MAC protokol - Komunikacijski protokol za pristup mediju
Media Access Control (MAC) je protokol za komunikaciju podacima, također poznat kao Medium Access Control protokol (protokol upravljanja pristupom mediju). On omogućuje mehanizme adresiranja i kontrole pristupa kanalima koji služe za komunikaciju terminala, odnosno čvorišta, s mrežom koja ima više pristupnih točaka.
http://ahyco.ffri.hr/ritehmreze/teme/mac.htm
http://www.dce.fe.untz.ba/MAC%20LAYER.pdf
Media Access Control (MAC) je protokol za komunikaciju podacima, također poznat kao Medium Access Control protokol (protokol upravljanja pristupom mediju). On omogućuje mehanizme adresiranja i kontrole pristupa kanalima koji služe za komunikaciju terminala, odnosno čvorišta, s mrežom koja ima više pristupnih točaka.
MAC protocol - Media access control communication protocol
Media Access Control (MAC) is a data communication protocol, also known as the Medium Access Control protocol. It provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multi-point network.
Media Access Control (MAC) is a data communication protocol, also known as the Medium Access Control protocol. It provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multi-point network.
http://ahyco.ffri.hr/ritehmreze/teme/mac.htm
http://www.dce.fe.untz.ba/MAC%20LAYER.pdf

Zlonamjerni program - Programi namijenjeni ugrožavanju računalnog sustava
Zlonamjerni programi (eng. malware) su programi (mogu biti i skripte i kodovi) namijenjeni ometanju operacija u računalu, prikupljanju osjetljivih informacija ili dobivanju neovlaštenog pristupa računalnim sustavima. To je općenit naziv koji se koristi za sve vrste programa ili koda koji su namijenjeni zlonamjernom iskorištavanju računala i podataka u njemu bez korisnikova znanja.
www.wisegeek.com/what-is-a-malware-virus.htm
Zlonamjerni programi (eng. malware) su programi (mogu biti i skripte i kodovi) namijenjeni ometanju operacija u računalu, prikupljanju osjetljivih informacija ili dobivanju neovlaštenog pristupa računalnim sustavima. To je općenit naziv koji se koristi za sve vrste programa ili koda koji su namijenjeni zlonamjernom iskorištavanju računala i podataka u njemu bez korisnikova znanja.
Malware - Software designed to disrupt computer systems
Malware is software (or script or code) designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems. It is a general term used to describe any kind of software or code specifically designed to exploit a computer, or the data it contains, without consent.
Malware is software (or script or code) designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems. It is a general term used to describe any kind of software or code specifically designed to exploit a computer, or the data it contains, without consent.
www.wisegeek.com/what-is-a-malware-virus.htm

MARS - MARS algoritam
Blokovski algoritam za šifriranje podataka koji je organizacija IBM razvila s ciljem da postane AES standard. Koristi blokove veličine 128 bita i ključeve od 128-448 bita. Razlikuje se od ostalih blokovskih algoritama svojom heterogenom strukturom.
http://cryptography.wikia.com/wiki/MARS_%28cryptography%29
http://www.encryptfiles.net/encryption/algorithm/mars.php
Blokovski algoritam za šifriranje podataka koji je organizacija IBM razvila s ciljem da postane AES standard. Koristi blokove veličine 128 bita i ključeve od 128-448 bita. Razlikuje se od ostalih blokovskih algoritama svojom heterogenom strukturom.
MARS - MARS algorithm
MARS is a block cipher that was IBM's submission to the Advanced Encryption Standard process. It has a 128-bit block size and a variable key size of between 128 and 448 bits (in 32-bit increments). Unlike most block ciphers, MARS has a heterogeneous structure: several rounds of a cryptographic core are "jacketed" by unkeyed mixing rounds, together with key whitening.
MARS is a block cipher that was IBM's submission to the Advanced Encryption Standard process. It has a 128-bit block size and a variable key size of between 128 and 448 bits (in 32-bit increments). Unlike most block ciphers, MARS has a heterogeneous structure: several rounds of a cryptographic core are "jacketed" by unkeyed mixing rounds, together with key whitening.
http://cryptography.wikia.com/wiki/MARS_%28cryptography%29
http://www.encryptfiles.net/encryption/algorithm/mars.php

