- end-to-end security measures
- межконцевые меры безопасности
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
security — /si kyoor i tee/, n., pl. securities, adj. n. 1. freedom from danger, risk, etc.; safety. 2. freedom from care, anxiety, or doubt; well founded confidence. 3. something that secures or makes safe; protection; defense. 4. freedom from financial… … Universalium
Security Square Mall — Infobox shopping mall shopping mall name = Security Square Mall image width = caption = location = Woodlawn, Maryland, United States address = coordinates = opening date = developer = manager = owner = number of stores = 100+ number of anchors =… … Wikipedia
End-to-end auditable voting systems — Election technology Certification of voting machines Independent Testing Authority (ITA) NVLAP VVSG End to end auditable voting systems Help America Vote Act Indepen … Wikipedia
National security — Security measures taken to protect the Houses of Parliament in London, UK. These heavy blocks of concrete are designed to prevent a car bomb or other device being rammed into the building. National security is the requirement to maintain the… … Wikipedia
Security regulation — What are PMSCs? = Private military and security companies (PMSCs) are businesses that offer specialised services related to war and conflict, including combat operations, strategic planning, intelligence collection, operational and logistical… … Wikipedia
Security of Advanced Access Content System — The security of Advanced Access Content System has a subject of discussion amongst security researchers, high definition video enthusiasts, and consumers at large since its inception. A successor to Content Scramble System, the digital rights… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Intelligence cycle security — This article is part of a series under the intelligence cycle management, and deals with protection of the intelligence cycle. For a hierarchical list of articles, see the intelligence cycle management hierarchy. National intelligence programs,… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Transport Layer Security — (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications on the Internet for such things as web browsing, e mail, Internet faxing, instant messaging and other data transfers. There are… … Wikipedia
Cyber-security regulation — In the United States government, cyber security regulation comprises directives from the Executive Branch and legislation from Congress that safeguards information technology and computer systems. The purpose of cyber security regulation is to… … Wikipedia