- unauthorized penetration
- Безопасность: несанкционированное проникновение, несанкционированный доступ
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Penetration test — A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious user, known as a Black Hat Hacker, or Cracker. The process involves an active analysis of the system for any… … Wikipedia
Penetration (telecommunications) — In telecommunication, the term penetration has the following meanings: # The passage through a partition or wall of an equipment or enclosure by a wire, cable, or other conductive object. # The unauthorized act of bypassing the security… … Wikipedia
Media and Publishing — ▪ 2007 Introduction The Frankfurt Book Fair enjoyed a record number of exhibitors, and the distribution of free newspapers surged. TV broadcasters experimented with ways of engaging their audience via the Internet; mobile TV grew; magazine… … Universalium
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
china — /chuy neuh/, n. 1. a translucent ceramic material, biscuit fired at a high temperature, its glaze fired at a low temperature. 2. any porcelain ware. 3. plates, cups, saucers, etc., collectively. 4. figurines made of porcelain or ceramic material … Universalium
China — /chuy neuh/, n. 1. People s Republic of, a country in E Asia. 1,221,591,778; 3,691,502 sq. mi. (9,560,990 sq. km). Cap.: Beijing. 2. Republic of. Also called Nationalist China. a republic consisting mainly of the island of Taiwan off the SE coast … Universalium
Payment Card Industry Data Security Standard — The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e purse, ATM, and POS cards. Defined by the Payment Card… … Wikipedia
Clandestine HUMINT — This article is a subset article under Human Intelligence. For a complete hierarchical list of articles, see the intelligence cycle management hierarchy. Concepts here also are intimately associated with counterintelligence. This article deals… … Wikipedia
Wreck diving — Diver at the wreck of the Hilma Hooker, Netherlands Antilles. Wreck diving is a type of recreational diving where shipwrecks are explored. Although most wreck dive sites are at shipwrecks, there is an increasing trend to scuttle retired ships to… … Wikipedia
Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… … Wikipedia
Hacker (computer security) — This article is part of a series on … Wikipedia