BCP - Business continuity management
Proces izrade i dorade logističkog plana koji daje smjernice kako izbjeći, ublažiti, te u slučaju najgoreg, oporaviti se, odnosno ponovno pokrenuti poslovanje, nakon kraha uzrokovanog nezgodom.
http://en.wikipedia.org/wiki/Business_continuity_planning
Proces izrade i dorade logističkog plana koji daje smjernice kako izbjeći, ublažiti, te u slučaju najgoreg, oporaviti se, odnosno ponovno pokrenuti poslovanje, nakon kraha uzrokovanog nezgodom.
BCP - Business continuity management
Process of making and improving a logistical plan which gives which gives guidelines for avoiding, alleviate, and in worst case to recover and restart business processes after a disaster.
Process of making and improving a logistical plan which gives which gives guidelines for avoiding, alleviate, and in worst case to recover and restart business processes after a disaster.
http://en.wikipedia.org/wiki/Business_continuity_planning

Bežična pristupna točka - Uređaj koji korisniku omogućuje bežični pristup računalnoj mreži
Bežična pristupna točka (engl. Wireless access point) je uređaj koji omogućuje bežičnim korisnicima (uređajima) pristup računalnoj mreži pomoću Wi-Fi, Bluetooth ili sličnih standarda. WAP se obično spaja na usmjerivač i može prenositi podatke između bežičnih uređaja i žičanih uređaja na mreži.
http://compnetworking.about.com/cs/wireless/g/bldef_ap.htm
http://en.wikipedia.org/wiki/Wireless_access_point
Bežična pristupna točka (engl. Wireless access point) je uređaj koji omogućuje bežičnim korisnicima (uređajima) pristup računalnoj mreži pomoću Wi-Fi, Bluetooth ili sličnih standarda. WAP se obično spaja na usmjerivač i može prenositi podatke između bežičnih uređaja i žičanih uređaja na mreži.
Wireless access point - Device that allows wireless user to connect to a computer network
Wireless access point (or WAP) is a device that allows wireless users (devices) to connect to a computer network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router and can relay data between the wireless devices and wired devices on the network.
Wireless access point (or WAP) is a device that allows wireless users (devices) to connect to a computer network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router and can relay data between the wireless devices and wired devices on the network.
http://compnetworking.about.com/cs/wireless/g/bldef_ap.htm
http://en.wikipedia.org/wiki/Wireless_access_point

BGP - Border Gateway protocol
Protokol usmjeravanja između autonomnih sustava (skupine mreža koje imaju jednaku politiku usmjeravanja prema drugim autonomnim sustavima).
http://www.bgp4.as/
http://osnove.tel.fer.hr/nastavnici/randic/oum/Seminar0506/BGP.pdf
Protokol usmjeravanja između autonomnih sustava (skupine mreža koje imaju jednaku politiku usmjeravanja prema drugim autonomnim sustavima).
BGP - Border Gateway protocol
Routing protocol that is used to exchange routing information between autonomous systems.
Routing protocol that is used to exchange routing information between autonomous systems.
http://www.bgp4.as/
http://osnove.tel.fer.hr/nastavnici/randic/oum/Seminar0506/BGP.pdf

Bijeli šum - Nasumičan signal konsantnom spektralnom gustoćom snage
Signal koji sadrži jednaku snagu unutar bilo kojeg frekvencijskog pojasa fiksne širine.Pojam se koristi, s ovim ili sličnim značenjem, u mnogim znanstvenim i tehničkim disciplinama, uključujući fizici, akustičnom inženjeringu, telekomunikaciji, statističkom predviđanjue.
http://www.howstuffworks.com/question47.htm
http://simplynoise.com/
Signal koji sadrži jednaku snagu unutar bilo kojeg frekvencijskog pojasa fiksne širine.Pojam se koristi, s ovim ili sličnim značenjem, u mnogim znanstvenim i tehničkim disciplinama, uključujući fizici, akustičnom inženjeringu, telekomunikaciji, statističkom predviđanjue.
White noise - A random signal with a constant power spectral density
Most commonly used to describe a signal that contains equal power within any frequency band with a fixed width. The term can be found in many scientific and technical disciplines, including physics, acoustic engineering, telecommunications, statistical forecasting, and many more.
Most commonly used to describe a signal that contains equal power within any frequency band with a fixed width. The term can be found in many scientific and technical disciplines, including physics, acoustic engineering, telecommunications, statistical forecasting, and many more.
http://www.howstuffworks.com/question47.htm
http://simplynoise.com/

