- verification access control
- Безопасность: контроль доступа с аутентификацией посетителей
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Resource Access Control Facility — est un composant de l’OS/390. RACF est un programme de sécurité qui contrôle toutes les opérations effectuées sur le système d’exploitation. Ce programme a été conçu à l origine en septembre 1976. Il est utilisé pour : protéger les… … Wikipédia en Français
Device driver synthesis and verification — The device driver is a program which allows the software or higher level computer programs to interact with a hardware device. These software components act as a link between the devices and the operating systems, communicating with each of these … Wikipedia
Arms control — is an umbrella term for restrictions upon the development, production, stockpiling, proliferation, and usage of weapons, especially weapons of mass destruction. Arms control is typically exercised through the use of diplomacy which seeks to… … Wikipedia
Office of International Treasury Control — The Office of International Treasury Control (OITC) is a seemingly elaborate fraudulent organization which claims to be associated with the United Nations and the Federal Reserve, the central bank of the United States. It has attempted to deceive … Wikipedia
Comparison of revision control software — The following is a comparison of revision control software. The following tables includes general and technical information for notable revision control and software configuration management (SCM) software. This is an incomplete list, which may… … Wikipedia
Burglar alarm — Silent alarm redirects here. For the album, see Silent Alarm (album). Burglar (or intrusion), fire and safety alarms are all electronic today. Sensors are connected to a control unit via a low voltage hardwire or narrowband RF signal which is… … Wikipedia
Biometrics — For the academic journal of statistics in biology, see Biometrics (journal). For the application of statistics to topics in biology, see Biostatistics. At Walt Disney World, biometric measurements are taken from the fingers of guests to ensure… … Wikipedia
Trusted Computer System Evaluation Criteria — (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify and… … Wikipedia
Liste der standardisierten Ports — Die folgende Liste enthält die Zuordnung von Ports zu Protokollen, die von der IANA standardisiert wurden. Eine vollständige Liste kann unter Unixoiden Betriebssystemen in der Datei /etc/services eingesehen werden. Inhaltsverzeichnis 1 Legende 2… … Deutsch Wikipedia
Digital rights management — (DRM) is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals to limit the use of digital content and devices. The term is used to describe any technology that inhibits uses … Wikipedia
Token ring — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP … Wikipedia