- Data Set Security (DSS)
-
защита набора данных
English-Russian dictionary of modern telecommunications. 2003.
English-Russian dictionary of modern telecommunications. 2003.
Data mining — Not to be confused with analytics, information extraction, or data analysis. Data mining (the analysis step of the knowledge discovery in databases process,[1] or KDD), a relatively young and interdisciplinary field of computer science[2][3] is… … Wikipedia
Security clearance — For use by the United Nations, see Security Clearance (UN) A security clearance is a status granted to individuals allowing them access to classified information, i.e., state secrets, or to restricted areas after completion of a thorough… … Wikipedia
Payment Card Industry Data Security Standard — The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e purse, ATM, and POS cards. Defined by the Payment Card… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Cloud computing security — (sometimes referred to simply as cloud security ) is an evolving sub domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
United States Air Force Security Forces — Security Forces Badge Active As Military Police (1942 1948) … Wikipedia
United States government security breaches — This page is a timeline of published security lapses in the United States government. These lapses are frequently referenced in congressional and non governmental oversight. This article does not attempt to capture security vulnerabilities.… … Wikipedia
защита (безопасность) набора данных — Средства, обеспечивающие сохранность набора данных, в том числе защиту от случайного стир/нйя или искажения вследствие программных ошибок или неисправностей оборудования. [Е.С.Алексеев, А.А.Мячев. Англо русский толковый словарь по системотехнике… … Справочник технического переводчика
Cloud computing — logical diagram Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a… … Wikipedia