BIOS - Basic Input/Output System
BIOS predstavlja dobro usvojeni standard u oblikovanju sučelja prema vlasničkim komponentama. Programska potpora je ugrađena u računalo te predstavlja prvi program koji se izvodi prilikom pokretanja. Osnovna funkcionalnost BIOS sustava je inicijalizacija i identifikacija svih uređaja u sustavu. Nakon toga, BIOS pronalazi medij koji sadrži boot loader program, te ga učitava i izvodi. Ovo je obično operacijski sustav.
http://www.wisegeek.com/what-is-bios.htm
http://www.pcekspert.com/articles/82-1.html
http://kb.iu.edu/data/ahtz.html
BIOS predstavlja dobro usvojeni standard u oblikovanju sučelja prema vlasničkim komponentama. Programska potpora je ugrađena u računalo te predstavlja prvi program koji se izvodi prilikom pokretanja. Osnovna funkcionalnost BIOS sustava je inicijalizacija i identifikacija svih uređaja u sustavu. Nakon toga, BIOS pronalazi medij koji sadrži boot loader program, te ga učitava i izvodi. Ovo je obično operacijski sustav.
BIOS - Basic Input/Output System
BIOS is a de facto standard defining a firmware interface. The BIOS software is built into the PC, and is the first code run by a PC when powered on. When the PC starts up, the first job for the BIOS is to initialize and identify system devices such as the video display card, keyboard and mouse, hard disk drive, optical disc drive and other hardware. The BIOS then locates boot loader software held on a peripheral device and executes that software. This is usually the operating system.
BIOS is a de facto standard defining a firmware interface. The BIOS software is built into the PC, and is the first code run by a PC when powered on. When the PC starts up, the first job for the BIOS is to initialize and identify system devices such as the video display card, keyboard and mouse, hard disk drive, optical disc drive and other hardware. The BIOS then locates boot loader software held on a peripheral device and executes that software. This is usually the operating system.
http://www.wisegeek.com/what-is-bios.htm
http://www.pcekspert.com/articles/82-1.html
http://kb.iu.edu/data/ahtz.html

Rođendanski napad - Kriptografski napad nad slabo raspršenim oktetima
Rođendanski napad je često korištena metoda u kriptoanalizi, a temelji se na matematičkom paradoksu koji pokazuje da ukoliko se slučajno odabere dvadeset i tri osobe, vjerojatnost da barem jedan par ima rođendan na isti dan je 50%. Ukoliko se odabere pedeset i tri ili više osoba, vjerojatnost je 99%.
http://www.javvin.com/networksecurity/BirthdayAttack.html
http://eprint.iacr.org/2008/288.pdf
Rođendanski napad je često korištena metoda u kriptoanalizi, a temelji se na matematičkom paradoksu koji pokazuje da ukoliko se slučajno odabere dvadeset i tri osobe, vjerojatnost da barem jedan par ima rođendan na isti dan je 50%. Ukoliko se odabere pedeset i tri ili više osoba, vjerojatnost je 99%.
Birthday Attack - A cryptographic attack on weekly dispersed bytes
A birthday attack refers to a class of brute-force attacks, which gets its name from the surprising result that the probability that two or more people in a group of 23 share the same birthday is greater than 1/2; such a result is called a birthday paradox. Birthday attacks are often used to find collisions of hash functions. To avoid this attack, the output length of the hash function used for a signature scheme can be chosen large enough so that the birthday attack becomes computationally infeasible.
A birthday attack refers to a class of brute-force attacks, which gets its name from the surprising result that the probability that two or more people in a group of 23 share the same birthday is greater than 1/2; such a result is called a birthday paradox. Birthday attacks are often used to find collisions of hash functions. To avoid this attack, the output length of the hash function used for a signature scheme can be chosen large enough so that the birthday attack becomes computationally infeasible.
http://www.javvin.com/networksecurity/BirthdayAttack.html
http://eprint.iacr.org/2008/288.pdf

Blowfish - Simetrični kriptografski algoritam za šifriranje blokova podataka.
Simetrični kriptografski algoritam za šifriranje blokova podataka, stvorio da je Bruce Schneier 1993. godine. Radi sa blokovima veličine 64 bita i podržava ključeve do 448 bita. Trenutno ne postoji učinkovit način razbijanja ovog algoritma, no dolaskom algoritma AES sve slabije se koristi.
http://www.webopedia.com/TERM/B/Blowfish.html
http://searchsecurity.techtarget.com/definition/Blowfish
http://www.ucertify.com/article/what-is-blowfish.html
Simetrični kriptografski algoritam za šifriranje blokova podataka, stvorio da je Bruce Schneier 1993. godine. Radi sa blokovima veličine 64 bita i podržava ključeve do 448 bita. Trenutno ne postoji učinkovit način razbijanja ovog algoritma, no dolaskom algoritma AES sve slabije se koristi.
Blowfish - A symmetric key block cipher.
Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products. Blowfish provides a good encryption rate in software and no effective cryptanalysis of it has been found to date. However, the Advanced Encryption Standard now receives more attention.
Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products. Blowfish provides a good encryption rate in software and no effective cryptanalysis of it has been found to date. However, the Advanced Encryption Standard now receives more attention.
http://www.webopedia.com/TERM/B/Blowfish.html
http://searchsecurity.techtarget.com/definition/Blowfish
http://www.ucertify.com/article/what-is-blowfish.html

Bluetooth - Bežični protokol za razmjenu podataka
Bluetooth je otvoreni bežični protokol za razmjenu podataka između različitih digitalnih uređaja na malim udaljenostima (do 10 metara). Za prijenos se koristi ISM (Industrial-Scientific-Medicine) nelicencirani frekvencijski pojas raspona od 2.4 GHz do 2.4835 GHz.
static.vip.hr/vipnet3/web/upload/resources/302426_Bluetooth.htm
Bluetooth je otvoreni bežični protokol za razmjenu podataka između različitih digitalnih uređaja na malim udaljenostima (do 10 metara). Za prijenos se koristi ISM (Industrial-Scientific-Medicine) nelicencirani frekvencijski pojas raspona od 2.4 GHz do 2.4835 GHz.
Bluetooth - Wireless standard for data exchanging
Bluetooth is a proprietary open wireless technology standard for exchanging data between digital devices over short distances (up to 10 meters). It uses ISM (Industrial-Scientific-Medicine) unlicensed frequency band in the range 2.4 - 2.4835 GHz.
Bluetooth is a proprietary open wireless technology standard for exchanging data between digital devices over short distances (up to 10 meters). It uses ISM (Industrial-Scientific-Medicine) unlicensed frequency band in the range 2.4 - 2.4835 GHz.
static.vip.hr/vipnet3/web/upload/resources/302426_Bluetooth.htm

Boot sektor - Prvi sektor medija za pohranu podatak
Boot sektor je prvi sektor medija za pohranu podataka koja sadrži programski kod za pokretanje programa. Ovo je obično operacijski sustav, ali i drugi sustavi mogu doći u obzir ukoliko nude mogućnosti upravljanja računala.
http://www.webopedia.com/TERM/M/MBR.html
Boot sektor je prvi sektor medija za pohranu podataka koja sadrži programski kod za pokretanje programa. Ovo je obično operacijski sustav, ali i drugi sustavi mogu doći u obzir ukoliko nude mogućnosti upravljanja računala.
Boot sector - The first sector of a disk
A boot sector or boot block is a region of a data storage device that contains machine code to be loaded into random-access memory (RAM) by a computer system's built-in firmware. The purpose of a boot sector is to allow the boot process of a computer to load a program stored on the same storage device.
A boot sector or boot block is a region of a data storage device that contains machine code to be loaded into random-access memory (RAM) by a computer system's built-in firmware. The purpose of a boot sector is to allow the boot process of a computer to load a program stored on the same storage device.
http://www.webopedia.com/TERM/M/MBR.html

