Перевод: с русского на все языки

со всех языков на русский

end-to-end authentication

См. также в других словарях:

  • authentication —    The verification process used in the Motorola Integrated Radio System (MIRS) system which automatically checks subscriber identification to provide additional security to end users …   IT glossary of terms, acronyms and abbreviations

  • E-mail authentication — is the effort to equip messages of the e mail transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It is different from content filtering s fuzzy methods.… …   Wikipedia

  • Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in …   Wikipedia

  • Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… …   Wikipedia

  • Internet Authentication Service — (IAS) is a component of Windows Server operating systems that provides centralized user authentication and authorization, auditing and accounting. Overview While Routing and Remote Access (RRAS) security is sufficient for small networks, larger… …   Wikipedia

  • Central Authentication Service — The Central Authentication Service (CAS) is a single sign on protocol for the web. Its purpose is to permit a user to log into multiple applications simultaneously and automatically. It also allows untrusted web applications to authenticate users …   Wikipedia

  • Internet Authentication Service — El Servicio de autentificación de Internet o IAS (en ingles Internet Authentication Service) es un componente del sistema operativo Windows Server que proporciona autentificaciónes de usuario, autorizaciones, contabilidad y auditoría. Contenido 1 …   Wikipedia Español

  • Security Support Provider Interface — SSPI is an API used by Microsoft Windows systems to perform a variety of security related operations such as authentication.SSPI functions as a common interface to several Security Support Providers (SSP) such as: * NTLM * Kerberos * Secure… …   Wikipedia

  • Melih Abdulhayoğlu — Ernst Young Entrepreneur of the Year New Jersey Region December, 2008[1] Born March 10, 1968 …   Wikipedia

  • IUP Portfolio Functional Specifications — Application summary =IUP Portfolio is an education platform for Swedish schools, focused around the students individual development plan ( Individuell utvecklingsplan , IUP) and learning portfolio. License IUP Portfolio is published under the GNU …   Wikipedia

  • Penetration test — A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious user, known as a Black Hat Hacker, or Cracker. The process involves an active analysis of the system for any… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»