- Computer Breach
- Вычислительная техника: Брешь в информационной системе (безопасность на предприятии; комплаенс)
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Computer recycling — Computer monitors are typically packed into low stacks on wooden pallets for recycling and then shrink wrapped.[1] Computer recycling or electronic recycling is the recycling or reuse of computers or other electronics. It includes both finding… … Wikipedia
Computer memory — types Volatile RAM DRAM (e.g., DDR SDRAM) SRAM In development T RAM Z RAM TTRAM Historical Delay line memory Selectron tube Williams tube Non volatile … Wikipedia
Computer surveillance in the workplace — refers to the issues related to the element of employee monitoring and workplace surveillance in which an employer engages in actively monitoring the usage of a company owned computer or terminal by an employee. Computer surveillance may also… … Wikipedia
Computer Associates Int. Inc. v. Altai Inc. — Computer Associates International, Inc. v. Altai, Inc. Court United States Court of Appeals for the Second Circuit Full case name Computer Associates International, Inc. v. Altai, Inc … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Breach — Filmdaten Deutscher Titel: Enttarnt – Verrat auf höchster Ebene Originaltitel: Breach Produktionsland: USA Erscheinungsjahr: 2007 Länge: ca. 110 Minuten Originalsprache: Englisch … Deutsch Wikipedia
Computer Fraud and Abuse Act — The Computer Fraud and Abuse Act is a law passed by the United States Congress in 1986, intended to reduce cracking of computer systems and to address federal computer related offenses. The Act (codified as 18 U.S.C. § 1030) governs… … Wikipedia
Computer security incident management — In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events … Wikipedia
Data breach — A data breach is the intentional or unintentional release of secure information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak and also data spill. Incidents range from… … Wikipedia
Apple Corps v. Apple Computer — Between 1978 and 2006 there was a number of legal disputes between Apple Corps (owned by The Beatles) and the computer manufacturer Apple Computer (now Apple Inc.) over competing trademark rights. In the latest dispute, the English High Court… … Wikipedia