- Security Access List
- Information technology: SAL
Универсальный русско-английский словарь. Академик.ру. 2011.
Универсальный русско-английский словарь. Академик.ру. 2011.
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Access Control Matrix — or Access Matrix is an abstract, formal computer protection and security model used in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in… … Wikipedia
Security descriptor — Security descriptors are data structures of security information for securable Windows objects, that is objects that can be identified by a unique name. Security descriptors can be associated with any named objects, including files, folders,… … Wikipedia
Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro … Wikipedia
Security — is the condition of being protected against danger, loss, and criminals. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside.… … Wikipedia
List of computing and IT abbreviations — This is a list of computing and IT acronyms and abbreviations. Contents: 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y … Wikipedia
List of Soviet agents in the United States — List of Soviet agents in the United StatesThis is a list of spies who worked for the Soviet Union, Warsaw Pact nations, and Soviet aligned countries in the United States. The list is based on categorization of .Czechoslovakia (StB)*Karl Koecher,… … Wikipedia
Access (economics) — Access is a catalytic process that enables interactions, contacts and exchanges among people, businesses and nations. An analytical framework to define the drivers and benefits of Access and to quantify the impact of Access on economic growth and … Wikipedia
List of Nortel Products and Protocols — List of Nortel Products, and Protocols:Products Application Switching Optimization* Application Accelerator 610 * Application Accelerator 510 * Application Switch 3408E * Application Switch 2424E * Application Switch 2424 SSL E * Application… … Wikipedia
List of government and military acronyms — List of initialisms, acronyms ( words made from parts of other words, pronounceable ), and other abbreviations used by the government and the military:CompactTOC8 side=yes nobreak=yes top=yes num=yes seealso=yes0–9* 1LT First Lieutenant (U.S.… … Wikipedia
List of Conservative Roundtable episodes — List of Conservative Roundtable episodes:1991*1 February Dave Sullivan/Grover Norquist *2 February Grover Norquist/Dave Sullivan *3 March John Lofton/Larry Uzell *4 March Larry Uzell/Michael Johns *5 March Michael Johns/John Lofton *6 April… … Wikipedia