Перевод: с английского на арабский

с арабского на английский

ip+security+protocol

  • 21 HTTPS

    "A message transfer protocol used by the World Wide Web to service page requests, and which adds a security layer using Secure Socket Layer (SSL) technology."

    English-Arabic terms dictionary > HTTPS

  • 22 Edge Transport server role

    An Exchange Server 2007 and 2010 server role that provides anti-spam and antivirus protection and applies messaging security policies to messages in transport between organizations by using a series of agents that act on messages as they are processed by the message transport components. This server role is deployed in the perimeter network outside the Active Directory directory service forest. Computers that have the Edge Transport server role installed handle all Internet-facing mail flow and provide Simple Mail Transfer Protocol (SMTP) relay and smart host services for the Exchange organization.

    English-Arabic terms dictionary > Edge Transport server role

  • 23 TLS authentication

    Authentication by using the Transport Layer Security (TLS) protocol.

    English-Arabic terms dictionary > TLS authentication

См. также в других словарях:

  • Security protocol notation — Security (engineering) protocol notation is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network. In the context of a formal model, it allows reasoning about the properties of such a… …   Wikipedia

  • Message Security Protocol —    A protocol for securing e mail and document transmission …   IT glossary of terms, acronyms and abbreviations

  • Security Content Automation Protocol — The Security Content Automation Protocol (SCAP) is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation (e.g., FISMA compliance). The National Vulnerability Database… …   Wikipedia

  • Security Association — Eine Security Association (SA, dt. Sicherheitsverbindung) ist eine Vereinbarung zwischen zwei kommunizierenden Einheiten in Rechnernetzen. Sie beschreibt, wie die beiden Parteien Sicherheitsdienste anwenden werden, um sicher miteinander… …   Deutsch Wikipedia

  • Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… …   Wikipedia

  • Protocol Concerning the Redeployment in Hebron — Protocol Concerning the Redeployment in Hebron, also known as The Hebron Protocol or Hebron Agreement, began January 7 and was concluded from January 15 to January 17 1997 between Israel, represented by Prime Minister of Israel Benjamin Netanyahu …   Wikipedia

  • protocol — pro‧to‧col [ˈprəʊtəkɒl ǁ ˈproʊtəkɒːl, kɑːl] noun 1. [countable] COMPUTING an established method for connecting computers so that they can exchange information: • You have to use a different protocol with this new modem. • HTTP is an Internet… …   Financial and business terms

  • Protocol spoofing — is used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates.Note: In a computer security context, spoofing refers to various forms of… …   Wikipedia

  • Security Device Event Exchange — (SDEE) is a new standard proposed by ICSA that specifies the format of messages and protocol used to communicate events generated by security devices. This protocol is used in the Cisco IPS Sensor 5.0 to replace RDEP, which is used by earlier… …   Wikipedia

  • Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… …   Wikipedia

  • Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… …   Deutsch Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»