- unauthorized network access
- Компьютерная техника: несанкционированный доступ к сети
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… … Wikipedia
Network Stumbler — Infobox Software name = Network Stumbler caption = developer = Marius Milner latest release version = 0.4.0 latest release date = April 2004 operating system = Windows 9x, Windows 2000, Windows XP, Windows Vista genre = license = Donationware… … Wikipedia
Network switching subsystem — (NSS) (or GSM core network) is the component of a GSM system that carries out call switching and mobility management functions for mobile phones roaming on the network of base stations. It is owned and deployed by mobile phone operators and… … Wikipedia
Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… … Wikipedia
access — {{Roman}}I.{{/Roman}} noun ADJECTIVE ▪ direct, easy, free, full, good, ready, unfettered, unlimited, unrestricted ▪ … Collocations dictionary
Computer network — Computer networks redirects here. For the periodical, see Computer Networks (journal). Datacom redirects here. For other uses, see Datacom (disambiguation). Internet map. The Internet is a global system of interconnected computer networks that… … Wikipedia
Mobile Virtual Private Network (Mobile VPN) — A Mobile Virtual Private Network (VPN) allows continuous access to network resources and information through mobile devices. Designed for today’s wireless, mobile computing environments, Mobile VPNs allow users to roam easily among various wired… … Wikipedia
Microsoft Data Access Components — MDAC redirects here. For other uses, see MDAC (disambiguation). MDAC (Microsoft Data Access Components) Microsoft Corporation s MDAC provides a uniform framework for accessing a variety of data sources on their Windows platform. Developer(s)… … Wikipedia
Rogue access point — A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, [citeweb|title=Identifying Rogue Access Points|url=http://www.wi… … Wikipedia
Identity and Access Management — (IAM) is a concept that combines business processes, policies and technologies that enable companies to: * provide secure access to any resource. * efficiently control this access. * respond faster to changing relationships. * protect… … Wikipedia
Public land mobile network — In telecommunication, a public land mobile network (PLMN) is a network that is established and operated by an administration or by a recognized operating agency (ROA) for the specific purpose of providing land mobile telecommunications services… … Wikipedia