file shadowing

file shadowing
Безопасность: скрытое копирование файлов

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Поможем сделать НИР

Смотреть что такое "file shadowing" в других словарях:

  • File shadowing — There are several different technologies that use the term file shadowing , but the intent of file shadowing within these technologies is to provide an exact copy (or mirror of a set of data). For file shadowing to be effective, the shadow needs… …   Wikipedia

  • Shadowing — may refer to:* File shadowing, to provide an exact copy of or to mirror a set of data * Job shadowing, learning tasks by first hand observation of daily behavior * Projective shadowing, a process by which shadows are added to 3D computer… …   Wikipedia

  • Disk mirroring — In data storage, disk mirroring or RAID1 is the replication of logical disk volumes onto separate physical hard disks in real time to ensure continuous availability. A mirrored volume is a complete logical representation of separate volume copies …   Wikipedia

  • Common Lisp — Paradigm(s) Multi paradigm: procedural, functional, object oriented, meta, reflective, generic Appeared in 1984, 1994 for ANSI Common Lisp Developer ANSI X3J13 committee Typing discipline …   Wikipedia

  • Shadow password — In computing, Unix like operating systems use the shadow password database mechanism to increase the security level of passwords by preventing ordinary users from accessing encrypted password data.Unshadowed passwords On a system without shadowed …   Wikipedia

  • Quake engine — Infobox Software name = Quake engine caption = collapsible = author = developer = id Software released = latest release version = latest release date = latest preview version = latest preview date = frequently updated = programming language = C… …   Wikipedia

  • id Tech 4 — in Doom 3, the engine s parent game. Developer(s) id Software Written in C++ …   Wikipedia

  • Random-access memory — RAM redirects here. For other uses of the word, see Ram (disambiguation). Example of writable volatile random access memory: Synchronous Dynamic RAM modules, primarily used as main memory in personal computers, workstations, and servers …   Wikipedia

  • List of Xbox games compatible with Xbox 360 — This is a list of Xbox games that are compatible with the Xbox 360. Additionally, the manner in which compatibility is achieved and the software errors associated with it are discussed in brief. This list is final as Microsoft confirmed in… …   Wikipedia

  • Unix security — Unix security: maintaining a secure environment on Unix and Unix like operating systems is dependent on design concepts of these operating systems, but vigilance through user and administrative techniques is important to maintain security… …   Wikipedia

  • Microsoft Word — Microsoft Office Word Microsoft Office Word 2010 on Windows 7 …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»