- Security Setup
- Вычислительная техника: Функция защищённой настройки
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
setup — Applies mainly to convertible securities ( convertible security). arbitrage involving going long the convertible and short a certain percentage of the underlying common. Antithesis of Chinese hedge. Bloomberg Financial Dictionary * * * Ⅰ. setup… … Financial and business terms
Setup Price — A price level predetermined as the point of entry into a specific security, stock, or currency. Once the setup price is broken the trader will enter the position determined by the setup. This could include shorting a stock because they think the… … Investment dictionary
Security Identifier — Ein Security Identifier, kurz SID, ist ein Sicherheits Identifikator, den Microsoft Windows NT automatisch vergibt, um jedes System, jeden Benutzer und jede Gruppe dauerhaft zu identifizieren. Inhaltsverzeichnis 1 Zweck 2 Vergabe 3 Aufbau 4 … Deutsch Wikipedia
Wi-Fi Protected Setup — (защищённая установка), WPS стандарт (и одноимённый протокол) полуавтоматического создания беспроводной сети Wi Fi, созданный Wi Fi Alliance. Офици … Википедия
Wireless LAN security — One issue with corporate wireless networks in general, and WLANs in particular, involves the need for security. Many early access points could not discern whether or not a particular user had authorization to access the network. Although this… … Wikipedia
Wi-Fi Protected Setup — (WPS) is a standard for easy and secure establishment of a wireless home network, created by the Wi Fi Alliance and officially launched on January 8, 2007.The goal of the WPS protocol is to simplify the process of configuring security on wireless … Wikipedia
ITIL Security Management — The ITIL Security Management process describes the structured fitting of security in the management organization. ITIL Security Management is based on the Code of practice for information security management also known as ISO/IEC 17799.A basic… … Wikipedia
Active Setup — is originally a feature of Internet Explorer and Outlook, thus, through integration , a feature of Windows OS. What Active Setup does is this: when you visit a web page belonging to a software company that uses Active Setup, you are told when… … Wikipedia
Tunnel Setup Protocol — Le Tunnel Setup Protocol est un protocole réseau utilisé pour négocier les paramètres d un tunnel entre une machine cliente et le système d un fournisseur de tunnel. Ce protocole est défini par la RFC 5572[1]. TSP est essentiellement utilisé dans … Wikipédia en Français
Norton Internet Security — The main, simplified graphical user interface of Norton Internet Security 2012 … Wikipedia
Organizational Systems Security Analyst — The Organizational Systems Security Analyst (OSSA) is a technical vendor neutral Information Security certification programme which is being offered in Asia. This programme consists of a specialized technical information security training and… … Wikipedia