-
1 Network Name resource
"In a Windows Server Failover Clustering (WSFC), a logical server name that is managed as a cluster resource. A network name resource must be used with an IP address resource." -
2 network name
A resource that Exchange 2007 Setup assigns to a clustered mailbox server. This resource represents the network name of the clustered mailbox server. -
3 resource
"Generally, any part of a computer system or network, such as a disk drive, printer, or memory, that can be allotted to a running program or a process." -
4 Resource Monitor
"A component of Windows Reliability and Performance Monitor that displays real-time CPU, memory, disk, and network performance information collected from the Windows Kernel Trace provider and performance counters." -
5 Print Spooler resource
Printer queues providing access to a network printer connected to the network by an IP address rather than by an individual name. Print spoolers are supported as cluster resources by a Resource DLL. -
6 shared resource
"Any information, file, folder, program, device, etc., that is available to multiple users on a network." -
7 namespace
"A naming convention that defines a set of unique names for resources in a network. For DNS, a hierarchical naming structure that identifies each network resource and its place in the hierarchy of the namespace. For WINS, a flat naming structure that identifies each network resource using a single, unique name. For DFS Namespaces, a virtual tree of folders that begins with \\ServerOrDomainName\RootName." -
8 virtual server
"In a server cluster, a collection of services that appear to clients as a physical Windows-based server but are not associated with a specific server. A virtual server is typically a resource group that contains all of the resources needed to run a particular application and that can be failed over like any other resource group. All virtual servers must include a Network Name resource and an IP Address resource." -
9 denial-of-service attack
"An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system." -
10 absolute URL
"The full Internet address of a page or other World Wide Web resource. The absolute URL includes a protocol, such as ""http,"" network location, and optional path and file name — for example, http://example.microsoft.com/.""مطلق ""URL""" -
11 denial of service attack
"An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system." -
12 DoS
"An attempt by a malicious (or unwitting) user, process, or system to prevent legitimate users from accessing a resource (usually a network service) by exploiting a weakness or design limitation in an information system." -
13 connected user
A user who has access to a computer or a resource across the network. -
14 NDS
"On networks running Novell NetWare 4.x and higher, a distributed database that maintains information about every resource on the network and that provides access to these resources." -
15 NetWare Directory Services
"On networks running Novell NetWare 4.x and higher, a distributed database that maintains information about every resource on the network and that provides access to these resources."English-Arabic terms dictionary > NetWare Directory Services
-
16 publish
"To make a form, view, device or other resource available over a network." -
17 Universal Naming Convention
"A convention for naming files and other resources beginning with two backslashes (), indicating that the resource exists on a network computer."English-Arabic terms dictionary > Universal Naming Convention
-
18 UNC
"A convention for naming files and other resources beginning with two backslashes (), indicating that the resource exists on a network computer." -
19 security breach
"An event that compromises the security of a computer, application, network or other resource." -
20 single-pane view
"A window in which only one view appears, such as the Task Sheet, Network Diagram view, Resource Graph view, or Calendar view."
- 1
- 2
См. также в других словарях:
Network Resource Management — is used in broadband networks to keep track of the way link resources are allocated to connections. The two primary resources that are tracked by network resource management are capacity (bandwidth) and connection identifiers (see Asynchronous… … Wikipedia
Network resource planning — Diagram describing the integration of business planning, marketing and engineering in Network Resource Planning, as well as its end results. Network Resource Planning is an enhanced process of network planning that incorporates the disciplines of … Wikipedia
Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… … Wikipedia
Network-Centric Service-Oriented Enterprise (NCSOE) — is a new generation enterprise capable of conducting collaboration and management of internal and external information. Using Network Centric Enterprise Services (NCES) , the enterprise can now enforce information and decision superiority in a… … Wikipedia
Network Access Protection — (NAP) is a Microsoft technology for controlling network access of a computer host based on the system health of the host, first introduced in Windows Server 2008. With Network Access Protection, system administrators of an organization s computer … Wikipedia
Network transparency — in its most general sense refers to the ability of a protocol to transmit data over the network in a manner which is transparent (invisible) to those using the applications that are using the protocol. The term is often applied in the context of… … Wikipedia
Resource oriented architecture — (or, ROA) is a specific set of guidelines of an implementation of the REST architecture.REST, or Representational State Transfer (see Roy Thomas Fielding s Doctoral Thesis Architectural Styles andthe Design of Network based Software Architectures … Wikipedia
Network neutrality in the United States — Network Neutrality Related issues and topics Automatic telephone exchange Data discrimination End to end principle Internet Protocol Tiered Internet Bandwidth Throttling … Wikipedia
Network architecture — is the design of a communications network. It is a framework for the specification of a network s physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in… … Wikipedia
Network governance — (also called “network organization”,[1] “networks forms of organization”,[2] “interfirm networks”, “organization networks”,[3]” flexible specialization”,[4] “network centric organisation” and “quasi firms” … Wikipedia
Network Automation, Inc. v. Advanced Systems Concepts, Inc. — Network Automation, Inc. v. Advanced Systems Concepts, Inc. Court United States Court of Appeals for the Ninth Circuit Full case name Network Automation, Inc. v. Advanced Systems Concepts, Inc … Wikipedia