- protocol-based protection
- Безопасность: защита на основе протоколов, протокольная защита
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Protocol-based intrusion detection system — A protocol based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring and analysis of the protocol in use by the computing system. A PIDS will monitor the… … Wikipedia
Protocol III — is an amendment to the Geneva Conventions relating to the Adoption of an Additional Distinctive Emblem. The third protocol was adopted on 8 December 2005 and authorizes the use of a new emblem, shown right, known as the third protocol emblem or… … Wikipedia
Kyoto Protocol — Participation in the Kyoto Protocol, as of December 2010, Green = Countries that have signed and ratified the treaty (Annex I II countries in dark green) Grey =… … Wikipedia
BitTorrent (protocol) — BitTorrent is a peer to peer file sharing protocol used to distribute large amounts of data. The initial distributor of the complete file or collection acts as the first seed . Each peer who downloads the data also uploads them to other peers.… … Wikipedia
Montreal Protocol — For other similarly named agreements, see Montreal Convention (disambiguation). The largest Antarctic ozone hole recorded as of September 2006 The Montreal Protocol on Substances That Deplete the Ozone Layer (a protocol to the Vienna Convention… … Wikipedia
Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… … Wikipedia
Maputo Protocol — Protocol to the African Charter on Human and Peoples’ Rights on the Rights of Women in Africa Type Human rights instrument (women) Drafted March 1995 (Lome, Togo)[1] Signed 2003 July 11 Location Maputo, Mozambique Effective 2005 November 25 … Wikipedia
Social Protection — ▪ 2006 Introduction With medical costs skyrocketing and government programs scaled back, citizens bore more responsibility for their health care costs; irregular migration, human trafficking, and migrant smuggling posed challenges for… … Universalium
Lightweight Directory Access Protocol — The Lightweight Directory Access Protocol (LDAP; /ˈɛld … Wikipedia
Spanning Tree Protocol — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP … Wikipedia
Spanning tree protocol — The Spanning Tree Protocol is an OSI layer 2 protocol that ensures a loop free topology for any bridged LAN. It is based on an algorithm invented by Radia Perlman while working for Digital Equipment Corporationcite… … Wikipedia