- voice verification access control
- Безопасность: управление доступом на основе опознавания говорящего по голосу
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Biometrics — For the academic journal of statistics in biology, see Biometrics (journal). For the application of statistics to topics in biology, see Biostatistics. At Walt Disney World, biometric measurements are taken from the fingers of guests to ensure… … Wikipedia
Liste der standardisierten Ports — Die folgende Liste enthält die Zuordnung von Ports zu Protokollen, die von der IANA standardisiert wurden. Eine vollständige Liste kann unter Unixoiden Betriebssystemen in der Datei /etc/services eingesehen werden. Inhaltsverzeichnis 1 Legende 2… … Deutsch Wikipedia
Burglar alarm — Silent alarm redirects here. For the album, see Silent Alarm (album). Burglar (or intrusion), fire and safety alarms are all electronic today. Sensors are connected to a control unit via a low voltage hardwire or narrowband RF signal which is… … Wikipedia
Surveillance — For other uses, see Surveillance (disambiguation). A nest of surveillance cameras at the Gillette Stadium in Foxborough, Massachusetts Surveillance ( … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Flickr — URL flickr.com Commercial? Yes Type of site Photo/Video hosting service … Wikipedia
Mobile ticketing — Part of a series on Electronic commerce Online goods and services Streaming media Electronic books Softwar … Wikipedia
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Cybercrime and Countermeasures — Cyber crime, or computer crime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the … Wikipedia