- technical vulnerability
- степень аппаратной защищенности
English-Russian dictionary of telecommunications and their abbreviations. A.V. Alexandrov.. 2004.
English-Russian dictionary of telecommunications and their abbreviations. A.V. Alexandrov.. 2004.
Vulnerability and Risk Committee — The Vulnerability and Risk Committee, or VRC, is one of the four technical committees within the Council on Disaster Reduction of the American Society of Civil Engineers. Purpose The purpose of the Vulnerability and Risk Committee is to develop… … Wikipedia
Information Assurance Vulnerability Alert — An Information Assurance Vulnerability Alert (IAVA) is an announcement of a computer application software or operating system vulnerability notification in the form of alerts, bulletins, and technical advisories identified by DoD CERT, a division … Wikipedia
Windows Metafile vulnerability — The Windows Metafile vulnerability is a security vulnerability in Microsoft Windows NT based operating systems which has been used in a variety of exploits since late December 2005. The vulnerability was first discussed in the computer security… … Wikipedia
Defense Technical Information Center — Department overview Headquarters Fort Belvoir, Virginia … Wikipedia
Security Technical Implementation Guide — A Security Technical Implementation Guide or STIG is a methodology for standardized secure installation and maintenance of computer software and hardware. The term was coined by DISA who creates configuration documents in support of the United… … Wikipedia
Joint Technical Coordinating Group for Munitions Effectiveness — A Joint Staff level organization tasked to produce generic target vulnerability and weaponeering studies. The special operations working group is a subordinate organization specializing in studies for special operations. Also called JTCG ME … Military dictionary
CSTVRP — Computer Security Technical Vulnerability Reporting Program (Governmental » Military) … Abbreviations dictionary
Effects of global warming — This article is about (primarily) effects during the 21st century. For longer term effects, see Long term effects of global warming. The variou … Wikipedia
Conficker — Common name Aliases Mal/Conficker A(Sophos) Win32/Conficker.A (CA) W32.Downadup (Symantec) W32/Downadup.A (F Secure) Conficker.A (Panda) Net Worm.Win32.Kido.bt ( … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
SQL injection — A SQL injection is often used to attack the security of a website by inputting SQL statements in a web form to get a badly designed website in order to dump the database content to the attacker. SQL injection is a code injection technique that… … Wikipedia