unauthorized equipment

  • 1communications security equipment — Equipment designed to provide security to telecommunications by converting information to a form unintelligible to an unauthorized interceptor and by reconverting such information to its original form for authorized recipients, as well as… …

    Military dictionary

  • 2COMSEC equipment — is equipment designed to provide security to telecommunications (COMSEC) using cryptography.ee alsoCOMSEC Equipment designated as telecommunications security (TSEC), Joint Electronic Type Designation System, and controlled cryptographic item… …

    Wikipedia

  • 3Conficker — Common name Aliases Mal/Conficker A(Sophos) Win32/Conficker.A (CA) W32.Downadup (Symantec) W32/Downadup.A (F Secure) Conficker.A (Panda) Net Worm.Win32.Kido.bt ( …

    Wikipedia

  • 4самовольно включенное в сеть оборудование — — [Л.Г.Суменко. Англо русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.] Тематики информационные технологии в целом EN unauthorized equipment …

    Справочник технического переводчика

  • 5call restrictor —    Equipment inserted in an outgoing dial trunk that restricts calls to forbidden or unauthorized codes …

    IT glossary of terms, acronyms and abbreviations

  • 6Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …

    Universalium

  • 7Government contract — Contracting with the U.S. Government is based on many of the same principles as commercial contracting andcan be very profitable, but is sufficiently different from commercial contracting to require special care.Persons entering into commercial… …

    Wikipedia

  • 8Government procurement in the United States — is based on many of the same principles as commercial contracting, but is subject to special laws and regulation as described below. Persons entering into commercial contracts are pretty much free to do anything that they can agree on. Each… …

    Wikipedia

  • 9Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… …

    Wikipedia

  • 10Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …

    Wikipedia