-
1 code access security
"A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform." -
2 CODE–DIVISION MULTIPLE ACCESS
English-Arabic military dictionary > CODE–DIVISION MULTIPLE ACCESS
-
3 access code
"A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on." -
4 international access code
The prefix that is used to direct a call internationally. The International Access Code is 011 in the United States and 00 in much of the rest of the world. -
5 participant code
"An access code that is required for a user to join a conference as a participant. This code is entered in the Options dialog box, on the Accounts tab, under Conferencing Information." -
6 outside line access code
"The prefix that is used to access an outside line. In the United States, this prefix is typically 9." -
7 leader code
"An access code that is needed in order for a user to join a conference as a leader. This string is entered in the Options dialog box, on the Accounts tab, under Conferencing Information." -
8 authorization code
"A code that grants rights to an individual, for example to use a system or access stored data." -
9 zero access code
[΄ziərəu ΄ækses ΄kəud] հմկրգ. անհասցե կոդ -
10 common language runtime
"The engine at the core of managed code execution. The runtime supplies managed code with services such as cross-language integration, code access security, object lifetime management, and debugging and profiling support." -
11 CLR
"The engine at the core of managed code execution. The runtime supplies managed code with services such as cross-language integration, code access security, object lifetime management, and debugging and profiling support." -
12 runtime
"The engine at the core of managed code execution. The runtime supplies managed code with services such as cross-language integration, code access security, object lifetime management, and debugging and profiling support." -
13 full trust
"A code access security (CAS) state assigned to managed assemblies. The level of trust granted to an application or Web service affects its ability to use system resources while executing. Assemblies that have full trust can access any resource that is subject to operating system security, and all privileged operations are supported." -
14 solution package
"A compressed file that can be deployed to a server farm or a site. It can contain assemblies, resource files, site and feature definitions, templates, code access security policies, and Web Parts." -
15 transparency
"A security model that helps developers write and deploy secure libraries and applications by isolating code depending on privilege. Level 1 transparency was introduced in the.NET Framework version 2.0. It enables developers to annotate code to declare which types and members can perform security elevations and other trusted actions (security-critical) and which cannot (security-transparent). Level 2 transparency, which was introduced in the.NET Framework 4, refines this model. It adds a third group of code, security-safe-critical code, which are types or members that access secure resources and can be safely used by partially-trusted code in the.NET Framework." -
16 interactive dialog box
"A dialog box that requires a response from the user. Intermediary devices such as a security host require such a dialog box as an added layer of security between the client and the remote access server. In such dialog boxes, the user types an access code or a user name and password on the remote access terminal screen." -
17 boot sector
"A critical disk structure for starting your computer, located at sector 1 of each volume or floppy disk. It contains executable code and data that is required by the code, including information used by the file system to access the volume. The boot sector is created when your format the volume." -
18 user mode
"The nonprivileged processor mode in which application code, including protected subsystem code, executes. User-mode applications cannot gain access to system data except by calling subsystem-supplied functions, which, in turn, call system services." -
19 critical section
"A segment of code which is not reentrant; that is, it does not support concurrent access by multiple threads. Often, a critical section is used to protect shared resources." -
20 GDT
"A memory segment that contains descriptors for code, data, and descriptor table segments. All processor tasks have access to a common GDT."
- 1
- 2
См. также в других словарях:
Code Access Security — (CAS), in the Microsoft .NET framework, is Microsoft s solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the … Wikipedia
Code Access Security — (CAS) ist das Sicherheitsmodell in Microsofts .NET Framework und stellt Microsofts Lösung dar, nicht privilegierten und nicht vertrauten Code an der Ausführung sicherheitskritischer Aktionen zu hindern. Wird eine Assembly durch die Common… … Deutsch Wikipedia
Code Access Security — Code Access Security механизм защиты, позволяющий ограничивать доступ коду к ресурсам компьютера. Используется в среде .NET Framework. Используется для определения разрешений и установки прав доступа к различным системным ресурсам,… … Википедия
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Code Division Multiple Access — (abrégé en CDMA, la commission générale de terminologie et de néologie propose le terme accès multiple par répartition en code, abrégé en AMRC), est un système de codage des transmissions, utilisant la technique d étalement de spectre. Il permet… … Wikipédia en Français
Code Lyoko — Format Animated, Science fiction, Action, Comedy Created by Tania Palumbo Thomas Romain … Wikipedia
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Code division multiple access — Générations et normes de téléphonie mobile 0G PTT MTS IMTS AMTS 0,5G Autotel/PALM ARP 1G NMT AMPS Hicap CDPD Mobitex DataTac TACS RC2000 C NETZ Comvik NTT … Wikipédia en Français
Access Point Name — or APN is the name of an access point for GPRS.An access point is: * An Internet network to which a mobile can be connected * A set of settings which are used for that connection * A particular option in a set of settings in a mobile phoneWhen a… … Wikipedia
Code of Vengeance — Title card for the 1985 TV movie Also known as Dalton and Dalton s Code of Vengeance Genre … Wikipedia
code — [kəʊd ǁ koʊd] noun 1. [countable] LAW a complete set of written rules or laws: • Each state in the US has a different criminal and civil code. ˈbuilding code [countable] LAW a set of rules that states what features a new building, bridge etc… … Financial and business terms