Перевод: со всех языков на все языки

со всех языков на все языки

unauthorized modification of message

См. также в других словарях:

  • несанкционированное изменение сообщения — Изменение данных сообщения при его обработке, хранении или передаче, приводящее к невозможности достоверного выделения информации, содержащейся в данном сообщении. [ОСТ 45.127 99] Тематики защита информации Обобщающие термины угроза… …   Справочник технического переводчика

  • Kazaa — infobox software name = Kazaa Media Desktop developer = Sharman Networks latest release version = 3.2.5 latest release date = 2006 operating system = Microsoft Windows genre = Peer to peer license = Adware/spyware supported website =… …   Wikipedia

  • Near Field Communication — or NFC, is a short range high frequency wireless communication technology which enables the exchange of data between devices over about a 10 centimetre (around 4 inches) distance.Fact|date=July 2008 The technology is a simple extension of the ISO …   Wikipedia

  • несанкционированное изменение маршрута сообщения — Изменение маршрутной информации, содержащейся в передаваемом сообщении или в системе коммутации сети связи с нарушением установленных прав и правил разграничения доступа, приводящее к передаче сообщения или части сообщения по измененному адресу.… …   Справочник технического переводчика

  • Copy protection — Copy protection, also known as content protection, copy obstruction, copy prevention and copy restriction, refer to techniques used for preventing the reproduction of software, films, music, and other media, usually for copyright reasons.[1]… …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Legality of piggybacking — Laws regarding unauthorized access of a computer network exist in many locales, including the U.S. federal government, all 50 U.S. states, and other countries, though the wording and meaning differ from one to the next. However, the… …   Wikipedia

  • Conditional access — (abbreviated CA) is the protection of content by requiring certain criteria to be met before granting access to this content. The term is commonly used in relation to digital television systems, most notably satellite television. Contents 1… …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»