-
41 включаемый голосом прибор
Security: activated by voice deviceУниверсальный русско-английский словарь > включаемый голосом прибор
-
42 управляемый голосом регулятор усиления
Security: voice operated gain adjustment deviceУниверсальный русско-английский словарь > управляемый голосом регулятор усиления
-
43 переговорное устройство
1) General subject: handie talkie2) Aviation: audio system, intercommunication equipment3) Medicine: intercom installation, talk-back loudspeaker4) Colloquial: handie-talkie (для связи на ходу)5) Military: intercommunications system (напр. танка), intercommunications telephone (в танке, самолете), interphone system (напр. танка)6) Engineering: intercommunication, intercommunication system, intercommunications, intercommunications, interphone, interphone system, talk-back equipment, voice intercommunication7) Telecommunications: chatterbox, conversational terminal, crew control equipment, electric intercom, intercom equipment, intercommunication set, intercommunicator, internal communication device, interphone equipment, selector, speaking device, verbal system, vocatron8) Electronics: intercom, talk-back circuit9) Medical appliances: intercom system (используется в рентгеновском кабинете для связи врача, находящегося в кабине оператора, с пациентом)10) Makarov: coded address intercommunication, intercommunications system11) Security: intercom station, intercommunicating (между жильцами)Универсальный русско-английский словарь > переговорное устройство
-
44 authentication
аутентификация, опознавание, проверка (подтверждение) подлинности1) в системе компьютерной безопасности - процесс, позволяющий установить, что пользователь или компьютер (сервер), пытающийся получить интерактивный доступ к определённой категории информации, компьютерной системе, вычислительной сети или электронной почте, действительно тот, за кого себя выдаёт. Выполняется с помощью дополнительных идентификаторов - биометрической информации, паролей, специальных карточек, цифровой подписи и др. В компьютерной системе пользователю обычно присваивается символическое имя или идентификационный код (SID), используемые в дальнейшем процедурами управления доступом (см. access control); аутентификация отличается от авторизации (authorization) тем, что не управляет предоставлением или непредоставлением права доступа к ресурсамсм. тж. authentication algorithm, authentication alias, authentication center, authentication data, authentication device, authentication level, authentication method, authentication password, authentication service, authentication token, authentication type, mutual authentication, PAP, password-based authentication, user authentication2) установление подлинности сообщения, источника (data origin authentication) и/или приёмника данныхАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > authentication
См. также в других словарях:
Voice stress analysis — (VSA) technology is said to record psychophysiological stress responses that are present in human voice, when a person suffers psychological stress in response to a stimulus (question) and where the consequences may be dire for the subject being… … Wikipedia
Voice over Internet Protocol — (VoIP, IPAEng|vɔɪp) is a protocol optimized for the transmission of voice through the Internet or other packet switched networks. VoIP is often used abstractly to refer to the actual transmission of voice (rather than the protocol implementing… … Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia
Voice over IP — Digital voice redirects here. For the commercial service, see Comcast Digital Voice. Voice over Internet Protocol (Voice over IP, VoIP) is a family of technologies, methodologies, communication protocols, and transmission techniques for the… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Communications security — Not to be confused with Commonwealth Securities. Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended… … Wikipedia
Voip security — VoIP SecurityDefined: Voice over IP (VoIP) Security is a branch of the information security field that is specifically applied to VoIP infrastructures. The objective of VoIP security is to preserve the availability of VoIP services, protection of … Wikipedia
A Voice in the Wilderness (Babylon 5) — Infobox Television episode Title = A Voice in the Wilderness Series = Babylon 5 Caption = Season = 1 Episode = 18 19 Airdate = 27 July 1994 (part 1) 3 August 1994 (part 2) Production = 120 121 Writer = J. Michael Straczynski Director = Janet… … Wikipedia
Concealment device — Concealment devices or diversion safes are used to hide things for the purpose of secrecy or security. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin. The idea is that… … Wikipedia
Digital security — gives individuals the freedom to embrace the digital lifestyle – to confidently engage in everyday interactions across all digital devices. Digital security affects all aspects of the digital lifestyle, which, among others, comprises computers… … Wikipedia
Social engineering (security) — Social engineering is the art of manipulating people into performing actions or divulging confidential information.Mitnick, K: CSEPS Course Workbook (2004), p. 4, Mitnick Security Publishing.] While similar to a confidence trick or simple fraud,… … Wikipedia