-
1 Access Control Entry Management View
A feature that allows the user to set access levels for a group of contacts.English-Arabic terms dictionary > Access Control Entry Management View
-
2 access control list
"In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals." -
3 set-top box
A device that converts a cable TV signal to an input signal to the TV set. Set-top boxes can be used to access the World Wide Web and are a type of information appliance. -
4 set-by-caller callback
"In Network Connections, a form of callback in which the user supplies the telephone number that the remote access server uses for callback. This setting spares the user any long-distance telephone charges." -
5 Outlook Web Access Web Part
"A piece of the user interface (UI) in Outlook Web Access that can be hosted in iframes as part of other Web applications such as SharePoint Portal Server portals. Outlook Web Access exposes a set of Outlook Web Access Web Part URLs that allow other applications to request certain portions of the Outlook Web Access UI. For example, another application can load the Outlook Web Access Web Part URL for the Inbox, Calendar, or Contact folder into an iframe hosted in that application."English-Arabic terms dictionary > Outlook Web Access Web Part
-
6 Client Access server role
"A set of components and services that enable users to access their Exchange mailboxes through the application Outlook Web Access and the protocols Exchange ActiveSync, Post Office Protocol version 3 (POP3), and Internet Message Access Protocol 4rev1 (IMAP4). The Client Access server role also includes Web services that are used by other Exchange 2007 server roles." -
7 Network Access Protection
"A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network." -
8 system access control list
An ACL that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators.English-Arabic terms dictionary > system access control list
-
9 field access profile
The set of field-level access permissions that have been granted to a user or users. -
10 Device Access API
"A set of COM interfaces that a device companion app can use to send requests, to a specialized device, synchronously or asynchronously." -
11 ACE Management View
A feature that allows the user to set access levels for a group of contacts. -
12 NAP
"A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network." -
13 IP allow list
"A list of IP addresses that are considered ""safe"" by an authority. IP addresses in this list are allowed access to a given resource or web service and are thereby excluded from further processing of access control policies that would otherwise be used to determine the validity of that clients request for access. For example, an IP allow list can be used to exclude a trusted set of clients from needing to use a second-factor of authentication to sign in to a web service, while other clients that are not in the list would have no other choice but to provide a second-factor method to be successfully authenticated." -
14 ACL
"In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals." -
15 account policy
"On local area networks and multiuser operating systems, a set of rules governing whether a new user is allowed access to the system and whether an existing user's rights are expanded to include additional system resources. An account policy also generally states the rules with which the user must comply while using the system in order to maintain access privileges." -
16 security role
A defined set of application access privileges. The security role assigned to a user determines which tasks the user can perform and which parts of the user interface the user can view. All users must be assigned at least one security role in order to access the system. -
17 Active Directory Service Interfaces
"A directory service model and a set of Component Object Model (COM) interfaces. ADSI enables Windows applications and Active Directory clients to access several network directory services, including Active Directory."English-Arabic terms dictionary > Active Directory Service Interfaces
-
18 ADSI
"A directory service model and a set of Component Object Model (COM) interfaces. ADSI enables Windows applications and Active Directory clients to access several network directory services, including Active Directory." -
19 Point-to-Point Protocol
"A set of industry-standard framing and authentication protocols that are included with Windows to ensure interoperability with other remote access software. PPP negotiates configuration parameters for multiple layers of the Open Systems Interconnection (OSI) model. The Internet standard for serial communications, PPP defines how data packets are exchanged with other Internet-based systems using a modem connection. PPP is documented in RFC 1661." -
20 PPP
"A set of industry-standard framing and authentication protocols that are included with Windows to ensure interoperability with other remote access software. PPP negotiates configuration parameters for multiple layers of the Open Systems Interconnection (OSI) model. The Internet standard for serial communications, PPP defines how data packets are exchanged with other Internet-based systems using a modem connection. PPP is documented in RFC 1661."
См. также в других словарях:
Access method — An access method is a function of a mainframe operating system that enables access to data on disk, tape or other external devices. They were introduced in 1963 in IBM OS/360 operating system. [http://researchweb.watson.ibm.com/journal/rd/255/ausl… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Access Control Matrix — or Access Matrix is an abstract, formal computer protection and security model used in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in… … Wikipedia
Access Point Name — or APN is the name of an access point for GPRS.An access point is: * An Internet network to which a mobile can be connected * A set of settings which are used for that connection * A particular option in a set of settings in a mobile phoneWhen a… … Wikipedia
Access structure — Access structures are used in the study of security system where multiple parties need to work together to obtain a resource. Groups of parties that are granted access are called qualified. In set theoretic terms they are referred to as qualified … Wikipedia
access — ac·cess / ak ˌses/ n often attrib 1: permission, liberty, or ability to enter, approach, communicate with, or pass to and from a place, thing, or person public access to federal land access to the courts 2: opportunity for sexual intercourse 3: a … Law dictionary
Access management — Access management, When used in traffic and traffic engineering circles, generally refers to the regulation of interchanges, intersections, driveways and median openings to a roadway. Its objectives are to enable access to land uses while… … Wikipedia
Access (Unternehmen) — Access Rechtsform Aktiengesellschaft Gründung April 1979 Sitz Tokio, Japan Leitung Toru Arakawa Mitarbeiter 1.256 (Januar 2 … Deutsch Wikipedia
Access (entreprise) — Access Co. Logo de Access Co. Création avril 1979 [1] Dates clés février 1984 : constitution … Wikipédia en Français
Set-through neck — (or Set thru neck) is a method of joining the neck and the body of guitar (or similar stringed instrument), effectively combining bolt on , set in and neck through methods. It involves:* A pocket in the instrument s body for insertion of neck, as … Wikipedia
Set-in neck — is a method of guitar (or similar stringed instrument) construction that involves joining guitar neck and body, pressing them tightly together using some sort of adhesive. It is a common belief that this yields a stronger body to neck connection… … Wikipedia