- sensitive end-users
- МИД: чувствительные конечные пользователи
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Network neutrality — This article is about the general principle of network neutrality. For its specific application to Canada, see Network neutrality in Canada. For its application to the U.S., see Network neutrality in the United States. Network Neutrality Related… … Wikipedia
Internet censorship in the People's Republic of China — Part of a series on Censorship By media … Wikipedia
Database activity monitoring — (DAM) is a database security technology for monitoring and analyzing database activity that operates independently of the database management system (DBMS) and does not rely on any form of native (DBMS resident) auditing or native logs such as… … Wikipedia
Phorm — Type Public (AIM: PHRM) Industry Online advertising Founded … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Terrestrial Trunked Radio — TETRA redirects here. For other uses, see Tetra (disambiguation) TErrestrial Trunked RAdio [ETSI EN 300 392 2 v3.2.1] (TETRA) (formerly known as Trans European Trunked RAdio ) is a specialist Professional Mobile Radio [http://www.tetra… … Wikipedia
Network neutrality in the United States — Network Neutrality Related issues and topics Automatic telephone exchange Data discrimination End to end principle Internet Protocol Tiered Internet Bandwidth Throttling … Wikipedia
Proprietary software — is computer software licensed under exclusive legal right of the copyright holder. The licensee is given the right to use the software under certain conditions, but restricted from other uses, such as modification, further distribution, or… … Wikipedia
Cloud computing — logical diagram Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a… … Wikipedia
Traffic shaping — (also known as packet shaping ) is the control of computer network traffic in order to optimize or guarantee performance, lower latency, and/or increase usable bandwidth by delaying packets that meet certain criteria. [… … Wikipedia
Windows XP — Windows Experience redirects here. For Windows Experience Index, see Windows System Assessment Tool. Windows XP Part of the Microsoft Windows family … Wikipedia