- secure computing environment
- Вычислительная техника: безопасная вычислительная среда, защищённая вычислительная среда
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Next-Generation Secure Computing Base — The Next Generation Secure Computing Base (NGSCB), formerly known as Palladium, is a software architecture designed by Microsoft which is expected to implement parts of the controversial Trusted Computing concept on future versions of the… … Wikipedia
Secure cryptoprocessor — A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. The purpose of… … Wikipedia
Secure environment — In computing, a secure environment is any system which implements the controlled storage and use of information.Often, secure environments employ cryptography as a means to protect information.Some secure environments employ cryptographic hashing … Wikipedia
List of computing and IT abbreviations — This is a list of computing and IT acronyms and abbreviations. Contents: 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y … Wikipedia
Trustworthy Computing — The term Trustworthy Computing (TwC) has been applied to computing systems that are inherently secure, available and reliable. The Committee on Information Systems Trustworthiness’ publication, Trust in Cyberspace, defines such a system as one… … Wikipedia
Trusted Computing Group — Infobox Company company name = Trusted Computing Group company company type = Consortium location city = Beaverton, Oregon [ [https://www.trustedcomputinggroup.org/about/contact us/ Trusted Computing Group: Contact Us ] ] location country = USA… … Wikipedia
Configurable Network Computing — or CNC is JD Edwards s (JDE) client–server proprietary architecture and methodology that implements its highly scalable enterprise wide business solutions software that can run on a wide variety of hardware, operating systems (OS) and hardware… … Wikipedia
Avaya Secure Network Access — Secure Network Access 4050 Rack Space 1 Rack Unit Height: 1.7 in. (44 mm) Width: 16.9 in. (44.9 cm) Depth: 22 in. (55.9 cm) Weight: 25 lb (11.34 kg) … Wikipedia
Cloud computing — logical diagram Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a… … Wikipedia
Cloud computing security — (sometimes referred to simply as cloud security ) is an evolving sub domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data … Wikipedia
Daemon (computing) — For other uses, see Daemon (disambiguation). In Unix and other multitasking computer operating systems, a daemon ( /ˈdeɪ … Wikipedia