Examples of using Access security in English and their translations into Russian
{-}
-
Official
-
Colloquial
Access security and segregation of duties.
Data conversion and access security.
Strengthen remote access security, with due consideration of the inter-agency context.
NOTE: It is your responsibility to maintain good access security for your email.
Access security is provided through comprehensive policy-based ACL, port security, and IP-MAC-Port binding features.
People also translate
Perform basic configuration, access security and switch setup on HP switches.
It provides a generic application programming interface for programs to access security services.
The DGS-6600 series provides not only network access security but also protection against virus and worm attacks.
The Generic Security Service Application Program Interface(GSSAPI, also GSS-API)is an application programming interface for programs to access security services.
A single centralized management system for handling access security to the resources of the IT system;
They should be able to access security company and airline information dissemination networks and airport and airline statistics.
Improved controls were required to monitor logical access security control;
UNICEF will review the final approach to strengthen remote access security adopted by the United Nations within the framework of its systems and budget availability.
The function IP-MAC-Port Binding provides a binding of IP-addresses of the source to the corresponding MAC address for a specific port number to increase access security.
In paragraph 363, the Board recommended that UNICEF strengthen remote access security, with due consideration of the inter-agency context.
Perebeinos IA- Remote Access Security System using Web-Gateway on Windows Server 2012, the Fifth International Scientific Conference of students and young scientists"Modern Information Technologies 2015.
UNICEF agreed with the Board's recommendation that it strengthen remote access security, with due consideration of the inter-agency context.
To increase access security for the vehicle data transmitted, when the ŠKODA application starts up, there will be a prompt to change the password/PIN code if the default password/PIN code has not yet been changed» page 51, Password/PIN code change.
Medium(web_mediumtrust. config)- Specifies a medium level of code access security, which means that, in addition to High Trust Level restrictions, the ASP.
On the territory of each airport, serving the international civil aviation,there are restricted access security areas, as well as the respective procedures and systems of identification of persons and vehicles.
This new infrastructure and its financial communication protocols also require highly qualified technical staff to support the uninterrupted operation of the network, access security, communications and network systems.
Information technology governance, strategic planning, access security, and contingency and business continuity planning were among the issues addressed by OIOS during the period.
EuroDIG provides aplatform to discuss and shape European multi-stakeholder perspectives on Internet governance i.e., universal access, security, privacy and openness on the Internet, critical Internet resources.
To increase the access security to the transmitted vehicle data, once the ŠKODA application has been started, you are requested to change the password/PIN code if the default password/PIN code has not yet been changed» page 51, Password/PIN code change.
The Information Technology Assistant(Applications, Security and Disaster Recovery)(Field Service) will provide the necessary expertise and technical support in managing critical applications,the information technology network, access security and policies and disaster recovery operations and plans.
To increase the access security to the transmitted vehicle data, once the ŠKODAapplication has been started, you are requested to change the password/PIN code if the default password/PIN code has not yet been changed» page 48, Password/PIN code change.
The potential drawdown of peacekeeping missions in several contexts such as in the Central African Republic, Chad and the Democratic Republic of the Congo is expected to pose further challenges to affected communities and humanitarian operations,including on access, security, protection of civilians and logistics.
The report addresses a number of key issues such as the location,public access, security, and preservation of the International Tribunal's records and has been communicated to the Working Group with a view to providing it with an informed understanding of the archive issues.
Two ICT management audits, at the Economic Commission for Europe(ECE) and the United Nations Conference on Trade and Development(UNCTAD), made similar observations, particularly in the areas of information technology(IT) governance,strategic planning, access security, and contingency and business continuity planning.
