Перевод: с французского на английский

с английского на французский

computer security technology

См. также в других словарях:

  • Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible …   Wikipedia

  • Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Computer security conference — A computer security conference is a term that describes a convention for individuals involved in computer security. They generally serve as a meeting place for system and network administrators, hackers, and computer security experts. Contents 1… …   Wikipedia

  • Computer security incident management — In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events …   Wikipedia

  • Computer Security Act of 1987 — The Computer Security Law of 1987, Public Law No. 100 235 (H.R. 145), (Jan. 8, 1988), was passed by the United States Congress. It was passed to improve the security and privacy of sensitive information in Federal computer systems and to… …   Wikipedia

  • Computer Security Incident Response Team — Un CSIRT (ou Computer Security Incident Response Team) est un centre d alerte et de réaction aux attaques informatiques. Cette appellation est privilégiée en Europe[1], CERT étant une marque déposée aux États Unis par l Université Carnegie… …   Wikipédia en Français

  • Hacker (computer security) — This article is part of a series on …   Wikipedia

  • Ring (computer security) — In computer science, hierarchical protection domains, [Paul A. Karger, Andrew J. Herbert, [http://doi.ieeecomputersociety.org/10.1109/SP.1984.10001 An Augmented Capability Architecture to Support Lattice Security and Traceability of Access] , sp …   Wikipedia

  • Timeline of computer security hacker history — This is a timeline of computer security hacker history. Hacking and system cracking appeared with the first electronic computers. Below are some important events in the history of hacking and cracking.1970s1971* John T. Draper (later nicknamed… …   Wikipedia

  • Tom Cross (computer security) — Infobox Scientist name = Tom Cross box width = image width = 170px caption = Tom Cross at the Emperor (Happy Valley) Hotel in Hong Kong in 2001 birth date = 1976 birth place = Toronto, Canada death date = death place = residence = citizenship =… …   Wikipedia

  • Computer emergency response team — is a name given to expert groups that handle computer security incidents. Most groups append the abbreviation CERT or CSIRT to their designation where the latter stands for Computer Security Incident Response Team. For some teams the spelling of… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»