-
1 Automatic Data Processing Security Officer
Security: ADPSOУниверсальный русско-английский словарь > Automatic Data Processing Security Officer
-
2 Automatic Data Processing Security Plan
Security: ADPSPУниверсальный русско-английский словарь > Automatic Data Processing Security Plan
-
3 security processing mode
режим определения секретности (описание допусков секретности для всех пользователей по отношению ко всей информации в системе с учётом её классификации секретности)Англо-русский словарь промышленной и научной лексики > security processing mode
-
4 Automatic Data Processing System Security Officer
Security: ADPSSOУниверсальный русско-английский словарь > Automatic Data Processing System Security Officer
-
5 collection and processing system
Security: CPSУниверсальный русско-английский словарь > collection and processing system
-
6 parallel video processing
Security: PVPУниверсальный русско-английский словарь > parallel video processing
-
7 Automated Data Processing Special Security Officer
Military: ADPSSOУниверсальный русско-английский словарь > Automated Data Processing Special Security Officer
-
8 Automated Data Processing System Security Program
Military: ADPSSPУниверсальный русско-английский словарь > Automated Data Processing System Security Program
-
9 Automated Data Processing Systems Security Manual
Military: ADPSSMУниверсальный русско-английский словарь > Automated Data Processing Systems Security Manual
-
10 безопасность обработки
Security: processing security (информации)Универсальный русско-английский словарь > безопасность обработки
-
11 безопасность обработки данных
Security: data processing securityУниверсальный русско-английский словарь > безопасность обработки данных
-
12 turvaus (ATK)
automatic data processing• security -
13 режим обеспечения безопасности
режим обеспечения безопасности
—
[ http://www.iks-media.ru/glossary/index.html?glossid=2400324]Тематики
- электросвязь, основные понятия
EN
Русско-английский словарь нормативно-технической терминологии > режим обеспечения безопасности
-
14 режим безопасной обработки
Security: security processing mode (данных; данных)Универсальный русско-английский словарь > режим безопасной обработки
-
15 режим обеспечения безопасности при обработке
Security: security processing mode (данных)Универсальный русско-английский словарь > режим обеспечения безопасности при обработке
-
16 адаптивная обработка сигналов
Security: adaptive signal processingУниверсальный русско-английский словарь > адаптивная обработка сигналов
-
17 алгоритм обработки сигналов
Security: signal processing algorithmУниверсальный русско-английский словарь > алгоритм обработки сигналов
-
18 анализ системного журнала
Security: log processingУниверсальный русско-английский словарь > анализ системного журнала
-
19 децентрализованная обработка
Security: decentralized processingУниверсальный русско-английский словарь > децентрализованная обработка
-
20 защита средств обработки данных
Security: data processing asset protectionУниверсальный русско-английский словарь > защита средств обработки данных
См. также в других словарях:
Security Advisory Opinion — (SAO) or Washington Special Clearance,cite web url=http://foia.state.gov/masterdocs/09FAM/09G0500.PDF title=Washington Special Clearances (Security Advisory Opinions), 9 FAM Appendix G, 500 work=U.S. Department of State Foreign Affairs Manual… … Wikipedia
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Security Architecture — Security provided by IT Systems can be defined as the IT system’s ability to being able to protect confidentiality and integrity of processed data, as well as to be able to provide availability of the system and data.“IT Architecture” may be… … Wikipedia
Security of Advanced Access Content System — The security of Advanced Access Content System has a subject of discussion amongst security researchers, high definition video enthusiasts, and consumers at large since its inception. A successor to Content Scramble System, the digital rights… … Wikipedia
Security clearance — For use by the United Nations, see Security Clearance (UN) A security clearance is a status granted to individuals allowing them access to classified information, i.e., state secrets, or to restricted areas after completion of a thorough… … Wikipedia
Security Now! — Infobox Podcast title = Security Now! caption = host = Leo Laporte Steve Gibson url = [http://www.twit.tv/SN http://www.twit.tv/SN] rss = [http://leoville.tv/podcasts/sn.xml MP3 Feed] status = Weekly audio format = MP3 began = August 19, 2005… … Wikipedia
Security Operations Center — A Security Operations Center (SOC) is a centralized unit in an organization that deals with security issues, on an organizational an technical level. SOCs used for facility security An SOC within a building or facility is a central location from… … Wikipedia
Security log — A security log is used to track security related information on a computer system. Examples include: * Windows Security Log * Internet Connection Firewall security logAccording to Stefan Axelsson, Most UNIX installations do not run any form of… … Wikipedia
Security Parameter Index — The Security Parameter Index (SPI) is an identification tag added to the header while using IPSec for tunneling the IP traffic. This tag helps the kernel discern between two traffic streams where different encryption rules and algorithms may be… … Wikipedia
List of Scientology Security Checks — In Scientology, the Security Check (or Sec Check) is a practice instituted by founder L. Ron Hubbard in 1960.[1] It involves an Ethics officer probing the thoughts, attitudes and behavior of an individual member by asking them large numbers of… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia