Subject | English | Swahili |
comp., MS | code access security | usalama wa msimbo wa ufikivu (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform) |
comp., MS | computer security | usalama wa tarakilishi (The protection of information assets through the use of technology, processes, and training) |
comp., MS | IEEE 802.1X security standard | kiwango cha usalama IEEE 802.1x (An Institute of Electrical and Electronics Engineers (IEEE) standard that defines port-based network access control which either allows or denies connection requests to IEEE 802.3 wired Ethernet networks or IEEE 802.11 wireless networks) |
comp., MS | mail-enabled universal security group | kikundi cha jumla cha usalama kilichowezeshwa barua (A group of recipients that are created to expedite the mass e-mailing of messages and other information. Unlike a mail-enabled universal distribution group, a mail-enabled USG can also be used to assign permissions. When e-mail is sent to a mail-enabled USG, all members of that group receive a copy of the message) |
comp., MS | Microsoft Safety and Security Center | Kit. cha Usalama na Ulinzi cha Microsoft (The Microsoft website of information on and resources for computer security, digital privacy, and online safety) |
comp., MS | Microsoft Safety & Security Center | Kituo cha Usalama na Ulinzi cha Microsoft (The Microsoft website of information on and resources for computer security, digital privacy, and online safety) |
comp., MS | security association | muungano wa usalama (A combination of identifiers, which together define Internet Protocol security (IPsec), that protects communication between sender and receiver) |
comp., MS | security descriptor | kifafanuzi cha usalama (A data structure that contains security information associated with a protected object. Security descriptors include information about who owns the object, who can access it and in what way, and what types of access are audited) |
comp., MS | security file | faili ya usalama (A file that contains a digital code that makes it possible to seal messages or to add a digital signature to messages. This file can be stored on a 3.5-inch disk or on your computer's hard disk) |
comp., MS | security ID | TAM usalama (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created) |
comp., MS | security identifier | kitambulisho cha usalama (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created) |
comp., MS | security label | lebo ya uthabiti (A secure e-mail feature that lets you add sensitivity labels, such as Internal Use Only, to the message header. Security labels in your organization are controlled by security policies set up by your e-mail administrator) |
comp., MS | security principal | kanuni ya usalama (In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources) |
comp., MS | Transport Layer Security | Usalama wa Tabaka ya Uchukuzi (A protocol that provides communications privacy and security between two applications communicating over a network. TLS encrypts communications and enables clients to authenticate servers and, optionally, servers to authenticate clients. TLS is a more secure version of the Secure Sockets Layer (SSL) protocol) |