-
121 клавиатура доступа
Русско-английский словарь нормативно-технической терминологии > клавиатура доступа
-
122 прибор управления доступом
Русско-английский словарь нормативно-технической терминологии > прибор управления доступом
-
123 прозрачный доступ
Security: transparent access -
124 (наборный) доступ без обратного вызова
Security: single-call accessУниверсальный русско-английский словарь > (наборный) доступ без обратного вызова
-
125 (необоснованный) отказ в доступе
Security: access denialУниверсальный русско-английский словарь > (необоснованный) отказ в доступе
-
126 (несанкционированный) доступ противника
Security: opponent accessУниверсальный русско-английский словарь > (несанкционированный) доступ противника
-
127 (программируемый) параметр доступа
Универсальный русско-английский словарь > (программируемый) параметр доступа
-
128 Необходим код доступа
Security: Access Code RequiredУниверсальный русско-английский словарь > Необходим код доступа
См. также в других словарях:
Code Access Security — (CAS), in the Microsoft .NET framework, is Microsoft s solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the … Wikipedia
Code Access Security — (CAS) ist das Sicherheitsmodell in Microsofts .NET Framework und stellt Microsofts Lösung dar, nicht privilegierten und nicht vertrauten Code an der Ausführung sicherheitskritischer Aktionen zu hindern. Wird eine Assembly durch die Common… … Deutsch Wikipedia
Code Access Security — Code Access Security механизм защиты, позволяющий ограничивать доступ коду к ресурсам компьютера. Используется в среде .NET Framework. Используется для определения разрешений и установки прав доступа к различным системным ресурсам,… … Википедия
Security descriptor — Security descriptors are data structures of security information for securable Windows objects, that is objects that can be identified by a unique name. Security descriptors can be associated with any named objects, including files, folders,… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Access Control Matrix — or Access Matrix is an abstract, formal computer protection and security model used in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in… … Wikipedia
Security controls — are safeguards or countermeasures to avoid, counteract or minimize security risks. To help review or design security controls, they can be classified by several criteria, for example according to the time that they act, relative to a security… … Wikipedia
Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… … Wikipedia
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Security policy — is a definition of what it means to be secure for a system, organization or other entity. For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by mechanisms such as doors,… … Wikipedia
Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro … Wikipedia