- unauthorized equipment
- связьсамовольно включённое в сеть оборудование
English-Russian scientific dictionary. 2008.
English-Russian scientific dictionary. 2008.
communications security equipment — Equipment designed to provide security to telecommunications by converting information to a form unintelligible to an unauthorized interceptor and by reconverting such information to its original form for authorized recipients, as well as… … Military dictionary
COMSEC equipment — is equipment designed to provide security to telecommunications (COMSEC) using cryptography.ee alsoCOMSEC Equipment designated as telecommunications security (TSEC), Joint Electronic Type Designation System, and controlled cryptographic item… … Wikipedia
Conficker — Common name Aliases Mal/Conficker A(Sophos) Win32/Conficker.A (CA) W32.Downadup (Symantec) W32/Downadup.A (F Secure) Conficker.A (Panda) Net Worm.Win32.Kido.bt ( … Wikipedia
самовольно включенное в сеть оборудование — — [Л.Г.Суменко. Англо русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.] Тематики информационные технологии в целом EN unauthorized equipment … Справочник технического переводчика
call restrictor — Equipment inserted in an outgoing dial trunk that restricts calls to forbidden or unauthorized codes … IT glossary of terms, acronyms and abbreviations
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Government contract — Contracting with the U.S. Government is based on many of the same principles as commercial contracting andcan be very profitable, but is sufficiently different from commercial contracting to require special care.Persons entering into commercial… … Wikipedia
Government procurement in the United States — is based on many of the same principles as commercial contracting, but is subject to special laws and regulation as described below. Persons entering into commercial contracts are pretty much free to do anything that they can agree on. Each… … Wikipedia
Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Anti-frogman techniques — are security methods developed to protect watercraft, ports and installations, and other sensitive resources both in or nearby vulnerable waterways from potential threats or intrusions by frogmen or other divers.Risks and threats to be defended… … Wikipedia