- login identifier
- идентификатор для входа в систему
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Login — Identifiant En informatique, on appelle identifiants (également appelé parfois en anglais login) les informations permettant à une personne de s identifier auprès d un système. Il s agit le plus souvent des informations suivantes : un nom d… … Wikipédia en Français
Fragment identifier — In computer hypertext, a fragment identifier is a short string of characters that refers to a resource that is subordinate to another, primary resource. The primary resource is identified by a Uniform Resource Identifier (URI), and the fragment… … Wikipedia
Group identifier (Unix) — In Unix like systems, multiple users can be categorized into groups . POSIX and conventional Unix file system permissions are organized into three classes, user , group , and others . The use of groups allows additional abilities to be delegated… … Wikipedia
Identity correlation — Definition In information systems, identity correlation is a process that reconciles and validates the proper ownership of disparate user account login IDs (user names) that reside on systems and applications throughout an organization and can… … Wikipedia
OpenID — The OpenID logo OpenID is an open standard that describes how users can be authenticated in a decentralized manner, eliminating the need for services to provide their own ad hoc systems and allowing users to consolidate their digital… … Wikipedia
X Window System protocols and architecture — In computing, the X Window System (commonly X11 or X) is a network transparent windowing system for bitmap displays. This article details the protocols and technical structure of X11. The X client server model and network transparencyX is based… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Files-11 — Files 11, also known as on disk structure, is the file system used by Hewlett Packard s OpenVMS operating system, and also (in a simpler form) by the older RSX 11. It is a hierarchical file system, with support for access control lists, record… … Wikipedia
Session (computer science) — In computer science, in particular networking, a session is a semi permanent interactive information interchange, also known as a dialogue, a conversation or a meeting, between two or more communicating devices, or between a computer and user… … Wikipedia
DNIX — Company / developer Dataindustrier AB OS family Unix like Working state Historic Source model Closed source Latest stable release 5.4 … Wikipedia
MIRIAM — (Minimum Information Requested in the Annotation of biochemical Models) [Le Novère, N. et al (2005) Minimum information requested in the annotation of biochemical models (MIRIAM). Nature Biotechnology 23:1509 1515. PMID 16333295] , is an effort… … Wikipedia