- application confidentiality
- конфиденциальность (сохранение секретности) прикладных программ и процессов
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Confidentiality status of CRS Reports — The confidentiality status of CRS Reports has been a public policy dispute. Contents 1 Congress s attitudes towards CRS confidentiality 1.1 CRS annual appropriations legislation 1.2 1978 proposal by the National Conference of State Legislatures … Wikipedia
Generic Security Services Application Program Interface — The Generic Security Services Application Program Interface (GSSAPI, also GSS API) is an application programming interface for programs to access security services.The GSSAPI is an IETF standard that addresses the problem of many similar but… … Wikipedia
Avaya Application Server 5300 — Avaya Aura AS5300 The Avaya Aura Application Server 5300 or Avaya Aura AS5300 in telecommunication and computer networking is a secure Unified Communications (UC) system designed and manufactured by Avaya. The system provides integrated IP… … Wikipedia
Mediation — For the Wikipedia mediation process for resolving disputes, see Wikipedia:Mediation. For other uses, see Mediation (disambiguation) … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Christopher Gillberg — Lars Christopher Gillberg (born 19 April 1950), who has sometimes published as Gillberg and Gillberg with his wife Carina Gillberg, is a professor of child and adolescent psychiatry at Gothenburg University in Gothenburg, Sweden, and an honorary… … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Electronic business — Electronic business, commonly referred to as eBusiness or e business , or an internet business, may be defined as the application of information and communication technologies (ICT) in support of all the activities of business. Commerce… … Wikipedia
Internet security — is a branch of computer security[1] specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.[2] The Internet represents an insecure channel for exchanging information leading … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Deep configuration assessment — Large, dynamic and complex IP networks are increasingly being used for real time and critical services. To provide service assurance in such networks, deep configuration assessment is a new approach that is being discussed in the recent… … Wikipedia