-
141 RSP
1) Общая лексика: ССБ2) Компьютерная техника: Really Special People, Required Space3) Медицина: right sacrum posterior4) Американизм: Reality Signal Processor5) Военный термин: radar signal processor, range support plan, rapid site preparation, recognized surface picture, reconnaissance and security positions, regional strike plan, render safe procedure, replenishment spare parts, reserve stock point6) Техника: reactivity surveillance procedure, reentry system programmer, remote shutdown panel, rendezvous station panel, responder beacon, rotating shield plug7) Железнодорожный термин: Roscoe Snyder and Pacific Railway8) Грубое выражение: Retarded Stupid People9) Сокращение: Ringshell projector (Underwater sound projector), Radial Serial Protocol, ReSPonse, Remote Set Point10) Вычислительная техника: Reality Signal Processor (Nintendo)11) Нефть: separator producing gas/oil ratio12) Связь: Routing Switch Platform (Alcatel 7670 RSP)13) Фирменный знак: Retail Service Provider, Rover Special Products14) Сетевые технологии: Route- Switch Processor15) Программирование: Rounding To Single Precision16) Химическое оружие: render-safe procedures17) Порошковая металлургия: БОП (rapidly solidified powder - быстроотверждённый порошок)18) Расширение файла: Required Space Character, Response file19) Должность: Resource Specialist Program20) Аэропорты: Raspberry Strait, Alaska USA
См. также в других словарях:
Security protocol notation — Security (engineering) protocol notation is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network. In the context of a formal model, it allows reasoning about the properties of such a… … Wikipedia
Message Security Protocol — A protocol for securing e mail and document transmission … IT glossary of terms, acronyms and abbreviations
Security Content Automation Protocol — The Security Content Automation Protocol (SCAP) is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation (e.g., FISMA compliance). The National Vulnerability Database… … Wikipedia
Security Association — Eine Security Association (SA, dt. Sicherheitsverbindung) ist eine Vereinbarung zwischen zwei kommunizierenden Einheiten in Rechnernetzen. Sie beschreibt, wie die beiden Parteien Sicherheitsdienste anwenden werden, um sicher miteinander… … Deutsch Wikipedia
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Protocol Concerning the Redeployment in Hebron — Protocol Concerning the Redeployment in Hebron, also known as The Hebron Protocol or Hebron Agreement, began January 7 and was concluded from January 15 to January 17 1997 between Israel, represented by Prime Minister of Israel Benjamin Netanyahu … Wikipedia
protocol — pro‧to‧col [ˈprəʊtəkɒl ǁ ˈproʊtəkɒːl, kɑːl] noun 1. [countable] COMPUTING an established method for connecting computers so that they can exchange information: • You have to use a different protocol with this new modem. • HTTP is an Internet… … Financial and business terms
Protocol spoofing — is used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates.Note: In a computer security context, spoofing refers to various forms of… … Wikipedia
Security Device Event Exchange — (SDEE) is a new standard proposed by ICSA that specifies the format of messages and protocol used to communicate events generated by security devices. This protocol is used in the Cisco IPS Sensor 5.0 to replace RDEP, which is used by earlier… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… … Deutsch Wikipedia