-
1 password-callback access
Универсальный англо-русский словарь > password-callback access
-
2 password-callback access
доступ по паролю с обратным установлением соединения (с обратным вызовом)Англо-русский словарь по компьютерной безопасности > password-callback access
-
3 access
1) доступ (в систему обработки информации или в сеть связи)2) доступ (на защищенную территорию); способ доступа -
4 system
- computationally secure system- abuse-free system- algebraic code system- analog system- asymmetric system- asymmetric key system- authentication/secrecy system- binary system- block system- broadcast system- broadcasting system- cipher-feedback system- classical system- common-key system- communication system- compromised system- computationally secure system- conference system- conventional system- DES-based system- DES-like system- deterministic system- DH system- Diffie and Hellman system- discrete-exponentiation system- discrete log system- E3 system- effectively unbreakable system- elliptic curve system- endomorphic system- end-to-end encryption system- error propagating system- factorization system- finite system- finite automation system- Galois field system- general system- generalized system- Goppa-code system- hardware-implemented system- hidden key system- high-grade system- high-speed system- hybrid public-secret key system- hybrid stream/block system- identity-based system- system immune to cryptoanalysis- indecipherable system- intractable system- iterated system- key escrow system- keyed system- key escrow system- key-minimal system- knapsack-based system- knapsack public key system- matrix system- McEliece' system- Merkle-Hellman system- MH system- microprocessor based system- minuend system- multiple access system- multiple destination system- multiplicative knapsack system- network system- non-linear system- number theoretic system- one-key system- one-master-key system- one-time-key system- one-time-pad system- one-time-tape system- perfect secrecy system- practical security system- private key system- proprietary system- public key system- public key distribution system- public key signature system- rapid system- reciprocal number system- residue system- Rivest-Shamir-Adleman system- rotor system- RSA public key system- r-th residue system- secret-key system- secure system- shared key system- shift register system- single-key system- sophisticated system- split key system- strong system- subtractive system- symmetric system- theoretically unbreakable system- threshold system- transposition system- trap-door-knapsack public key system- transient key system- threshold system- two-key system- unbreakable system- voice system -
5 technique
Англо-русский словарь по компьютерной безопасности > technique
-
6 device
прибор; аппарат; устройство; (техническое) средство- wireless bugging device -
7 method
метод; способ -
8 protection
защита; средства защитыАнгло-русский словарь по компьютерной безопасности > protection
См. также в других словарях:
Security token — Several types of security tokens with a penny for scale … Wikipedia
Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… … Wikipedia
Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… … Wikipedia
List of file systems — The following lists identify, characterize and link to more thorough information on computer file systems.Many older operating systems support only their one native file system, which does not bear any name apart from the name of the operating… … Wikipedia
Health Insurance Portability and Accountability Act — The Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in 1996. According to the Centers for Medicare and Medicaid Services (CMS) website, Title I of HIPAA protects health insurance coverage for workers… … Wikipedia
Db4o — Entwickler Versant Corporation Aktuelle Version 8.0 (1. Februar 2011) Betriebssystem … Deutsch Wikipedia
rundll32.exe — ist ein Win32 Dienstprogramm von Microsoft Windows ab Version Windows 95 und wird verwendet, um Win32 Funktionen aus Programmbibliotheken als eigenständige Routinen auszuführen. Dabei können nur Funktionen ausgeführt werden, die in der… … Deutsch Wikipedia
Interactive voice response — IVR redirects here. For other uses, see IVR (disambiguation). Interactive voice response (IVR) is a technology that allows a computer to interact with humans through the use of voice and DTMF keypad inputs. In telecommunications, IVR allows… … Wikipedia
Serialization — This article is about data structure encoding. For other uses, see Serialization (disambiguation). In computer science, in the context of data storage and transmission, serialization is the process of converting a data structure or object state… … Wikipedia
PowerBuilder — Infobox Software name = PowerBuilder caption = developer = Sybase released = July, 1991 frequently updated = yes programming language = Powerscript operating system = Microsoft Windows language = English, Japanese (Several languages supported for … Wikipedia
Comparison of VoIP software — VoIP software is used to conduct telephone like voice conversations across Internet Protocol (IP) based networks. VoIP stands for Voice over IP . For residential markets, VoIP phone service is often cheaper than traditional public switched… … Wikipedia