный русско-английский словарь > сетевой сервер безопасности
-
4 сетевой сервер защиты данных
Network technologies: NSS, network security serverУниверсальный русско-английский словарь > сетевой сервер защиты данных
-
5 сервер сети засекреченной связи
Security: secure network serverУниверсальный русско-английский словарь > сервер сети засекреченной связи
-
6 P2P
abbr. E-compeer-to-peer: a means of optimizing the networking capabilities of the Internet among groups of computers. Effectively it puts every computer on an equal footing, in that each can be both a publisher and consumer of information. The traditional model on the Web is the client-server one: the client is a computer that is able only to receive information; the server, on the other hand, publishes information on a Web site. Peer-to-peer makes a computer both a server and a client. Perhaps the best-known example of peer-to-peer is Napster, which enabled person A to search for and download music from person B’s computer, while person B could search for and download music from person A’s computer.There are several options for the use of peer-to-peer technologies. Information/ content: where the content on your computer becomes accessible to everyone else in the peer-to-peer environment, and vice versa. Processing sharing: where computers with spare processing capacity network together in order to combine resources. Using a large number of computers, this can create very significant processing capabilities. Services: a computer user can offer services to other people in the peer-to-peer network. File sharing: if person A downloads a file from a central server (an e-learning course from the Internet, for example), other people can use it from person A’s machine instead of having to download it again, significantly reducing strain on bandwidth.The main problem with peer-to-peer is the issue of security, and therefore it is essential to authenticate users. Many peer-to-peer interactions also use encryption, which ensures that the communication is secure as it is being passed from computer to computer. -
7 ЛВС
1) Computers: LAN2) Engineering: local data-processing network (вычислительная), local-area network (вычислительная), short-haul network3) Information technology: локальная вычислительная сеть4) Sakhalin energy glossary: local area network (system permitting a number of PCs to share centralized software and files by means of a file server and hard wiring) (локальная вычислительная сеть), СМС5) Network technologies: local area network6) Sakhalin R: local area network (локальная вычислительная сеть)7) Sakhalin S: локальная вычислительная (компьютерная) сеть9) Security: local computer network10) Internet: Local Area Network (Соединённые вместе скоростным каналом компьютеры и другие устройства, расположенные на незначительном удалении один от другого (комната, здание, предприятие)) -
8 резервный сервер
1) Aviation: redundant server2) Information technology: standby server3) Network technologies: disaster site4) Security: secondary server -
9 сетевой компьютер
1) General subject: Network-Computer2) Computers: server machine3) Information technology: network computer (Простой бездисковый компьютер с минимальным системным программным обеспечением и подключенный в компьютерную сеть)4) Network technologies: NC, networked computer5) Security: network computer, networking computer -
10 שרת מתווך
proxy server, buffer between an internal network of an organization and the Internet as part of a security system to protect the organization's network for external intrusion -
11 терминал
1) Computers: data terminal equipment, user station2) Engineering: port terminal, subscriber terminal, terminal block, terminal device, terminal unit, workstation (дисплейный)3) Construction: terminal4) Mathematics: console5) Accounting: terminal symbol6) Telecommunications: instrument (сети передачи данных со множественным доступом), endpoint7) Electronics: final terminal8) Information technology: station, station (абонентский), stn (абонентский), terminal (в формальной грамматике), terminal station9) Oil: pipeline terminal, trlm10) Metrology: end instrument11) Patents: terminal (оконечное устройство ЭВМ)12) Business: terminus13) Network technologies: data communication terminal14) Automation: terminal server, (дисплейный) workstation (САПР)15) Aviation medicine: termination16) Security: terminal apparatus
См. также в других словарях:
Network Security Services — Developer(s) AOL, Red Hat, Sun Microsystems, Oracle Corporation, Google and others Stable release 3.12.8 / September 23, 2010; 13 months ago (2010 09 23) … Wikipedia
Network Security Toolkit — NST WUI: Multi Tap Network Packet Capture Developer(s) … Wikipedia
Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… … Wikipedia
Network Access Protection — (NAP) is a Microsoft technology for controlling network access of a computer host based on the system health of the host, first introduced in Windows Server 2008. With Network Access Protection, system administrators of an organization s computer … Wikipedia
Network Admission Control — (NAC) refers to Cisco s version of Network Access Control, which restricts access to the network based on identity or security posture. When a network device (switch, router, wireless access point, DHCP server, etc.) is configured for NAC, it can … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… … Deutsch Wikipedia
Security Scan — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… … Deutsch Wikipedia
Security Test — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… … Deutsch Wikipedia
Server (computing) — For other uses, see Server (disambiguation). Servers in a data center. Several servers are mounted on a rack and connected to a display … Wikipedia
Security Practices and Research Student Association — The Security Practices and Research Student Association (SPARSA) is a Rochester Institute of Technology student run organization that addresses security related issues and how these issues affect multiple majors and disciplines. The ultimate goal … Wikipedia