Скачать книгу
Multi-Factor Authentication
|
MiTM
|
Man-in-the-Middle Attack
|
MP
|
Microprocessor
|
MPI
|
Message Passing Interface
|
MPLS
|
Multi-Protocol Label Switching
|
MSN
|
Mobile Social Networking
|
MVCC
|
Multi-Version Concurrency Control
|
NAS
|
Network-Attached Storage
|
NAC
|
Network Access Control
|
NC
|
Node Controller
|
NFS
|
Network File Server
|
NSF
|
National Science Foundation
|
NSFC
|
National Natural Science Foundation of China
|
NIPS
|
Network Intrusion Prevention System
|
NIC
|
Network Interface Controller
|
NoSQL
|
Not-only-SQL
|
NOW
|
Networks of Workstations
|
NICs
|
Network Interface Cards
|
NRDC
|
Natural Resources Defense Council
|
OCR
|
Optical Character Recognition
|
OLTP
|
Online Transaction Processing
|
ONF
|
Open Networking Foundation
|
OS
|
Operating System
|
OSG
|
Object Storage Gateway
|
OSP
|
Object Storage Provider
|
OVS
|
Open vSwitch
|
P2P
|
Peer-to-Peer
|
PaaS
|
Platform as a Service
|
PAP
|
Policy Access Points
|
PC
|
Personal Computer
|
PCB
|
Process Control Block
|
PDT
|
Performance Degradation Time
|
PDP
|
Policy Decision Points
|
PEP
|
Policy Enforcement Points
|
PKI
|
Public Key Infrastructure
|
PMC
|
Performance Monitoring Counters
|
POR
|
Proof of Retrievability
|
POC
|
Proof of Concept
|
PPW
|
Performance Per Watt
|
PUE
|
Power Usage Effectiveness
|
PVM
|
Parallel Virtual Machine
|
PV
|
Public Verifiability
|
QoS
|
Quality of Service
|
RaaS
|
Resources as a Service
|
RBAC
|
Role-Based Access Control
|
RDBMS
|
Relationship Database Management System
|
RDPC
|
Remote Data Processing Scheme
|
RDS
|
Relational Database System
|
RED
|
Random Early Detection
|
RLE
|
Run-Length Encoding
|
RPC
|
Remote Procedure Call Protocol
|
RPM
|
Red Hat Package Manager
|
RSA
|
Rivest–Shamir–Adleman
|
RTT
|
Round-Trip Time
|
S3
|
Simple Storage Service
|
SAN
|
Storage Area Network
|
SaaS
|
Software as a Service
|
SAML
|
Security Assertion Markup Language
|
SC
|
Storage Controller
|
SDN
|
Software-Defined Networks
|
SECaaS
|
Security as a Service
|
SEaaS
|
Sensor Event as a Service
|
SFI
|
Software Fault Isolation
|
SIEM
|
Security Information and Event Management
|
SLA
|
Service-Level Agreements
|
SMC
|
Secure Multi-Party Computation
|
SME
|
Small Medium Enterprise
|
SMP
|
Symmetric Multi-Processing
|
SOAP
|
Simple Object Access Protocol
|
SOA
|
Service-Oriented Architecture
|
Скачать книгу