- indirect authentication
- косвенная аутентификация
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Ultraviolet — UV redirects here. For other uses, see UV (disambiguation). UVB redirects here. For the mysterious shortwave radio station in Russia, see UVB 76. For other uses, see Ultraviolet (disambiguation). False color image of the Sun s corona as seen in… … Wikipedia
IP Multimedia Subsystem — The IP Multimedia Subsystem or IP Multimedia Core Network Subsystem (IMS) is an architectural framework for delivering Internet Protocol (IP) multimedia services. It was originally designed by the wireless standards body 3rd Generation… … Wikipedia
Shroud of Turin — The Shroud of Turin: modern photo of the face, positive left, negative right. Negative has been contrast enhanced. The Shroud of T … Wikipedia
DomainKeys Identified Mail — (DKIM) is a method for associating a domain name to an email message, thereby allowing a person, role, or organization to claim some responsibility for the message. The association is set up by means of a digital signature which can be validated… … Wikipedia
Evidence (law) — The law of evidence governs the use of testimony (e.g., oral or written statements, such as an affidavit) and exhibits (e.g., physical objects) or other documentary material which is admissible (i.e., allowed to be considered by the trier of fact … Wikipedia
Computational trust — In Information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security is typically based on the authenticated identity of external parties. Rigid authentication… … Wikipedia
Portable Document Format — PDF redirects here. For other uses, see PDF (disambiguation). Portable Document Format Adobe Reader icon Filename extension .pdf Internet media type application/pdf application/x pdf application/x bzpdf application/x gzpdf … Wikipedia
Europe, history of — Introduction history of European peoples and cultures from prehistoric times to the present. Europe is a more ambiguous term than most geographic expressions. Its etymology is doubtful, as is the physical extent of the area it designates.… … Universalium
E-mail spam — E mail spam, also known as bulk e mail or junk e mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e mail. A common synonym for spam is unsolicited bulk e mail (UBE). Definitions of spam usually… … Wikipedia
Cloud API — Cloud APIs are application programming interfaces (APIs) used to build applications in the cloud computing market. Cloud APIs allow software to request data and computations from one or more services through a direct or indirect interface. Cloud… … Wikipedia