-
21 Internet Key Encryption Protocol
Security: IKEPУниверсальный русско-английский словарь > Internet Key Encryption Protocol
-
22 Internet Key Management Protocol
Security: IKMPУниверсальный русско-английский словарь > Internet Key Management Protocol
-
23 Modular Key Management Protocol
Security: MKMPУниверсальный русско-английский словарь > Modular Key Management Protocol
-
24 Proprietary Authentication Protocol
Security: PAPУниверсальный русско-английский словарь > Proprietary Authentication Protocol
-
25 Secure Copy Protocol
Security: SCPУниверсальный русско-английский словарь > Secure Copy Protocol
-
26 Standard Key Management Protocol
Security: SKMPУниверсальный русско-английский словарь > Standard Key Management Protocol
-
27 Triple Data Encryption Standard Encryption Protocol
Security: 3DESEPУниверсальный русско-английский словарь > Triple Data Encryption Standard Encryption Protocol
-
28 Two-Version Priority Ceiling Protocol
Security: 2VPCPУниверсальный русско-английский словарь > Two-Version Priority Ceiling Protocol
-
29 User Registration Protocol
Security: URPУниверсальный русско-английский словарь > User Registration Protocol
-
30 Weak Encryption Protocol
Security: WEPУниверсальный русско-английский словарь > Weak Encryption Protocol
-
31 Wireless Encryption Protocol
Security: WEPУниверсальный русско-английский словарь > Wireless Encryption Protocol
-
32 key distribution protocol
Security: KDPУниверсальный русско-английский словарь > key distribution protocol
-
33 IP Security
-
34 Shiva Password Authentication Protocol
Универсальный русско-английский словарь > Shiva Password Authentication Protocol
-
35 Transport Layer Security
Универсальный русско-английский словарь > Transport Layer Security
-
36 Wireless Transport Layer Security
Универсальный русско-английский словарь > Wireless Transport Layer Security
-
37 wireless transport layer security
Универсальный русско-английский словарь > wireless transport layer security
-
38 Commercial Internet Protocol Security Option
Abbreviation: CIPSOУниверсальный русско-английский словарь > Commercial Internet Protocol Security Option
-
39 Internet Protocol SECurity
Information technology: IPSEC (organization, Internet, IETF, DES)Универсальный русско-английский словарь > Internet Protocol SECurity
-
40 Internet Protocol Security
Information technology: IPSEC (organization, Internet, IETF, DES)Универсальный русско-английский словарь > Internet Protocol Security
См. также в других словарях:
Security protocol notation — Security (engineering) protocol notation is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network. In the context of a formal model, it allows reasoning about the properties of such a… … Wikipedia
Message Security Protocol — A protocol for securing e mail and document transmission … IT glossary of terms, acronyms and abbreviations
Security Content Automation Protocol — The Security Content Automation Protocol (SCAP) is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation (e.g., FISMA compliance). The National Vulnerability Database… … Wikipedia
Security Association — Eine Security Association (SA, dt. Sicherheitsverbindung) ist eine Vereinbarung zwischen zwei kommunizierenden Einheiten in Rechnernetzen. Sie beschreibt, wie die beiden Parteien Sicherheitsdienste anwenden werden, um sicher miteinander… … Deutsch Wikipedia
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Protocol Concerning the Redeployment in Hebron — Protocol Concerning the Redeployment in Hebron, also known as The Hebron Protocol or Hebron Agreement, began January 7 and was concluded from January 15 to January 17 1997 between Israel, represented by Prime Minister of Israel Benjamin Netanyahu … Wikipedia
protocol — pro‧to‧col [ˈprəʊtəkɒl ǁ ˈproʊtəkɒːl, kɑːl] noun 1. [countable] COMPUTING an established method for connecting computers so that they can exchange information: • You have to use a different protocol with this new modem. • HTTP is an Internet… … Financial and business terms
Protocol spoofing — is used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates.Note: In a computer security context, spoofing refers to various forms of… … Wikipedia
Security Device Event Exchange — (SDEE) is a new standard proposed by ICSA that specifies the format of messages and protocol used to communicate events generated by security devices. This protocol is used in the Cisco IPS Sensor 5.0 to replace RDEP, which is used by earlier… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… … Deutsch Wikipedia