Translation glossary: Computer Secutiry relate

Creator:
Filter
Reset
Showing entries 201-250 of 265
« Prev Next »
 
Security Features˹éÒ·Õè, ¡Åä¡, áÅФسÅѡɳТͧ hardware áÅÐ software µèÒ§æã¹Ãкº¢éÍÁÙÅÍѵâ¹ÁѵԷÕèà¡ÕèÂÇ¢éͧ¡Ñº¤ÇÒÁ»ÅÍ´ÀÑ 
English to Thai
Security Incidentà˵ءÒóìÅÐàÁÔ´¤ÇÒÁ»ÅÍ´ÀѤÍÁ¾ÔÇàµÍÃì:¡ÒáÃзÓËÃ×ÍÊÀÒ¾¡Òóìã´æ·Õèà¡ÕèÂÇ¢éͧ¡Ñº¢éÍÁÙÅÅѺ·Õè¤ÇÒÁ»ÅÍ´ÀÑÂäÁèµÃ§µÒÁ¤ÇÒÁµéͧ¡Òâͧ¼Ùéà»ç¹à¨éҢͧ àªè¹ ¡Òà co 
English to Thai
Security Label¢éÍÁÙÅ·ÕèÃкض֧ÃдѺ¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑ¢ͧÊÔè§æ˹Öè§ àªè¹ÃдѺªÑ鹤ÇÒÁÅѺ (»¡»Ô´, ÅѺ, ÅѺÁÒ¡) ÃÇÁ¶Ö§»ÃÐàÀ·¤ÇÒÁ»ÅÍ´ÀÑ·ÕèäÁèä´é¨Ñ´ÃдѺªÑé¹äÇé (àªè¹ 
English to Thai
Security LevelÃдѺ¤ÇÒÁ»ÅÍ´ÀÑÂ:¡ÒÃÃÇÁà¢éÒ´éÇ¡ѹ¢Í§¡ÒèѴªÑé¹áÅСÒèѴ»ÃÐàÀ··ÕèáÊ´§¶Ö§¢éÍÁÙÅ·Õèà»ç¹¤ÇÒÁÅѺ 
English to Thai
Security Officerà¨éÒ˹éÒ·Õè¤ÇÒÁ»ÅÍ´ÀÑÂ:à¨éÒ˹éÒ·Õèã¹ ADP ·ÕèÁÕ˹éÒ·ÕèÃѺ¼Ô´ªÍºã¹ ADP ¹Ñé¹ 
English to Thai
Security Perimeter»ÃÔÁ³±Å¤ÇÒÁ»ÅÍ´ÀÑÂ:¢Íºà¢µ«Ö觡ÒäǺ¤ØÁ¤ÇÒÁ»ÅÍ´ÀÑÂÁռźѧ¤Ñºãªé㹡Òû¡»éͧ·ÃѾÂìÊÔ¹ 
English to Thai
Security Policies¹âºÒ¤ÇÒÁ»ÅÍ´ÀÑÂ:¡®, ÃÐàºÕº, áÅСÒû¯ÔºÑµÔªØ´Ë¹Ö觫Ö觤Ǻ¤ØÁ¶Ö§¡Ò÷Õèͧ¤ì¡Ã˹Öè§ ¨Ñ´¡ÒÃ,»¡»éͧ, áÅÐᨡ¨èÒ¢éÍÁÙÅ·Õèà»ç¹¤ÇÒÁÅѺ 
English to Thai
Security Policy Modelá¼¹¹âºÒ¤ÇÒÁ»ÅÍ´ÀÑÂ:¡ÒùÓàʹÍÍÂèÒ§à»ç¹·Ò§¡Òâͧ¹âºÒ¤ÇÒÁ»ÅÍ´ÀÑ·ÕèÃкººÑ§¤Ñºãªé ¨ÐµéͧºÍ¡ãËé·ÃÒº¶Ö§¡®áÅСÒû¯ÔºÑµÔµèÒ§æãªé·Õè¤Çº¤ØÁ¡ÒèѴ¡ÒÃ, ¡ÒûéÍ 
English to Thai
Security Requirementsª¹Ô´áÅÐÃдѺ¢Í§¡Òûéͧ¡Ñ¹·Õè¨Óà»ç¹ÊÓËÃѺÍØ»¡Ã³ì,¢éÍÁÙÅ, applications, áÅÐÊÔè§ÍӹǤÇÒÁÊдǡµèÒ§æ 