MBR - Master Boot Record
Prvi sektor na disku (često nazvan sektor 0), nosi naziv MBR (engl. Master Boot Record) i koristi se za pokretanje računala. Na kraju zapisa MBR nalazi se popis particija. Točnije, za svaku particiju na disku se pamti njezina početna i krajnja adresa. Samo jedna od tih particija je aktivna i ona se koristi kod pokretanja.
http://www.easeus.com/resource/mbr.htm
http://www.dewassoc.com/kbase/hard_drives/master_boot_record.htm
Prvi sektor na disku (često nazvan sektor 0), nosi naziv MBR (engl. Master Boot Record) i koristi se za pokretanje računala. Na kraju zapisa MBR nalazi se popis particija. Točnije, za svaku particiju na disku se pamti njezina početna i krajnja adresa. Samo jedna od tih particija je aktivna i ona se koristi kod pokretanja.
MBR - Master Boot Record
The first sector of a disk is called the master boot record, and it contains a list of all the partitions of the disk it belongs to. The master boot record keeps the addresses of each partition on the disk. Only one of the partition may be defined as active, and this partition is used to boot the computer.
The first sector of a disk is called the master boot record, and it contains a list of all the partitions of the disk it belongs to. The master boot record keeps the addresses of each partition on the disk. Only one of the partition may be defined as active, and this partition is used to boot the computer.
http://www.easeus.com/resource/mbr.htm
http://www.dewassoc.com/kbase/hard_drives/master_boot_record.htm

MD5 - Message-Digest 5 algoritam
Jedan od najpopularnijnih hashing algoritama, korišten za generiranje sažetaka poruka. Kao izlaz daje 128-bitni sažetak dobiven miješanjem 512-bitnih blokova.
http://os2.zemris.fer.hr/algoritmi/hash/2002_fabris/index.htm
http://www.gohacking.com/2010/01/what-is-md5-hash-and-how-to-use-it.html
Jedan od najpopularnijnih hashing algoritama, korišten za generiranje sažetaka poruka. Kao izlaz daje 128-bitni sažetak dobiven miješanjem 512-bitnih blokova.
MD5 - Message-Digest 5 Algorithm
he MD5 Message-Digest Algorithm is a widely used cryptographic hash function with a 128-bit (16-byte) hash value. Specified in RFC 1321, MD5 has been employed in a wide variety of security applications, and is also commonly used to check data integrity. However, it has been shown that MD5 is not collision resistant.
he MD5 Message-Digest Algorithm is a widely used cryptographic hash function with a 128-bit (16-byte) hash value. Specified in RFC 1321, MD5 has been employed in a wide variety of security applications, and is also commonly used to check data integrity. However, it has been shown that MD5 is not collision resistant.
http://os2.zemris.fer.hr/algoritmi/hash/2002_fabris/index.htm
http://www.gohacking.com/2010/01/what-is-md5-hash-and-how-to-use-it.html

MESH mreža - Tip topologije računalnih mreža
MESH mreža je vrsta računalne mrežne topologije u kojoj svaki čvor služi ne samo za dohvat i prijenos vlastitih podataka, već i kao posrednik za druge čvorove pri prijenosu podataka mrežom.
http://www.wisegeek.com/what-is-a-mesh-network.htm
http://en.wikipedia.org/wiki/Mesh_networking
http://itsec.rwth-aachen.de/files/andre/talk_sick10.pdf
MESH mreža je vrsta računalne mrežne topologije u kojoj svaki čvor služi ne samo za dohvat i prijenos vlastitih podataka, već i kao posrednik za druge čvorove pri prijenosu podataka mrežom.
MESH network - Type of network topology
MESH network is a type of computer network topology where each node must not only capture and disseminate its own data, but also serve as a relay for other nodes to propagate the data in the network.
MESH network is a type of computer network topology where each node must not only capture and disseminate its own data, but also serve as a relay for other nodes to propagate the data in the network.
http://www.wisegeek.com/what-is-a-mesh-network.htm
http://en.wikipedia.org/wiki/Mesh_networking
http://itsec.rwth-aachen.de/files/andre/talk_sick10.pdf

