-
1 Secure Access Control System
Abbreviation: SACSУниверсальный русско-английский словарь > Secure Access Control System
-
2 Secure Access Management
Network technologies: SAMУниверсальный русско-английский словарь > Secure Access Management
-
3 Secure Access Unit
Information technology: SAUУниверсальный русско-английский словарь > Secure Access Unit
-
4 secure access facility for enterprise
Network technologies: SAFEУниверсальный русско-английский словарь > secure access facility for enterprise
-
5 Secure Network Access Platform
Security: SNAPУниверсальный русско-английский словарь > Secure Network Access Platform
-
6 Secure Overlay Access Point
Security: SOAPУниверсальный русско-английский словарь > Secure Overlay Access Point
-
7 secure voice access console
Military: SEVACУниверсальный русско-английский словарь > secure voice access console
-
8 secure voice access system
Military: SEVASУниверсальный русско-английский словарь > secure voice access system
-
9 secure wire access terminal
Military: SWATУниверсальный русско-английский словарь > secure wire access terminal
-
10 Command server/client system that allows secure SCI connectivity to all commands on the network, and access to available files without additional log-on.
Military: IntelinkУниверсальный русско-английский словарь > Command server/client system that allows secure SCI connectivity to all commands on the network, and access to available files without additional log-on.
-
11 random access secure communications anti-jam link
Military: RASCALУниверсальный русско-английский словарь > random access secure communications anti-jam link
-
12 random-access secure communications anti-jam link
Engineering: RASCALУниверсальный русско-английский словарь > random-access secure communications anti-jam link
-
13 безопасный доступ
Русско-английский словарь по вычислительной технике и программированию > безопасный доступ
-
14 защищенный доступ
Русско-английский словарь по вычислительной технике и программированию > защищенный доступ
-
15 защищенный доступ
защищенный доступ
безопасный доступ
—
[Л.Г.Суменко. Англо-русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.]Тематики
Синонимы
EN
Русско-английский словарь нормативно-технической терминологии > защищенный доступ
-
16 управление защищенным доступом
управление защищенным доступом
—
[Л.Г.Суменко. Англо-русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > управление защищенным доступом
-
17 параметры управления защитой доступа
параметры управления защитой доступа
—
[Л.Г.Суменко. Англо-русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > параметры управления защитой доступа
-
18 защищённый доступ
1) Engineering: seeded access2) Information technology: secure access3) Security: protected access -
19 безопасный доступ
-
20 доступ через систему безопасности
Security: secure access, security accessУниверсальный русско-английский словарь > доступ через систему безопасности
- 1
- 2
См. также в других словарях:
Secure Access Module — A Secure Access Module is a hardware module used in electronic equipment for the purposes of cryptography, and is often used in ATMs. It contains a secret crypting algorithm … Wikipedia
Secure Access Module — Ein Secure Access Module (SAM) ist ein Mikrokontroller in Chipkarten oder IC Bauform, der kryptographische Funktionen wie Schlüsselaustauschalgorithmen, Signaturfunktionen und Verschlüsselung beinhaltet und zum sicheren Transport und zur Lagerung … Deutsch Wikipedia
Secure Shell — or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. RFC 4252] Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for TELNET… … Wikipedia
Secure communication — includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Secure messaging — is a server based approach to protect sensitive data when sent beyond the corporate borders and provides compliance with industry regulations such as HIPAA, GLBA and SOX. Advantages over classical secure e Mail are that confidential and… … Wikipedia
Secure multi-party computation — (also known as secure computation or multi party computation (MPC)) is a sub field of cryptography. The goal of methods for secure multi party computation is to enable parties to jointly compute a function over their inputs, while at the same… … Wikipedia
Secure by design — Secure by design, in software engineering, means that the software has been designed from the ground up to be secure. Malicious practices are taken for granted and care is taken to minimize impact when a security vulnerability is discovered. For… … Wikipedia
secure — [adj1] safe defended, guarded, immune, impregnable, out of harm’s way, protected, riskless, sheltered, shielded, unassailable, undamaged, unharmed; concept 587 Ant. endangered, insecure, unprotected, unsafe secure [adj2] fastened, stable adjusted … New thesaurus
Secure electronic transaction — (SET) is a standard protocol for securing credit card transactions over insecure networks, specifically, the Internet. SET is not itself a payment system, but rather a set of security protocols and formats that enables users to employ the… … Wikipedia
Secure Digital Music Initiative — (SDMI) was a forum formed in late 1998, composed of more than 200 IT, consumer electronics, security technology, ISP and recording industry companies, ostensibly with the purpose of developing technology specifications that protected the playing … Wikipedia