Перевод: с английского на русский

с русского на английский

network user identity

См. также в других словарях:

  • Network User Identity — Network User Identity,   NUI …   Universal-Lexikon

  • Removable User Identity Module — (R UIM) is a card developed for CDMA handsets that extends the GSM SIM card to CDMA phones and networks. To work in CDMA networks, the R UIM contains an early version of the CSIM application. The card also contains SIM (GSM) application, so it… …   Wikipedia

  • Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… …   Wikipedia

  • Network Time Protocol — The Network Time Protocol (NTP) is a protocol and software implementation for synchronizing the clocks of computer systems over packet switched, variable latency data networks. Originally designed by David L. Mills of the University of Delaware… …   Wikipedia

  • Network Access Identifier — In computer networking, the Network Access Identifier (NAI) is a standard way of identifying users who request access to a network. The standard syntax is user@realm . Sample NAIs include (from RFC 4282): bob joe@example.com fred@foo… …   Wikipedia

  • Network Service Access Point Identifier — For other uses, see NSAPI. A Network (Layer) Service Access Point Identifier (NSAPI), is an identifier used in GPRS (cellular data) networks. It is used to identify a Packet Data Protocol (PDP) context (a unique data session) in the Mobile… …   Wikipedia

  • Identity driven networking — (IDN) is the process of applying network controls to a network device access based on the identity of an individual or group of individuals responsible to or operating the device. Individuals are identified, and the network is tuned to respond to …   Wikipedia

  • Identity and Access Management — (IAM) is a concept that combines business processes, policies and technologies that enable companies to: * provide secure access to any resource. * efficiently control this access. * respond faster to changing relationships. * protect… …   Wikipedia

  • Network switching subsystem — (NSS) (or GSM core network) is the component of a GSM system that carries out call switching and mobility management functions for mobile phones roaming on the network of base stations. It is owned and deployed by mobile phone operators and… …   Wikipedia

  • Identity theft — is a form of stealing another person s identity in which someone pretends to be someone else by assuming that person s identity, typically in order to access resources or obtain credit and other benefits in that person s name. The victim of… …   Wikipedia

  • Identity 2.0 — Identity 2.0, also called digital identity, is the anticipated revolution of identity verification on the internet using emerging user centric technologies such as Information Cards or OpenID. Identity 2.0 stems from the Web 2.0 theory of the… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»