-
1 network user identity
вчт идентификатор пользователя сетиEnglish-Russian electronics dictionary > network user identity
-
2 network user identity
вчт. идентификатор пользователя сетиThe New English-Russian Dictionary of Radio-electronics > network user identity
-
3 identity
1) идентичность; тождественность2) тождество3) единичный элемент, единица (напр. множества); элемент тождественности4) обладание специфическими опознавательными признаками; идентифицируемость || опознавательный; идентификационный5) идентификационный номер; идентификатор•- algebraic identity
- instance identity - multiplicative identity
- network user identity
- node identity
- object identity - right identity
- scalar identity
- structural identity - vector identity -
4 identity
1) идентичность; тождественность2) тождество3) единичный элемент, единица (напр. множества); элемент тождественности4) обладание специфическими опознавательными признаками; идентифицируемость || опознавательный; идентификационный5) идентификационный номер; идентификатор•- additive identity
- algebraic identity
- instance identity
- international mobile equipment identity
- international mobile station equipment identity
- international mobile subscriber identity
- international portable equipment identity
- international portable user identity
- left identity
- multiplicative identity
- network user identity
- node identity
- object identity
- radio fixed part identity
- resolvent identity
- right identity
- scalar identity
- structural identity
- temporary mobile subscriber identity
- universal identity
- vector identityThe New English-Russian Dictionary of Radio-electronics > identity
-
5 ID
1) (identifier) идентификатор, персональная идентифицирующая информация; устройство или прибор идентификации, идентификатор- data ID- key ID- login ID- logon ID- token ID- user ID- voice ID- wrong ID2) (identity) идентифицировать; опознавать; отождествлять3) (identification) идентификация; опозна (ва)ние, распознавание; отождествление -
6 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
7 protocol
Англо-русский словарь по компьютерной безопасности > protocol
-
8 database
- archive database
- centralized database
- closed database
- computerized database
- cooperative database
- design database
- distributed database
- e-mail address database
- enterprise database
- extensional database
- factual database
- federated database
- fielded database
- flat-file database
- full-text database
- generalized database
- geometric database
- goal database
- graphic database
- graph-oriented database
- hierarchical database
- identity-based database
- image database
- integrated database
- intelligent database
- inverted database
- inverted list database
- knowledge database
- loaded database
- local database
- logical database
- meta-database - normalized database
- object-oriented database
- on-line database
- parallel database
- pattern database
- personal database
- physical database
- pictorial database
- populated database
- private database
- problem-oriented database
- pseudo-relational database
- public domain database
- quasi-relational database
- record-oriented database
- relational database
- security database
- semantic database
- shareable database
- structured database
- tree-structured database
- unified database
- user database -
9 database
- archive database
- centralized database
- closed database
- computerized database
- cooperative database
- design database
- distributed database
- e-mail address database
- enterprise database
- extensional database
- factual database
- federated database
- fielded database
- flat-file database
- full-text database
- generalized database
- geometric database
- goal database
- graphic database
- graph-oriented database
- hierarchical database
- identity-based database
- image database
- integrated database
- intelligent database
- inverted database
- inverted list database
- knowledge database
- loaded database
- local database
- logical database
- meta-database
- multidimensional database
- network database
- normalized database
- object-oriented database
- on-line database
- parallel database
- pattern database
- personal database
- physical database
- pictorial database
- populated database
- private database
- problem-oriented database
- pseudo-relational database
- public domain database
- quasi-relational database
- record-oriented database
- relational database
- security database
- semantic database
- shareable database
- structured database
- tree-structured database
- unified database
- user database
- very large database
- virtual databaseThe New English-Russian Dictionary of Radio-electronics > database
См. также в других словарях:
Network User Identity — Network User Identity, NUI … Universal-Lexikon
Removable User Identity Module — (R UIM) is a card developed for CDMA handsets that extends the GSM SIM card to CDMA phones and networks. To work in CDMA networks, the R UIM contains an early version of the CSIM application. The card also contains SIM (GSM) application, so it… … Wikipedia
Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… … Wikipedia
Network Time Protocol — The Network Time Protocol (NTP) is a protocol and software implementation for synchronizing the clocks of computer systems over packet switched, variable latency data networks. Originally designed by David L. Mills of the University of Delaware… … Wikipedia
Network Access Identifier — In computer networking, the Network Access Identifier (NAI) is a standard way of identifying users who request access to a network. The standard syntax is user@realm . Sample NAIs include (from RFC 4282): bob joe@example.com fred@foo… … Wikipedia
Network Service Access Point Identifier — For other uses, see NSAPI. A Network (Layer) Service Access Point Identifier (NSAPI), is an identifier used in GPRS (cellular data) networks. It is used to identify a Packet Data Protocol (PDP) context (a unique data session) in the Mobile… … Wikipedia
Identity driven networking — (IDN) is the process of applying network controls to a network device access based on the identity of an individual or group of individuals responsible to or operating the device. Individuals are identified, and the network is tuned to respond to … Wikipedia
Identity and Access Management — (IAM) is a concept that combines business processes, policies and technologies that enable companies to: * provide secure access to any resource. * efficiently control this access. * respond faster to changing relationships. * protect… … Wikipedia
Network switching subsystem — (NSS) (or GSM core network) is the component of a GSM system that carries out call switching and mobility management functions for mobile phones roaming on the network of base stations. It is owned and deployed by mobile phone operators and… … Wikipedia
Identity theft — is a form of stealing another person s identity in which someone pretends to be someone else by assuming that person s identity, typically in order to access resources or obtain credit and other benefits in that person s name. The victim of… … Wikipedia
Identity 2.0 — Identity 2.0, also called digital identity, is the anticipated revolution of identity verification on the internet using emerging user centric technologies such as Information Cards or OpenID. Identity 2.0 stems from the Web 2.0 theory of the… … Wikipedia