-
121 сетевой многоуровневый протокол
Security: layered networking protocolУниверсальный русско-английский словарь > сетевой многоуровневый протокол
-
122 протокол согласования общего ключа
Security: (криптографического) key-sharing protocolУниверсальный русско-английский словарь > протокол согласования общего ключа
-
123 протокольная служба
Русско-английский большой базовый словарь > протокольная служба
-
124 протокол передачи данных
1) Computers: transport2) Mathematics: SDLC, link protocol3) Telecommunications: kermit4) Information technology: data protocol5) Network technologies: data transfer protocol (AD)6) Automation: communications protocol7) Security: communication protocolУниверсальный русско-английский словарь > протокол передачи данных
-
125 протокол распределения ключей
1) Security: key-distribution protocol2) Cryptography: key agreement protocol, key exchange protocol, key generation protocol, key sharing protocolУниверсальный русско-английский словарь > протокол распределения ключей
-
126 протокол обмена сообщениями
1) Information technology: interfacing protocol, messaging protocol2) Network technologies: protocol for messaging3) Security: message-exchange protocolУниверсальный русско-английский словарь > протокол обмена сообщениями
-
127 безопасность протоколов в Интернете
безопасность протоколов в Интернете
—
[Л.Г.Суменко. Англо-русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > безопасность протоколов в Интернете
-
128 защита интернет-протокола
защита интернет-протокола
(МСЭ-Т Х.1141, МСЭ-Т Н.235.0, МСЭ-T H.235.6, МСЭ-Т Н.235).
[ http://www.iks-media.ru/glossary/index.html?glossid=2400324]Тематики
- электросвязь, основные понятия
EN
Русско-английский словарь нормативно-технической терминологии > защита интернет-протокола
См. также в других словарях:
Security protocol notation — Security (engineering) protocol notation is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network. In the context of a formal model, it allows reasoning about the properties of such a… … Wikipedia
Message Security Protocol — A protocol for securing e mail and document transmission … IT glossary of terms, acronyms and abbreviations
Security Content Automation Protocol — The Security Content Automation Protocol (SCAP) is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation (e.g., FISMA compliance). The National Vulnerability Database… … Wikipedia
Security Association — Eine Security Association (SA, dt. Sicherheitsverbindung) ist eine Vereinbarung zwischen zwei kommunizierenden Einheiten in Rechnernetzen. Sie beschreibt, wie die beiden Parteien Sicherheitsdienste anwenden werden, um sicher miteinander… … Deutsch Wikipedia
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Protocol Concerning the Redeployment in Hebron — Protocol Concerning the Redeployment in Hebron, also known as The Hebron Protocol or Hebron Agreement, began January 7 and was concluded from January 15 to January 17 1997 between Israel, represented by Prime Minister of Israel Benjamin Netanyahu … Wikipedia
protocol — pro‧to‧col [ˈprəʊtəkɒl ǁ ˈproʊtəkɒːl, kɑːl] noun 1. [countable] COMPUTING an established method for connecting computers so that they can exchange information: • You have to use a different protocol with this new modem. • HTTP is an Internet… … Financial and business terms
Protocol spoofing — is used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates.Note: In a computer security context, spoofing refers to various forms of… … Wikipedia
Security Device Event Exchange — (SDEE) is a new standard proposed by ICSA that specifies the format of messages and protocol used to communicate events generated by security devices. This protocol is used in the Cisco IPS Sensor 5.0 to replace RDEP, which is used by earlier… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… … Deutsch Wikipedia