- controlled security mode
- управляемый режим безопасности
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Security token — Several types of security tokens with a penny for scale … Wikipedia
Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… … Wikipedia
Multilevel security — or Multiple Levels of Security (abbreviated as MLS) is the application of a computer system to process information with different sensitivities (i.e., at different security levels), permit simultaneous access by users with different security… … Wikipedia
Ring (computer security) — In computer science, hierarchical protection domains, [Paul A. Karger, Andrew J. Herbert, [http://doi.ieeecomputersociety.org/10.1109/SP.1984.10001 An Augmented Capability Architecture to Support Lattice Security and Traceability of Access] , sp … Wikipedia
Norton Internet Security — The main, simplified graphical user interface of Norton Internet Security 2012 … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Domain Name System Security Extensions — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP … Wikipedia
Mandatory access control — In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.… … Wikipedia
Parallel ATA — ATA connector on the right, with two motherboard ATA sockets on the left. Type … Wikipedia
AT Attachment — Infobox connector name=AT Attachment with Packet Interface type=Internal storage device connector logo= caption=ATA connector on the left, with two motherboard ATA connectors on the right. designer=Western Digital, subsequently amended by many… … Wikipedia
List of Eureka episodes — The following is a list of episodes for the American science fiction drama Eureka. In addition to the regularly televised episodes, there is a short webisode series called Hide and Seek , which is available on Syfy s Eureka homepage. The episodes … Wikipedia