Brute-force napad - Napad grubom silom
U kriptografiji napad grubom silom podrazumijeva strategiju pronalaska tajnog ključa ili lozinke koja se, u teoriji, može iskoristiti protiv svakog kriptografskog algoritma. Podrazumijeva sistematično isprobavanje svih mogućih ključeva ili lozinki dok se ne otkrije ispravan. U najgorem slučaju mora se proći kroz cijeli prostor ključeva.
http://www.computerhope.com/jargon/b/brutforc.htm
http://www.imperva.com/resources/glossary/brute_force.html
https://www.owasp.org/index.php/Brute_force_attack
U kriptografiji napad grubom silom podrazumijeva strategiju pronalaska tajnog ključa ili lozinke koja se, u teoriji, može iskoristiti protiv svakog kriptografskog algoritma. Podrazumijeva sistematično isprobavanje svih mogućih ključeva ili lozinki dok se ne otkrije ispravan. U najgorem slučaju mora se proći kroz cijeli prostor ključeva.
Brute-force Attack - Exhaustive key search
In cryptography, a brute-force attack or exhaustive key search is a strategy that can in theory be used against any encrypted data by an attacker who is unable to take advantage of any weakness in an encryption system that would otherwise make his/her task easier. It involves systematically checking all possible keys until the correct key is found. In the worst case, this would involve traversing the entire search space.
In cryptography, a brute-force attack or exhaustive key search is a strategy that can in theory be used against any encrypted data by an attacker who is unable to take advantage of any weakness in an encryption system that would otherwise make his/her task easier. It involves systematically checking all possible keys until the correct key is found. In the worst case, this would involve traversing the entire search space.
http://www.computerhope.com/jargon/b/brutforc.htm
http://www.imperva.com/resources/glossary/brute_force.html
https://www.owasp.org/index.php/Brute_force_attack

Prepisivanje memorije - Napad prepisivanjem memorije
U programskom i sigurnosnom inženjerstvu označava anomaliju u kojoj program prepisuje određeni dio memorije kojemu inače ne bi trebao pristupiti. Prepisivanje memorije se može pokrenuti sa posebno stvorenim korisničkim unosom koji je stvoren za izvođenje programskog koda ili promjenu toka izvođenja programa. Iz tog razloga se smatra jednim od osnovnih izvora ranjivosti računalnih programa.
http://os2.zemris.fer.hr/ns/malware/2007_klaric/buffer_overflow.html
http://searchsecurity.techtarget.com/definition/buffer-overflow
https://www.owasp.org/index.php/Buffer_Overflow
U programskom i sigurnosnom inženjerstvu označava anomaliju u kojoj program prepisuje određeni dio memorije kojemu inače ne bi trebao pristupiti. Prepisivanje memorije se može pokrenuti sa posebno stvorenim korisničkim unosom koji je stvoren za izvođenje programskog koda ili promjenu toka izvođenja programa. Iz tog razloga se smatra jednim od osnovnih izvora ranjivosti računalnih programa.
Buffer overflow - Buffer overflow attack
In computer security and programming, a buffer overflow is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program operates. They are thus the basis of many software vulnerabilities and can be maliciously exploited.
In computer security and programming, a buffer overflow is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program operates. They are thus the basis of many software vulnerabilities and can be maliciously exploited.
http://os2.zemris.fer.hr/ns/malware/2007_klaric/buffer_overflow.html
http://searchsecurity.techtarget.com/definition/buffer-overflow
https://www.owasp.org/index.php/Buffer_Overflow

Broj pojmova u bazi: 237 |
Uzorci za traženje u bazi: 360 |
Posljednja izmjena: 10.05.2016. 16:24 |
Online posjetitelja: 9 (0 korisnika)
| 1.0.0