application confidentiality

application confidentiality
конфиденциальность (сохранение секретности) прикладных программ и процессов

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Нужно решить контрольную?

Смотреть что такое "application confidentiality" в других словарях:

  • Confidentiality status of CRS Reports — The confidentiality status of CRS Reports has been a public policy dispute. Contents 1 Congress s attitudes towards CRS confidentiality 1.1 CRS annual appropriations legislation 1.2 1978 proposal by the National Conference of State Legislatures …   Wikipedia

  • Generic Security Services Application Program Interface — The Generic Security Services Application Program Interface (GSSAPI, also GSS API) is an application programming interface for programs to access security services.The GSSAPI is an IETF standard that addresses the problem of many similar but… …   Wikipedia

  • Avaya Application Server 5300 — Avaya Aura AS5300 The Avaya Aura Application Server 5300 or Avaya Aura AS5300 in telecommunication and computer networking is a secure Unified Communications (UC) system designed and manufactured by Avaya. The system provides integrated IP… …   Wikipedia

  • Mediation — For the Wikipedia mediation process for resolving disputes, see Wikipedia:Mediation. For other uses, see Mediation (disambiguation) …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Christopher Gillberg — Lars Christopher Gillberg (born 19 April 1950), who has sometimes published as Gillberg and Gillberg with his wife Carina Gillberg, is a professor of child and adolescent psychiatry at Gothenburg University in Gothenburg, Sweden, and an honorary… …   Wikipedia

  • Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Electronic business — Electronic business, commonly referred to as eBusiness or e business , or an internet business, may be defined as the application of information and communication technologies (ICT) in support of all the activities of business. Commerce… …   Wikipedia

  • Internet security — is a branch of computer security[1] specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.[2] The Internet represents an insecure channel for exchanging information leading …   Wikipedia

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Deep configuration assessment — Large, dynamic and complex IP networks are increasingly being used for real time and critical services. To provide service assurance in such networks, deep configuration assessment is a new approach that is being discussed in the recent… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»