-
1 request throttling
A method of preventing a denial of service attack by limiting the number of requests that can be made to a system. -
2 UDP resend
An error correction method that allows the client to request that the server retransmit lost data packets. -
3 IP allow list
"A list of IP addresses that are considered ""safe"" by an authority. IP addresses in this list are allowed access to a given resource or web service and are thereby excluded from further processing of access control policies that would otherwise be used to determine the validity of that clients request for access. For example, an IP allow list can be used to exclude a trusted set of clients from needing to use a second-factor of authentication to sign in to a web service, while other clients that are not in the list would have no other choice but to provide a second-factor method to be successfully authenticated."
См. также в других словарях:
Method (computer science) — In object oriented programming, the term method refers to a subroutine that is exclusively associated either with a class (called class methods, static methods, or factory methods) or with an object (called instance methods). Like a procedure in… … Wikipedia
Request line — A request line or contest line is a telephone line which allows listeners to a radio station (or sometimes a TV station) to call the radio studio or TV studio directly. In radio, this is usually to request a song, win a contest, be a part of a… … Wikipedia
Request for Comment — Abbreviated RFC. A document or a set of documents in which proposed Internet standards are described or defined. Well over a thousand RFCs are in existence, and they represent a major method of online publication for Internet technical… … Dictionary of networking
Common Object Request Broker Architecture — The Common Object Request Broker Architecture (CORBA) is a standard defined by the Object Management Group (OMG) that enables software components written in multiple computer languages and running on multiple computers to work together (i.e., it… … Wikipedia
Caesarean delivery on maternal request — (CDMR) is a medically unnecessary caesarean section, where the conduct of a childbirth via a caesarean section (CS, or c section) is requested by the pregnant patient.[1] While it is a form of an elective caesarean section, the absence of a… … Wikipedia
Cross-site request forgery — Cross site request forgery, also known as a one click attack or session riding and abbreviated as CSRF (pronounced sea surf[1]) or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that… … Wikipedia
Finite element method — The finite element method (FEM) (sometimes referred to as finite element analysis) is a numerical technique for finding approximate solutions of partial differential equations (PDE) as well as of integral equations. The solution approach is based … Wikipedia
Asynchronous method dispatch — (AMD) is a data communication method used when there is a need for the server side to handle a large number of long lasting client requests. Using synchronous method dispatch (SMD), this scenario may turn the server into an unvavailable busy… … Wikipedia
HTTP-Request — HTTP (Hypertext Transfer Protocol) Familie: Internetprotokollfamilie Einsatzgebiet: Datenübertragung, Hypertext u. a. Port: 80/TCP HTTP im TCP/IP‑Protokollstapel: Anwendung HTTP Transport … Deutsch Wikipedia
No Guru, No Method, No Teacher — Studio album by Van Morrison Released July, 1986 Reissued June 2008 Recorded … Wikipedia
Virtual storage access method — (VSAM) is an IBM disk file storage access method, first used in the OS/VS2 operating system, later used throughout the Multiple Virtual Storage (MVS) architecture and now in z/OS. Originally a record oriented filesystem, VSAM comprises four data… … Wikipedia