Перевод: со всех языков на все языки

со всех языков на все языки

host-level access control

См. также в других словарях:

  • Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… …   Wikipedia

  • Media access control — The OSI model 7 Application layer 6 Presentation layer 5 Session layer 4 Transport layer 3 Network layer 2 …   Wikipedia

  • Host-based intrusion detection system — A host based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyses the internals of a computing system rather than on its external interfaces (as a network based intrusion detection system (NIDS) would do) …   Wikipedia

  • Lightweight Directory Access Protocol — The Lightweight Directory Access Protocol (LDAP;  /ˈɛld …   Wikipedia

  • Dynamic Host Configuration Protocol — DHCP redirects here. For other uses, see DHCP (disambiguation). A DHCP Server settings tab The Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol for hosts on Internet Protocol (IP) networks. Computers that are… …   Wikipedia

  • Filesystem-level encryption — Filesystem level encryption, often called file or folder encryption, is a form of disk encryption where individual files or directories are encrypted by the file system itself. This is in contrast to full disk encryption where the entire… …   Wikipedia

  • Medium access controller — MAC or Medium Access Controller is the hardware or rarely software which provides data link layer connectivity for local area network protocols, most commonly Ethernet.The MAC creates the Ethernet packets from the higher level network protocol… …   Wikipedia

  • Traffic Control — ➡ law enforcement * * * Introduction       supervision of the movement of people, goods, or vehicles to ensure efficiency and safety.       Traffic is the movement of people and goods from one location to another. The movement typically occurs… …   Universalium

  • Dynamic random access memory — (DRAM) is a type of random access memory that stores each bit of data in a separate capacitor within an integrated circuit. Since real capacitors leak charge, the information eventually fades unless the capacitor charge is refreshed periodically …   Wikipedia

  • Phantom Access — was the name given to a series of hacking programs written by Patrick Kroupa (a.k.a., Lord Digital) of LOD. The programs were worked on during the early to mid 80s (1982 1986), and designed to run on the Apple II computer and Apple Cat modem.… …   Wikipedia

  • Data Control & Systems — was a company formed by Rob Nursten in Zimbabwe. The company set out to provide Internet access to the whole nation from 1994 onwards. Its domain name was http://harare.iafrica.com. Eventually it changed names to Internet Unlimited and was then… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»