Miller–Rabin algoritam - Miller–Rabin algoritam za provjeru prostih brojeva
Algoritam koji se koristi prilikom proizvodnje prostih brojeva za kriptografske algoritme. Koristi se za provjeru velikih prostih brojeva, odnosno, je li broj prost ili nije. Algoritam su razvili Gary L- Miller i Michael O. Rabin.
http://mathworld.wolfram.com/Rabin-MillerStrongPseudoprimeTest.html
http://rosettacode.org/wiki/Miller-Rabin_primality_test
http://www.math.uic.edu/~marker/math435/rm.pdf
Algoritam koji se koristi prilikom proizvodnje prostih brojeva za kriptografske algoritme. Koristi se za provjeru velikih prostih brojeva, odnosno, je li broj prost ili nije. Algoritam su razvili Gary L- Miller i Michael O. Rabin.
Miller–Rabin algorithm - Miller–Rabin primality test
Rabin–Miller primality test is a primality test: an algorithm which determines whether a given number is prime. Its original version, due to Gary L. Miller, is deterministic, but the determinism relies on the unproven generalized Riemann hypothesis, Michael O. Rabin modified it to obtain an unconditional probabilistic algorithm.
Rabin–Miller primality test is a primality test: an algorithm which determines whether a given number is prime. Its original version, due to Gary L. Miller, is deterministic, but the determinism relies on the unproven generalized Riemann hypothesis, Michael O. Rabin modified it to obtain an unconditional probabilistic algorithm.
http://mathworld.wolfram.com/Rabin-MillerStrongPseudoprimeTest.html
http://rosettacode.org/wiki/Miller-Rabin_primality_test
http://www.math.uic.edu/~marker/math435/rm.pdf

MITM napad - Napad ubacivanjem posrednika
Napad na sigurnost pri kojem se zlonamjerni napadač umiješa u komunikaciju na način da se postavi između sugovornika te čita i izmjenjuje poruke.
https://www.owasp.org/index.php/Man-in-the-middle_attack
http://www.bsacybersafety.com/threat/man-in-the-middle.cfm
http://www.ethicalhacker.net/content/view/182/1/
Napad na sigurnost pri kojem se zlonamjerni napadač umiješa u komunikaciju na način da se postavi između sugovornika te čita i izmjenjuje poruke.
MITM attack - Man-in-the-middle attack
The man-in-the-middle attack is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances.
The man-in-the-middle attack is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances.
https://www.owasp.org/index.php/Man-in-the-middle_attack
http://www.bsacybersafety.com/threat/man-in-the-middle.cfm
http://www.ethicalhacker.net/content/view/182/1/

MTDL - Najveći dozvoljen gubitak podataka.
Najveća dozvoljena količina izgubljenih poslovnih podataka nakon prekida poslovnih procesa. Procjenjuje se sa pretpostavkom da bi gubitak veći od MTDL-a ozbiljno narušio mogućnost oporavka poslovanja tvrtke.
http://www.webopedia.com/TERM/M/MTDL.html
Najveća dozvoljena količina izgubljenih poslovnih podataka nakon prekida poslovnih procesa. Procjenjuje se sa pretpostavkom da bi gubitak veći od MTDL-a ozbiljno narušio mogućnost oporavka poslovanja tvrtke.
MTDL - Maximum Tolerable Data Loss
Maximum amount of business data allowed to be lost after a business process disruption. It is estimated with an assumption that a loss higher than MTDL would seriously hinder the ability of recovering a business.
Maximum amount of business data allowed to be lost after a business process disruption. It is estimated with an assumption that a loss higher than MTDL would seriously hinder the ability of recovering a business.
http://www.webopedia.com/TERM/M/MTDL.html

