- legitimate access
- санкционированный (разрешенный) доступ; законный доступ
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Legitimate peripheral participation — (LPP) is a theoretical description of how newcomers become experienced members and eventually old timers of a community of practice or collaborative project. According to LPP, newcomers become members of a community initially by participating in… … Wikipedia
Open access poll — An open access poll is a type of opinion poll in which participants are self selected. The term includes call in, mail in, and some online polls. Contents 1 Advantages 2 Disadvantages … Wikipedia
Ballot access — rules, called nomination rules outside the US, regulate the conditions under which a candidate or political party is either entitled to stand for election or to appear on voters ballots. Laws restricting which names may appear on the ballot have… … Wikipedia
Common Access Card — An example DoD Common Access Card The Common Access Card (CAC) is a United States Department of Defense (DoD) smart card issued as standard identification for active duty military personnel, reserve personnel, civilian employees, other non DoD… … Wikipedia
Network Access Control — (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security… … Wikipedia
Advanced Access Content System — AACS decryption process The Advanced Access Content System (AACS) is a standard for content distribution and digital rights management, intended to restrict access to and copying of the next generation of optical discs and DVDs. The specification … Wikipedia
Open Access — The ability to send or wheel electric power to a customer over a transmission and distribution system that is not owned by the generator (seller) of the power. Access to the electric transmission system by any legitimate market participant,… … Energy terms
privileged access — The special way that we each have of knowing our own thoughts, intentions, and sensations. Many philosophers of a behaviourist and functionalist tendency have found it important to deny that there is such a special way, arguing instead that I… … Philosophy dictionary
Organized crime — Crime syndicate redirects here. For the DC Comics group of villains, see Crime Syndicate. For other uses, see Organized crime (disambiguation). Al Capone, a name often associated with organized crime … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Evil twin (wireless networks) — Evil Twin is a term for a rogue Wi Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up by a hacker to eavesdrop on wireless communications among Internet surfers. [ Strange Wi Fi spots may… … Wikipedia