- logical protection
- логическая защита
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Logical Unit Number Masking — or LUN masking is an authorization process that makes a Logical Unit Number available to some hosts and unavailable to other hosts.The security benefits are limited in that with many HBAs it is possible to forge source addresses (WWNs/MACs/IPs).… … Wikipedia
Logical Disk Manager — The Logical Disk Manager (diskmgmt.msc) is an implementation of a logical volume manager for Microsoft Windows NT, developed by Microsoft and Veritas Software. It was introduced with the Windows 2000 operating system, and is supported in Windows… … Wikipedia
Compact Disc and DVD copy protection — CD/DVD copy protection is a blanket term for various methods of copy protection for CDs and DVDs. Such methods include DRM, CD checks, Dummy Files, illegal tables of contents, over sizing or over burning the CD, physical errors, and bad sectors.… … Wikipedia
CD/DVD copy protection — is a blanket term for various methods of copy protection for CDs and DVDs. Such methods include DRM, CD checks, Dummy Files, illegal tables of contents, over sizing or over burning the CD, physical errors, and bad sectors. Many protection schemes … Wikipedia
Network Access Protection — (NAP) is a Microsoft technology for controlling network access of a computer host based on the system health of the host, first introduced in Windows Server 2008. With Network Access Protection, system administrators of an organization s computer … Wikipedia
Windows Resource Protection — Windows Resource Protection (сокр. WRP) технология, используемая в ОС Windows Vista взамен Windows File Protection. Она защищает ключи реестра и папки, наряду с критически важными системными файлами. Методы, используемые этой технологией для … Википедия
Continuous data protection — (CDP), also called continuous backup or real time backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user… … Wikipedia
National Information Infrastructure Protection Act — The National Information Infrastructure Protection Act (Pub.L. 104 294, 110 Stat. 3488, enacted October 11, 1996; H.R. 3723) was Title II of the Economic Espionage Act of 1996, as an amendment to the Computer Fraud and Abuse… … Wikipedia
Keffiyeh — Yasser Arafat wearing a Palestinian keffiyeh The keffiyeh/kufiya (Arabic: كوفية, kūfiyyah, plural كوفيات … Wikipedia
RAID — This article is about the data storage technology. For other uses, see Raid (disambiguation). RAID, an acronym for Redundant Array of Independent Disks (originally Redundant Array of Inexpensive Disks),[1] is a storage… … Wikipedia
Files-11 — Files 11, also known as on disk structure, is the file system used by Hewlett Packard s OpenVMS operating system, and also (in a simpler form) by the older RSX 11. It is a hierarchical file system, with support for access control lists, record… … Wikipedia