MTPD - Vremenski period dozvoljen za ponovno uspostavljanje određenog procesa
Najduži vremenski period dozvoljen za ponovno uspostavljanje (engl. Maximum Tolerable Period of Disruption) poslovnih procesa nakon nezgode. Donosi se sa pretpostavkom da bi više utrošenog vremena na ponovno pokretanje poslovanja ozbiljno ugrozilo mogućnost nastavka poslovanja.
http://www.continuitycentral.com/feature0675.html
http://searchdisasterrecovery.techtarget.com/definition/Maximum-tolerable-period-of-disruption-MTPOD
Najduži vremenski period dozvoljen za ponovno uspostavljanje (engl. Maximum Tolerable Period of Disruption) poslovnih procesa nakon nezgode. Donosi se sa pretpostavkom da bi više utrošenog vremena na ponovno pokretanje poslovanja ozbiljno ugrozilo mogućnost nastavka poslovanja.
MTPD - Maximum Tolerable Period of Disruption
The longest period of time allowed for restarting a business process after a disaster. It is estimated with the assumption that more time used for restarting a business would seriously hinder the chances of staying in business.
The longest period of time allowed for restarting a business process after a disaster. It is estimated with the assumption that more time used for restarting a business would seriously hinder the chances of staying in business.
http://www.continuitycentral.com/feature0675.html
http://searchdisasterrecovery.techtarget.com/definition/Maximum-tolerable-period-of-disruption-MTPOD

Višefaktorska autentifikacija - Autentifikacijska metoda
Višefaktorska autentifikacija je proces kod kojeg se koristi više različitih faktora autentikacije (lozinka, korisničko ime, digitalni žig, digitalni certifikat,...).
http://en.wikipedia.org/wiki/Two-factor_authentication
Višefaktorska autentifikacija je proces kod kojeg se koristi više različitih faktora autentikacije (lozinka, korisničko ime, digitalni žig, digitalni certifikat,...).
Multifactorial authentication - Authentication method
Multifactorial (or two-factor) authentication is a process in which is used more different factors of authentication (password, username, digital stamp, digital certificate,...).
Multifactorial (or two-factor) authentication is a process in which is used more different factors of authentication (password, username, digital stamp, digital certificate,...).
http://en.wikipedia.org/wiki/Two-factor_authentication

MVC - Model-View-Controller
Arhitektonski oblikovni obrazac, odnosno arhitektura izrade programske potpore, koja omogućuje raslojavanje poslovne, podatkovne i prezentacijske logike. Točnije, odvaja kod koji reprezentira problem domene od koda koji prezentira problem korisniku (grafičko sučelje). MVC znatno utječe na organiziranost i čitljivost programskog koda te je postao standard u pisanju modernih web aplikacija.
http://en.wikipedia.org/wiki/Model%E2%80%93view%E2%80%93controller http://csis.pace.edu/~bergin/mvc/mvcgui.html http://msdn.microsoft.com/en-us/library/ff649643.aspx
http://www.enode.com/x/markup/tutorial/mvc.html
Arhitektonski oblikovni obrazac, odnosno arhitektura izrade programske potpore, koja omogućuje raslojavanje poslovne, podatkovne i prezentacijske logike. Točnije, odvaja kod koji reprezentira problem domene od koda koji prezentira problem korisniku (grafičko sučelje). MVC znatno utječe na organiziranost i čitljivost programskog koda te je postao standard u pisanju modernih web aplikacija.
MVC - Model-View-Controller
A software architecture, currently considered an architectural pattern used in software engineering. Model-View-Controller is a fundamental design pattern for the separation of user interface logic from business logic. IT has become a standard for building complex web applications.
A software architecture, currently considered an architectural pattern used in software engineering. Model-View-Controller is a fundamental design pattern for the separation of user interface logic from business logic. IT has become a standard for building complex web applications.
http://en.wikipedia.org/wiki/Model%E2%80%93view%E2%80%93controller http://csis.pace.edu/~bergin/mvc/mvcgui.html http://msdn.microsoft.com/en-us/library/ff649643.aspx
http://www.enode.com/x/markup/tutorial/mvc.html

Broj pojmova u bazi: 237 |
Uzorci za traženje u bazi: 360 |
Posljednja izmjena: 10.05.2016. 16:24 |
Online posjetitelja: 5 (0 korisnika)
| 1.0.0