-
1 code access security
"A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform." -
2 security policy
The active policy established by the administrator that programmatically generates granted permissions for all managed code based on the code's requested permissions. Code that requires more permissions than policy will grant is not allowed to run. -
3 code signing
The process of adding a digital signature to additions and updates made to source code and applications published on the Internet. Code signing is intended to provide a level of security and trust to Internet software distribution. -
4 security file
A file that contains a digital code that makes it possible to seal messages or to add a digital signature to messages. This file can be stored on a 3.5-inch disk or on your computer's hard disk. -
5 security-critical
Pertaining to a type or member that accesses secure resources and can only be used by fully trusted code in the.NET Framework. -
6 security-safe-critical
Pertaining to a type or member that accesses secure resources and can be safely used by partially trusted code in the.NET Framework. -
7 managed code
"Code that is executed by the common language runtime environment rather than directly by the operating system. Managed code applications gain common language runtime services such as automatic garbage collection, runtime type checking and security support, and so on. These services help provide uniform platform- and language-independent behavior of managed-code applications."تعليمات برمجية مُدارة -
8 unmanaged code
"Code that is executed directly by the operating system, outside the.NET Framework common language runtime. Unmanaged code must provide its own memory management, type checking, and security support, unlike managed code, which receives these services from the common language runtime."تعليمات برمجية غير مُدارة -
9 unsafe code
"Code that is executed directly by the operating system, outside the.NET Framework common language runtime. Unmanaged code must provide its own memory management, type checking, and security support, unlike managed code, which receives these services from the common language runtime." -
10 imperative security check
"A security check that occurs when a security method is called within the code that is being protected. This type of check can be data-driven and can be isolated to a single location within an object or method. For example, if the name of a file to be protected is known only at run time, an imperative security check can be invoked by passing the file name as a parameter to a security method." -
11 declarative security check
"Declarative security information in metadata. Developers can use such declarations, which are usually written as custom attributes, to invoke several kinds of security functionality - require permissions to bind reference to the code, require permissions to derive a type, demand that callers have certain permissions, and so on."English-Arabic terms dictionary > declarative security check
-
12 enhanced security
"A security type that helps prevent unauthorized persons from discerning that a user is going to the Windows Live sign-in page. Otherwise, an unauthorized person might be able to intercept and manipulate the code on the sign-in page, which could result in user information being transmitted to an unauthorized website." -
13 Digitale Identiteit
"A standard security code issued by the Netherlands government to businesses and private citizens for interacting electronically with the government (for submitting tax returns or other documents electronically, requesting information, checking on status, etc.)." -
14 DigiD
"A standard security code issued by the Netherlands government to businesses and private citizens for interacting electronically with the government (for submitting tax returns or other documents electronically, requesting information, checking on status, etc.)." -
15 two-step verification
An optional Microsoft account sign-in method with which users can only sign in by entering both a password and a security code sent to them by the Microsoft account team. -
16 transparency
"A security model that helps developers write and deploy secure libraries and applications by isolating code depending on privilege. Level 1 transparency was introduced in the.NET Framework version 2.0. It enables developers to annotate code to declare which types and members can perform security elevations and other trusted actions (security-critical) and which cannot (security-transparent). Level 2 transparency, which was introduced in the.NET Framework 4, refines this model. It adds a third group of code, security-safe-critical code, which are types or members that access secure resources and can be safely used by partially-trusted code in the.NET Framework." -
17 common language runtime
"The engine at the core of managed code execution. The runtime supplies managed code with services such as cross-language integration, code access security, object lifetime management, and debugging and profiling support." -
18 CLR
"The engine at the core of managed code execution. The runtime supplies managed code with services such as cross-language integration, code access security, object lifetime management, and debugging and profiling support." -
19 runtime
"The engine at the core of managed code execution. The runtime supplies managed code with services such as cross-language integration, code access security, object lifetime management, and debugging and profiling support." -
20 interactive dialog box
"A dialog box that requires a response from the user. Intermediary devices such as a security host require such a dialog box as an added layer of security between the client and the remote access server. In such dialog boxes, the user types an access code or a user name and password on the remote access terminal screen."
- 1
- 2
См. также в других словарях:
Card security code — The Card security code is located on the back of MasterCard, Visa and Discover credit or debit cards and is typically a separate group of 3 digits to the right of the signature strip … Wikipedia
Card Security Code — The Card Security Code (CSC), sometimes called Card Verification Value (CVV), Card Verification Value Code (CVVC), Card Verification Code (CVC), or Verification Code (V Code or V Code) is a security feature for credit or debit card transactions,… … Wikipedia
International Ship and Port Facility Security Code — Absperrung eines Hafenbereichs gemäß ISPS Code Der International Ship and Port Facility Security Code (ISPS Code) besteht aus einem umfangreichen Paket von Maßnahmen zur Gefahrenabwehr bei Schiffen und Häfen. Damit dient der ISPS Code der… … Deutsch Wikipedia
File security code — An ISO term. A file update security code to indicate that the message originator is authorised to update the file. 2an … International financial encyclopaedia
International Ship and Port Facility Security Code — The International Ship and Port Facility Security (ISPS) Code is an amendment to the Safety of Life at Sea (SOLAS) Convention (1974/1988) on minimium security arrangements for ships, ports and government agencies. Having come into force in 2004,… … Wikipedia
Code Access Security — (CAS), in the Microsoft .NET framework, is Microsoft s solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the … Wikipedia
Code review — is systematic examination (often as peer review) of computer source code. It is intended to find and fix mistakes overlooked in the initial development phase, improving both the overall quality of software and the developers skills. Reviews are… … Wikipedia
Code Red (computer worm) — Code Red Type Server Jamming Worm The Code Red worm was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft s IIS web server. The Code Red worm was first discovered and researched by eEye Digital… … Wikipedia
Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… … Wikipedia
code — [kəʊd ǁ koʊd] noun 1. [countable] LAW a complete set of written rules or laws: • Each state in the US has a different criminal and civil code. ˈbuilding code [countable] LAW a set of rules that states what features a new building, bridge etc… … Financial and business terms
code — code1 [ koud ] noun *** ▸ 1 for secret messages ▸ 2 set of rules ▸ 3 set of letters/numbers ▸ 4 computer instructions ▸ 5 complicated system 1. ) count or uncount a system of words, numbers, or signs used for sending secret messages. To put a… … Usage of the words and phrases in modern English