-
21 Domain Name System
"A hierarchical, distributed database that contains mappings of DNS domain names to various types of data, such as IP addresses. DNS enables the location of computers and services by user-friendly names, and it also enables the discovery of other information stored in the database." -
22 DNS
"A hierarchical, distributed database that contains mappings of DNS domain names to various types of data, such as IP addresses. DNS enables the location of computers and services by user-friendly names, and it also enables the discovery of other information stored in the database." -
23 recover
"To put back into a stable condition. A computer user may be able to recover lost or damaged data by using a program to search for and salvage whatever information remains in storage. A database may be recovered by restoring its integrity after some problem has damaged it, such as abnormal termination of the database management program." -
24 post-deployment script
A set of zero or more user-specified database scripts that are executed in a specific order after the database deployment script is executed. -
25 pre-deployment script
A set of zero or more user-specified database scripts that are executed in a specific order before the database deployment script is executed. -
26 ACE
Part of the Access database system that retrieves and stores data in user and system databases. The engine can be thought of as a data manager on which database systems are built. -
27 middle tier
The logical layer between a user interface or Web client and the database. This is typically where the Web server resides and where business objects are instantiated. -
28 Network News Transfer Protocol
"A member of the TCP/IP suite of protocols used to distribute network news messages to NNTP servers and clients (newsreaders) on the Internet. NNTP is designed so that news articles are stored on a server in a central database, thus enabling a user to select specific items to read."English-Arabic terms dictionary > Network News Transfer Protocol
-
29 NNTP
"A member of the TCP/IP suite of protocols used to distribute network news messages to NNTP servers and clients (newsreaders) on the Internet. NNTP is designed so that news articles are stored on a server in a central database, thus enabling a user to select specific items to read." -
30 registry
"A database repository for information about a computer's configuration. The registry contains information that Windows continually references during operation, such as: profiles for each user; the programs installed on the computer and the types of documents that each can create; property settings for folders and program icons; what hardware exists on the system; which ports are being used. The registry is organized hierarchically as a tree, and it is made up of keys and their subkeys, hives, and entries." -
31 system object
"A database object that is defined by the system, such as the table MSysIndexes, or by the user." -
32 UAS
The LAN Manager user account database. -
33 locked
"The condition of a field, record, recordset, or database that makes it read-only to all users except the user currently modifying it."مؤمّن -
34 SQL Server Profiler
A graphical user interface for monitoring an instance of the SQL Server database engine or an instance of Analysis Services. -
35 work item
"A user-defined object with unique fields, forms, and rules. Work items can be queried across the database." -
36 mailbox
The combination of an Active Directory user object that has mailbox attributes and the associated mailbox data that is stored in the mailbox database. -
37 Key Management Service
"An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures." -
38 script injection attack
"An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code."
- 1
- 2
См. также в других словарях:
Database activity monitoring — (DAM) is a database security technology for monitoring and analyzing database activity that operates independently of the database management system (DBMS) and does not rely on any form of native (DBMS resident) auditing or native logs such as… … Wikipedia
Database security — concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links)… … Wikipedia
Database Forensics — is a computer science term referring to the forensic study of databases. Definition of Computer forensics:“Gathering and analyzing data in a manner as free from distortion or bias as possible to reconstruct data or what has happened in the past… … Wikipedia
Database — A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model relevant aspects of reality (for example, the availability of rooms in hotels), in a way that supports… … Wikipedia
Database forensics — Forensic science Physiological sciences … Wikipedia
Database audit — Database auditing involves observing a database so as to be aware of the actions of database users. Database administrators and consultants often set up auditing for security purposes, for example, to ensure that those without the permission to… … Wikipedia
Database Programmer's Toolkit — (DPT) is a freeware product which emulates CCA s Model 204 DBMS. DPT was created by Richard Groves in September 2004 (Version 0.1) as a basic Model 204 emulator where User Language code could be executed without the need for a mainframe. The… … Wikipedia
Database administration and automation — Database administration is the function of managing and maintaining database management systems (DBMS) software. Mainstream DBMS software such as Oracle, IBM DB2 and Microsoft SQL Server need ongoing management. As such, corporations that use… … Wikipedia
User Datagram Protocol — (UDP) is one of the core protocols of the Internet Protocol Suite. Using UDP, programs on networked computers can send short messages sometimes known as datagrams (using Datagram Sockets) to one another. UDP is sometimes called the Universal… … Wikipedia
Database management system — A database management system (DBMS) is a software package with computer programs that control the creation, maintenance, and the use of a database. It allows organizations to conveniently develop databases for various applications by database… … Wikipedia
User-defined function — A User Defined Function, or UDF, is a function provided by the user of a program or environment, in a context where the usual assumption is that functions are built into the program or environment.BASIC languageIn some old implementations of the… … Wikipedia