-
1 login context
Программирование: контекст регистрации (при получении доступа к сети), контекст начала сеанса (работы), контекст входа в систему -
2 login context
вчт контекст входа в систему, контекст начала сеанса ( работы), контекст регистрации ( при получении доступа к сети) -
3 login context
вчт. контекст входа в систему, контекст начала сеанса ( работы), контекст регистрации ( при получении доступа к сети)The New English-Russian Dictionary of Radio-electronics > login context
-
4 context
контекст (1. фрагмент речи или текста, оказывающий влияние на смысл выбранного слова или выражения 2. набор фактов и обстоятельств, относящихся к выбранному событию) || контекстный- dynamically expanding context
- extensional context
- intensional context
- login context -
5 context
контекст (1. фрагмент речи или текста, оказывающий влияние на смысл выбранного слова или выражения 2. набор фактов и обстоятельств, относящихся к выбранному событию) || контекстный- dynamically expanding context
- extensional context
- intensional context
- login contextThe New English-Russian Dictionary of Radio-electronics > context
-
6 name
имя; наименование, название- array name
- base name- by name- command name
- compound name
- condition name
- context name
- data name
- device group name
- device name
- division name
- entry name
- event name - generic name
- group name
- hardware name
- internal name
- label name
- language name
- login name
- mnemonic name
- multidatabase name
- net name
- nonmnemonic variable name
- procedure name
- program name
- proper name - role name
- simple name
- soft name
- specific name
- subscripted name
- switch status name
- symbolic name
- system name
- task name
- unique name
- unit name
- variable nameEnglish-Russian dictionary of computer science and programming > name
-
7 security
1) защита; защищённость, безопасностьсвойства ПО и аппаратного обеспечения, обеспечивающие предотвращение несанкционированного доступа (случайного или намеренного) к программам и даннымсм. тж. A1 security, access control, authorization, communication security, computer security, content security software, crimeware, cryptographic security, data security, emission security, information security, Internet security, login security, network security, physical security, proactive security, security administrator, security agent security architecture, security audit, security breach, security certification, security context, security erase, security evaluation, security hole, security kernel, security log, security management, security model, security patch, security perimeter, security policy, security protocol, security scanner, security service, security solution, security technology, security testing, security threat, security tools, security vulnerability, traffic-flow security, transmission security, Web securityсм. тж. security audit, security certification, security management, security policy, wireless security3) секретность, конфиденциальность, защищённость"Neither the first Ethernet local area network nor the first Internet computer networks were built with privacy or security in mind" (Т. Shimomura). — При разработке как первой локальной сети Ethernet, так и первых компьютерных сетей Интернета о проблемах защищённости персональных данных и безопасности практически не думали
Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > security
См. также в других словарях:
RADIUS — contextRemote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized access, authorization and accounting management for people or computers to connect and use a network service. When a person or device… … Wikipedia
Identity correlation — Definition In information systems, identity correlation is a process that reconciles and validates the proper ownership of disparate user account login IDs (user names) that reside on systems and applications throughout an organization and can… … Wikipedia
CCOW — In the context of Health informatics, CCOW or Clinical Context Object Workgroup is an HL7 standard protocol designed to enable disparate applications to synchronize in real time, and at the user interface level. It is vendor independent and… … Wikipedia
Keystroke logging — (often called keylogging) is a method of capturing and recording user keystrokes. The technique and name came from before the era of the graphical user interface; loggers nowadays would expect to capture mouse operations too. Keylogging can be… … Wikipedia
Universal Primary Education — The second United Nations Millennium Development Goal is to achieve Universal Primary Education, more specifically, to “ensure that by 2015, children everywhere, boys and girls alike will be able to complete a full course of primary schooling.… … Wikipedia
Dictator novel — The dictator Juan Facundo Quiroga The dictator novel (Spanish: novela del dictador) is a genre of Latin American literature that challenges the role of the dictator in Latin American society. The theme of caudillismo the régime of a chari … Wikipedia
Джин Сиберг — Jean Seberg Дата рождения: 13 ноября 1938 Место рождения: Маршаллтаун, США … Википедия
Tropic Thunder — Tropic Thunder … Wikipedia
Comparison of mail servers — This is a comparison of mail servers: mail transfer agents, mail delivery agents, and other computer software which provide e mail services. Contents 1 Feature comparison 2 Authentication 3 Antispam Features … Wikipedia
Paleoconservatism — Part of a series on Conservatism in the United States … Wikipedia
OS4000 — Company / developer GEC Computers Ltd. Programmed in Babbage[1] Working state No further development, but still supported Source model Closed source Initial release … Wikipedia