-
1 Virtual Base For Access
Security: VBAУниверсальный русско-английский словарь > Virtual Base For Access
-
2 безопасность доступа
-
3 ограниченность доступа
Русско-английский словарь по информационным технологиям > ограниченность доступа
-
4 время доступа
-
5 линия доступа
-
6 механизм доступа
Русско-английский большой базовый словарь > механизм доступа
-
7 механизм упраыления доступом
Русско-английский большой базовый словарь > механизм упраыления доступом
-
8 схемы доступа
-
9 функция доступа
-
10 контроль доступа
Русско-английский новый политехнический словарь > контроль доступа
-
11 отказ в доступе
Русско-английский новый политехнический словарь > отказ в доступе
-
12 безопасность доступа
Русско-английский военно-политический словарь > безопасность доступа
-
13 доступ
-
14 режим доступа
Русско-английский военно-политический словарь > режим доступа
-
15 вид доступа
Русско-английский словарь по информационным технологиям > вид доступа
-
16 время доступа
Русско-английский словарь по информационным технологиям > время доступа
-
17 контроль доступа
Русско-английский словарь по информационным технологиям > контроль доступа
-
18 матрица права доступа
Русско-английский словарь по информационным технологиям > матрица права доступа
-
19 метод доступа
Русско-английский словарь по информационным технологиям > метод доступа
-
20 механизм доступа
Русско-английский словарь по информационным технологиям > механизм доступа
См. также в других словарях:
Security clearance — For use by the United Nations, see Security Clearance (UN) A security clearance is a status granted to individuals allowing them access to classified information, i.e., state secrets, or to restricted areas after completion of a thorough… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… … Wikipedia
Access Control Matrix — or Access Matrix is an abstract, formal computer protection and security model used in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in… … Wikipedia
Security — is the condition of being protected against danger, loss, and criminals. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside.… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Access Linux Platform — The Access Linux Platform, sometime referred to as a next generation version of the Palm OS is an open source based operating system for mobile devices developed and marketed by Access Co., of Tokyo, Japan. The platform includes execution… … Wikipedia
Access control list — In computer security, an access control list (ACL) is a list of permissions attached to an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object. In a typical ACL,… … Wikipedia
security and protection system — Introduction any of various means or devices designed to guard persons and property against a broad range of hazards, including crime, fire, accidents, espionage, sabotage, subversion, and attack. Most security and protection systems… … Universalium
Security of Advanced Access Content System — The security of Advanced Access Content System has a subject of discussion amongst security researchers, high definition video enthusiasts, and consumers at large since its inception. A successor to Content Scramble System, the digital rights… … Wikipedia
Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… … Wikipedia