-
1 безопасность потока сообщений
Security: message-flow securityУниверсальный русско-английский словарь > безопасность потока сообщений
-
2 защита от анализа потока сообщений
Security: message-flow securityУниверсальный русско-английский словарь > защита от анализа потока сообщений
-
3 скорость передачи данных
2) Engineering: data rate, data-rate, data-transfer rate, data-transmission rate, transfer rate, transmission rate3) Music: byte rate4) Telecommunications: bit rate, bitrate, data-signaling rate, information transmission rate, signaling rate, transmission speed5) Electronics: data signaling rate6) Information technology: communication rate, data flow rate, data signalling rate, data-flow rate7) Astronautics: message data rate8) Network technologies: DR, DTR, data rate speed, data transmission rate9) Automation: band rate (в бодах), data transfer speed (напр. в ЗУ и из него), transmission date rate10) Security: baud rate, data (transmission) speed, data throughput, data throughput rate11) Electrical engineering: (сигнала) baud rateУниверсальный русско-английский словарь > скорость передачи данных
-
4 поток сообщений
1) Information technology: conversation thread, thread2) Household appliances: flow traffic3) Security: message traffic, traffic
См. также в других словарях:
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Message-oriented middleware — (MOM) is software or hardware infrastructure supporting sending and receiving messages between distributed systems. MOM allows application modules to be distributed over heterogeneous platforms and reduces the complexity of developing… … Wikipedia
Message precedence — is an indicator attached to a message indicating its level of urgency. Contents 1 CCEB military precedence 1.1 FLASH (Z) 1.2 IMMEDIATE (O) 1.3 PRIORITY (P) … Wikipedia
Communications security — Not to be confused with Commonwealth Securities. Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended… … Wikipedia
Transport Layer Security — (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications on the Internet for such things as web browsing, e mail, Internet faxing, instant messaging and other data transfers. There are… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Application security — encompasses measures taken throughout the life cycle to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, deployment, upgradation,or maintenance of the … Wikipedia
Social Security (United States) — This article is about the retirement/disability program. For the general concept of providing welfare, see Social security. For other uses, see Social Security (disambiguation) … Wikipedia
Multiple Independent Levels of Security — Multiple Independent Levels of Security/Safety (MILS) is a high assurance security architecture based on the concepts of separation[1] and controlled information flow; implemented by separation mechanisms that support both untrusted and… … Wikipedia
Voip security — VoIP SecurityDefined: Voice over IP (VoIP) Security is a branch of the information security field that is specifically applied to VoIP infrastructures. The objective of VoIP security is to preserve the availability of VoIP services, protection of … Wikipedia