-
1 secure access
защищенный доступ
безопасный доступ
—
[Л.Г.Суменко. Англо-русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.]Тематики
Синонимы
EN
Англо-русский словарь нормативно-технической терминологии > secure access
-
2 secure access
1) Вычислительная техника: безопасный доступ, защищённый доступ2) Безопасность: доступ через систему безопасности, доступ, разрешаемый системой обеспечения безопасности -
3 secure access
доступ, разрешаемый системой обеспечения безопасности, доступ через систему безопасностиАнгло-русский словарь по компьютерной безопасности > secure access
-
4 secure access
безопасный доступ; защищённый доступEnglish-Russian dictionary of computer science and programming > secure access
-
5 secure access
защищенный доступ; безопасный доступ -
6 secure access management
управление защищенным доступом
—
[Л.Г.Суменко. Англо-русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > secure access management
-
7 secure access facility for enterprise
Сетевые технологии: средства доступа к защищённым данным в сети масштаба предприятияУниверсальный англо-русский словарь > secure access facility for enterprise
-
8 secure access management
Сетевые технологии: управление защищённым доступомУниверсальный англо-русский словарь > secure access management
-
9 secure access unit
-
10 Secure Access Facility for Enterprise
см. SAFEАнгло-русский словарь по компьютерной безопасности > Secure Access Facility for Enterprise
-
11 Secure Access Management
см. SAMАнгло-русский словарь по компьютерной безопасности > Secure Access Management
-
12 secure access management software
программное обеспечение управления,безопасностью доступаАнгло-русский словарь по компьютерной безопасности > secure access management software
-
13 secure access facilities for enterprise
English-Russian electronics dictionary > secure access facilities for enterprise
-
14 secure access facility for enterprise
= SAFEEnglish-Russian electronics dictionary > secure access facility for enterprise
-
15 secure access unit
= SAU -
16 secure access management
-
17 secure access facilities for enterprise
The New English-Russian Dictionary of Radio-electronics > secure access facilities for enterprise
-
18 secure access list
chroniona lista dostępuEnglish-Polish dictionary for engineers > secure access list
-
19 secure access list
chroniona lista dostępuEnglish-Polish dictionary of Electronics and Computer Science > secure access list
-
20 secure access management
The English-Kazakh dictionary of Informatics and computer technology dictionary > secure access management
См. также в других словарях:
Secure Access Module — A Secure Access Module is a hardware module used in electronic equipment for the purposes of cryptography, and is often used in ATMs. It contains a secret crypting algorithm … Wikipedia
Secure Access Module — Ein Secure Access Module (SAM) ist ein Mikrokontroller in Chipkarten oder IC Bauform, der kryptographische Funktionen wie Schlüsselaustauschalgorithmen, Signaturfunktionen und Verschlüsselung beinhaltet und zum sicheren Transport und zur Lagerung … Deutsch Wikipedia
Secure Shell — or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. RFC 4252] Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for TELNET… … Wikipedia
Secure communication — includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Secure messaging — is a server based approach to protect sensitive data when sent beyond the corporate borders and provides compliance with industry regulations such as HIPAA, GLBA and SOX. Advantages over classical secure e Mail are that confidential and… … Wikipedia
Secure multi-party computation — (also known as secure computation or multi party computation (MPC)) is a sub field of cryptography. The goal of methods for secure multi party computation is to enable parties to jointly compute a function over their inputs, while at the same… … Wikipedia
Secure by design — Secure by design, in software engineering, means that the software has been designed from the ground up to be secure. Malicious practices are taken for granted and care is taken to minimize impact when a security vulnerability is discovered. For… … Wikipedia
secure — [adj1] safe defended, guarded, immune, impregnable, out of harm’s way, protected, riskless, sheltered, shielded, unassailable, undamaged, unharmed; concept 587 Ant. endangered, insecure, unprotected, unsafe secure [adj2] fastened, stable adjusted … New thesaurus
Secure electronic transaction — (SET) is a standard protocol for securing credit card transactions over insecure networks, specifically, the Internet. SET is not itself a payment system, but rather a set of security protocols and formats that enables users to employ the… … Wikipedia
Secure Digital Music Initiative — (SDMI) was a forum formed in late 1998, composed of more than 200 IT, consumer electronics, security technology, ISP and recording industry companies, ostensibly with the purpose of developing technology specifications that protected the playing … Wikipedia