-
41 media pool
A logical collection of removable media that have the same management policies. Media pools are used by applications to control access to specific tapes or discs within libraries managed by Removable Storage. -
42 NTFS
"An advanced file system designed for use specifically with the Windows NT operating system. It supports long filenames, full security access control, file system recovery, extremely large storage media, and various features for the Windows NT POSIX subsystem. It also supports object-oriented applications by treating all files as objects with user-defined and system-defined attributes." -
43 NTFS file system
"An advanced file system designed for use specifically with the Windows NT operating system. It supports long filenames, full security access control, file system recovery, extremely large storage media, and various features for the Windows NT POSIX subsystem. It also supports object-oriented applications by treating all files as objects with user-defined and system-defined attributes." -
44 resource
"For Device Manager, any of four system components that control how the devices on a computer work. These four system resources are interrupt request (IRQ) lines, direct memory access (DMA) channels, input/output (I/O) ports, and memory addresses." -
45 security group
A group that can be listed in discretionary access control lists (DACLs) used to define permissions on resources and objects. A security group can also be used as an e-mail entity. Sending an e-mail message to the group sends the message to all the members of the group. -
46 Server Message Block
"A file-sharing protocol designed to allow networked computers to transparently access files that reside on remote systems over a variety of networks. The SMB protocol defines a series of commands that pass information between computers. SMB uses four message types: session control, file, printer, and message." -
47 SMB
"A file-sharing protocol designed to allow networked computers to transparently access files that reside on remote systems over a variety of networks. The SMB protocol defines a series of commands that pass information between computers. SMB uses four message types: session control, file, printer, and message." -
48 drop-down list box
"A control on a menu, toolbar, dialog box, or data access page that displays a list of options when you click the small arrow next to the list box." -
49 ARP cache
A table of Internet Protocol version 4 (IPv4) addresses and their corresponding media access control (MAC) address. There is a separate ARP cache for each interface. -
50 backup media pool
A logical collection of data-storage media that has been reserved for use by Microsoft Windows Backup. Backup uses Removable Storage to control access to specific media within a library. -
51 secure zone
A DNS zone that is stored in Active Directory and to which access control list (ACL) security features are applied. -
52 database owner
"The person who created the database, and has full control, including granting access permissions or deleting records. When a database has been restored, then the person who restored it becomes the owner." -
53 permissions level
"The extent of access a user has to a site. The default permissions levels are Read, Edit, Design, and Full Control." -
54 storage subsystem
"A stand-alone hardware appliance that hosts one or more storage devices (such as disk drives, tape drives, optical drives), and is peripheral to the server or servers that control access to it. Storage subsystems are used to create centralized data repositories, while freeing computing and storage resources on servers." -
55 Network Center
A control panel that provides the status of your network and access to networking activities. -
56 OneX
An Institute of Electrical and Electronics Engineers (IEEE) standard that defines port-based network access control which either allows or denies connection requests to IEEE 802.3 wired Ethernet networks or IEEE 802.11 wireless networks. -
57 auxiliary display
"A feature of Windows Vista that gives the user quick access to useful information on their computer, such as calendar appointments and the latest e-mail message even when the computer is in standby mode or hibernating, media playback control when the computer is off, and other application notifications." -
58 802.1X
An Institute of Electrical and Electronics Engineers (IEEE) standard that defines port-based network access control which either allows or denies connection requests to IEEE 802.3 wired Ethernet networks or IEEE 802.11 wireless networks.802.1X -
59 IEEE 802.1X security standard
An Institute of Electrical and Electronics Engineers (IEEE) standard that defines port-based network access control which either allows or denies connection requests to IEEE 802.3 wired Ethernet networks or IEEE 802.11 wireless networks.مواصفات الأمان القياسية IEEE 802.1XEnglish-Arabic terms dictionary > IEEE 802.1X security standard
-
60 rights-managed
Stored on a server or client computer that is configured to control access to content by using information rights management (IRM) technology.
См. также в других словарях:
List of highway systems with full control of access and no cross traffic — Many countries have national networks of highways with full control of access and no cross traffic. These do not always include all such highways or even all the major ones in the country.Asia*China: Expressways *Japan: Expressways *Indonesia:… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Access Control List — Muster einer ACL Eine Access Control List, auch ACL, deutsch Zugriffssteuerungsliste, ist eine Software Technik, mit der Betriebssysteme und Anwendungsprogramme Zugriffe auf Daten und Funktionen eingrenzen können. Eine ACL legt fest, welcher… … Deutsch Wikipedia
Control panel (web hosting) — A Control panel in web hosting refers to the interface provided by the hosting company for the maintenance and monitoring of the hosted website. Some of the commonly available modules in most control panels: * Access to server logs. * Details of… … Wikipedia
Access Control Matrix — or Access Matrix is an abstract, formal computer protection and security model used in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in… … Wikipedia
Access Control Entry — Access Control List Pour les articles homonymes, voir ACL. Access Control List (ACL), en français liste de contrôle d accès, désigne deux choses en sécurité informatique : un système permettant de faire une gestion plus fine des droits d… … Wikipédia en Français
Access Control Lists — Access Control List Pour les articles homonymes, voir ACL. Access Control List (ACL), en français liste de contrôle d accès, désigne deux choses en sécurité informatique : un système permettant de faire une gestion plus fine des droits d… … Wikipédia en Français
Access control list — Pour les articles homonymes, voir ACL. Access Control List (ACL), en français liste de contrôle d accès, désigne deux choses en sécurité informatique : un système permettant de faire une gestion plus fine des droits d accès aux fichiers que… … Wikipédia en Français
Access-list — Access Control List Pour les articles homonymes, voir ACL. Access Control List (ACL), en français liste de contrôle d accès, désigne deux choses en sécurité informatique : un système permettant de faire une gestion plus fine des droits d… … Wikipédia en Français
CONTROL-M — is batch scheduling software produced by BMC Software, originally written for mainframes but also available for distributed computing platforms including Unix, Windows, Linux and OpenVMS environments. BMC Software claims that CONTROL M is the… … Wikipedia
Access rights — can refer to: *Access to Information Act, a Canadian act that allows public access to government information *Disability rights movement, disabled access to public and private locations is a key issue *Access control, the ability to permit or… … Wikipedia