secure computing environment

secure computing environment
Вычислительная техника: безопасная вычислительная среда, защищённая вычислительная среда

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Нужна курсовая?

Смотреть что такое "secure computing environment" в других словарях:

  • Next-Generation Secure Computing Base — The Next Generation Secure Computing Base (NGSCB), formerly known as Palladium, is a software architecture designed by Microsoft which is expected to implement parts of the controversial Trusted Computing concept on future versions of the… …   Wikipedia

  • Secure cryptoprocessor — A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. The purpose of… …   Wikipedia

  • Secure environment — In computing, a secure environment is any system which implements the controlled storage and use of information.Often, secure environments employ cryptography as a means to protect information.Some secure environments employ cryptographic hashing …   Wikipedia

  • List of computing and IT abbreviations — This is a list of computing and IT acronyms and abbreviations. Contents: 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y …   Wikipedia

  • Trustworthy Computing — The term Trustworthy Computing (TwC) has been applied to computing systems that are inherently secure, available and reliable. The Committee on Information Systems Trustworthiness’ publication, Trust in Cyberspace, defines such a system as one… …   Wikipedia

  • Trusted Computing Group — Infobox Company company name = Trusted Computing Group company company type = Consortium location city = Beaverton, Oregon [ [https://www.trustedcomputinggroup.org/about/contact us/ Trusted Computing Group: Contact Us ] ] location country = USA… …   Wikipedia

  • Configurable Network Computing — or CNC is JD Edwards s (JDE) client–server proprietary architecture and methodology that implements its highly scalable enterprise wide business solutions software that can run on a wide variety of hardware, operating systems (OS) and hardware… …   Wikipedia

  • Avaya Secure Network Access — Secure Network Access 4050 Rack Space 1 Rack Unit Height: 1.7 in. (44 mm) Width: 16.9 in. (44.9 cm) Depth: 22 in. (55.9 cm) Weight: 25 lb (11.34 kg) …   Wikipedia

  • Cloud computing — logical diagram Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a… …   Wikipedia

  • Cloud computing security — (sometimes referred to simply as cloud security ) is an evolving sub domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data …   Wikipedia

  • Daemon (computing) — For other uses, see Daemon (disambiguation). In Unix and other multitasking computer operating systems, a daemon (  /ˈdeɪ …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»