-
21 отказ в доступе
Русско-английский словарь по информационным технологиям > отказ в доступе
-
22 право на доступ
Русско-английский словарь по информационным технологиям > право на доступ
-
23 прозрачный доступ
Русско-английский словарь по информационным технологиям > прозрачный доступ
-
24 пульт доступа
Авиация и космонавтика. Русско-английский словарь > пульт доступа
-
25 блокировка доступа
Русско-английский большой базовый словарь > блокировка доступа
-
26 блокировка контроля за доступом
Русско-английский большой базовый словарь > блокировка контроля за доступом
-
27 объявление прав доступа
Русско-английский большой базовый словарь > объявление прав доступа
-
28 быстрый доступ
-
29 доступ
м. access -
30 контроль за доступом
Русско-английский большой базовый словарь > контроль за доступом
-
31 коллективный доступ
1. shared access2. multiple accessРусско-английский большой базовый словарь > коллективный доступ
-
32 метод доступа
-
33 наборный доступ
1. dial-up access2. dial-in access -
34 библиотечный доступ
Русско-английский большой базовый словарь > библиотечный доступ
-
35 групповой доступ
Русско-английский большой базовый словарь > групповой доступ
-
36 дистационный доступ
Русско-английский большой базовый словарь > дистационный доступ
-
37 нелегальный доступ
Русско-английский большой базовый словарь > нелегальный доступ
-
38 ограниченный доступ
Русско-английский большой базовый словарь > ограниченный доступ
-
39 отказ в доступе
-
40 память с прямым доступом
Русско-английский большой базовый словарь > память с прямым доступом
См. также в других словарях:
Security clearance — For use by the United Nations, see Security Clearance (UN) A security clearance is a status granted to individuals allowing them access to classified information, i.e., state secrets, or to restricted areas after completion of a thorough… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… … Wikipedia
Access Control Matrix — or Access Matrix is an abstract, formal computer protection and security model used in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in… … Wikipedia
Security — is the condition of being protected against danger, loss, and criminals. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside.… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Access Linux Platform — The Access Linux Platform, sometime referred to as a next generation version of the Palm OS is an open source based operating system for mobile devices developed and marketed by Access Co., of Tokyo, Japan. The platform includes execution… … Wikipedia
Access control list — In computer security, an access control list (ACL) is a list of permissions attached to an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object. In a typical ACL,… … Wikipedia
security and protection system — Introduction any of various means or devices designed to guard persons and property against a broad range of hazards, including crime, fire, accidents, espionage, sabotage, subversion, and attack. Most security and protection systems… … Universalium
Security of Advanced Access Content System — The security of Advanced Access Content System has a subject of discussion amongst security researchers, high definition video enthusiasts, and consumers at large since its inception. A successor to Content Scramble System, the digital rights… … Wikipedia
Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… … Wikipedia