-
1 unauthorized target
Военный термин: неплановая цель -
2 unauthorized target
-
3 target
объект; цель; мишень; задача; задание; норма; заданный показатель [срок]; конечный пункт; пункт назначения; заданное значение; норматив ( боевой подготовки) ; программировать траекторию ( ракеты) ; нацеливать; прицеливать; ставить задачу на удар [стрельбу] по цели; наводить; подготавливать огонь; приводить ( оружие) к нормальному бою, пристреливать; определять разнобой ( орудий) ; засекать ( цель) ;flare drop tow(ed) target — буксируемая мишень, отстреливающая ИК ловушки
pass the target (to) — передавать цель (напр. в другой сектор)
— aerial training target— hardened target— heat contrast target— interdiction-type target— pay off target— personnel-type target— prone silhouette target— scheduled nuclear target— shore-based target— towed target -
4 information
информация, сведенияАнгло-русский словарь по компьютерной безопасности > information
-
5 protection
прикрытие; охранение; обеспечение; защита; оборона; бронирование; защищенностьcounter-EMP protection (of electronic and electric power installations) — защита от ЭМИ ЯВ (электронных и электроэнергетических установок)
— armored protection— nuclear weapons protection -
6 use
1.1) пользоваться, применять2) потреблять, расходовать2.1) употребление, использование, применение2) польза, выгода•- make use
См. также в других словарях:
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia
Economic Affairs — ▪ 2006 Introduction In 2005 rising U.S. deficits, tight monetary policies, and higher oil prices triggered by hurricane damage in the Gulf of Mexico were moderating influences on the world economy and on U.S. stock markets, but some other… … Universalium
Computer crime — Computer crime, or cybercrime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target.[2] Netcrime refers to criminal exploitation of the Internet.[3]… … Wikipedia
Anti-frogman techniques — are security methods developed to protect watercraft, ports and installations, and other sensitive resources both in or nearby vulnerable waterways from potential threats or intrusions by frogmen or other divers.Risks and threats to be defended… … Wikipedia
Media and Publishing — ▪ 2007 Introduction The Frankfurt Book Fair enjoyed a record number of exhibitors, and the distribution of free newspapers surged. TV broadcasters experimented with ways of engaging their audience via the Internet; mobile TV grew; magazine… … Universalium
Nmap — Security Scanner results of an Nmap scan Original author(s) Gordon Lyon (Fyodor) Initial release September, 1997 … Wikipedia
china — /chuy neuh/, n. 1. a translucent ceramic material, biscuit fired at a high temperature, its glaze fired at a low temperature. 2. any porcelain ware. 3. plates, cups, saucers, etc., collectively. 4. figurines made of porcelain or ceramic material … Universalium
China — /chuy neuh/, n. 1. People s Republic of, a country in E Asia. 1,221,591,778; 3,691,502 sq. mi. (9,560,990 sq. km). Cap.: Beijing. 2. Republic of. Also called Nationalist China. a republic consisting mainly of the island of Taiwan off the SE coast … Universalium
Cybercrime and Countermeasures — Cyber crime, or computer crime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the … Wikipedia
USA PATRIOT Act, Title II — The USA PATRIOT Act was passed by the United States Congress in 2001 as a response to the September 11, 2001 attacks. It has ten titles, each containing numerous sections. Title II: Enhanced Surveillance Procedures granted increased powers of… … Wikipedia