- shadow security
- "теневые" ценные бумагиАкции, которые в действительности не существуют, но по которым высший руководящий персонал получает дивиденды или отложенную компенсацию.
Англо-русский словарь по инвестициям. 2014.
Англо-русский словарь по инвестициям. 2014.
Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… … Deutsch Wikipedia
Security Scan — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… … Deutsch Wikipedia
Security Test — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… … Deutsch Wikipedia
Shadow IT — is a term often used to describe IT systems and IT solutions built and used inside organizations without organizational approval. Shadow IT is by many considered an important source for innovation and such systems may turn out to be prototypes… … Wikipedia
Shadow system — is a term used in Information Services for any application relied upon for business processes that is not under the jurisdiction of a centralized Information Systems department. That is, the Information Systems department did not create it, was… … Wikipedia
Shadow — Shad ow (sh[a^]d [ o]), n. [Originally the same word as shade. [root]162. See {Shade}.] 1. Shade within defined limits; obscurity or deprivation of light, apparent on a surface, and representing the form of the body which intercepts the rays of… … The Collaborative International Dictionary of English
Shadow of death — Shadow Shad ow (sh[a^]d [ o]), n. [Originally the same word as shade. [root]162. See {Shade}.] 1. Shade within defined limits; obscurity or deprivation of light, apparent on a surface, and representing the form of the body which intercepts the… … The Collaborative International Dictionary of English
Security Support Provider Interface — (SSPI) программный интерфейс между приложениями и провайдерами безопасности. SSPI используется для отделения протоколов уровня приложения от деталей реализации сетевых протоколов безопасности и обеспечивает уровень абстракции для поддержки… … Википедия
Shadow password — In computing, Unix like operating systems use the shadow password database mechanism to increase the security level of passwords by preventing ordinary users from accessing encrypted password data.Unshadowed passwords On a system without shadowed … Wikipedia
Shadow Cabinet (Australia) March 2005 to December 2006 — The Shadow Cabinet of Australia between March 2005 and December 10 2006 was as follows.*Leader of the Opposition: Kim Beazley *Deputy Leader of the Opposition and Shadow Minister for Education, Training, Science and Research: Jenny Macklin… … Wikipedia
Shadow Cabinet (Australia) October 2004 to March 2005 — The Shadow Cabinet of Australia between October 2004 and March 2005 was as follows.*Leader of the Opposition: Mark Latham *Deputy Leader of the Opposition and Shadow Minister for Education, Training, Science and Research: Jenny Macklin *Leader of … Wikipedia