English to Thai
Security ServiceºÃÔ¡Ò÷ÕèãËéâ´Â layer ˹Ö觢ͧ open system·Õè·Ó¡ÒÃÊ×èÍÊÒÃÍÂÙè «Öè§ãËéÁÕ¤ÇÒÁÁÑè¹ã¨ÇèÒÁÕ¤ÇÒÁ»ÅÍ´ÀÑÂà¾Õ§¾Íã¹ÃкºËÃ×Í㹡ÒÃâ͹¶èÒ¢éÍÁÙÅ 
English to Thai
Security Violation¡ÒÃÅèǧÅéÓ¤ÇÒÁ»ÅÍ´ÀÑÂ:¡Ò÷Õè¼ÙéãªéËÃ×ͺؤ¤ÅÍ×è¹¢éÒÁ¼èÒ¹ËÃ×ÍàÍÒª¹Ð¡ÒäǺ¤ØÁ¢Í§ÃкºãËéä´éÁÒ«Ö觡ÒÃà¢éÒ¶Ö§¢éÍÁÙÅã¹ÃкºËÃ×Í¡ÒÃà¢éÒ¶Ö§·ÃѾÂҡâͧÃкºâ´ÂäÁè 
English to Thai
ServerÃкºËÃ×Íâ»Ãá¡ÃÁ·ÕèãËéºÃÔ¡Ò÷ҧà¤Ã×Í¢èÒÂàªè¹ à¹×éÍ·Õ躹 diskáÅСÒÃâ͹¶èÒ file daemon ª¹Ô´Ë¹Ö觫Öè§ãËéºÃÔ¡ÒÃá¡è¼ÙéÃéͧ¢Í«Öè§â´ÂºèÍÂæáÅéÇ run ÍÂÙ躹à¤Ã× 
English to Thai
Signaling System 7 (SS-7)Protocol ·Õèãªéâ´ÂºÃÔÉÑ·â·ÃÈѾ·ì ÁÕ˹éÒ·Õè¾×é¹°Ò¹ ó ÍÂèÒ§¤×Í ¡ÒäǺ¤ØÁ, ¡ÒÃá¨é§àµ×͹, áÅСÒú͡·ÕèÍÂÙè (addressing)¡ÒäǺ¤ØÁà½éÒ´ÙʶҹТͧÊÒÂËÃ×Íǧ¨ÃÇ 
English to Thai
Simple Network Management Protocol (SNMP)Software·Õèãªé㹡ÒäǺ¤ØÁÍØ»¡Ã³ìÊ×èÍÊÒú¹à¤Ã×Í¢èÒ·Õèãªé TCP/IP 
English to Thai
SiteÃдѺͧ¤ì¡Ã·ÕèÁÕ¤ÇÒÁÃѺ¼Ô´ªÍºã¹à˵ءÒóìà¡ÕèÂǡѺ¤ÇÒÁ»ÅÍ´ÀѵèÒ§æ ÃдѺͧ¤ì¡Ã¢Í§¼Ùé´ÙáÅ site ËÃ×ͼÙéÁÕÍÓ¹Ò¨¼ÙéÍ×è¹·ÕèÁÕ¤ÇÒÁÃѺ¼Ô´ªÍºã¹à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍ 
English to Thai
Site Nameª×èÍ Site:Êèǹ˹Ö觢ͧ domain name ·Õè¶Ù¡µéͧ «Öè§ËÁÒ¤ÇÒÁ¶Ö§ site ˹Ö觠
English to Thai
Skipjack Algorithm¡ÒÃà¢éÒÃËÑÊÅѺ·Õè NSA ¾Ñ²¹Ò¢Öé¹ÊÓËÃѺ Clipper chipäÁèä´éÁÕ¡ÒõվÔÁ¾ìÃÒÂÅÐàÍÕ´¢Í§ algorithm ¹Õé 
English to Thai
Smurfing¡ÒÃâ¨ÁµÕà¾×èÍãËéà¡Ô´ denial of service «Ö觼Ùéâ¨ÁµÕ»ÅÍÁá»Å§ address ¢Í§ source packet ·ÕèÃéͧ¢Í¡ÒÃÊзé͹¡ÅѺẺ ICMP (ËÃ×Í ping)ãËéà»ç¹ broadcast addr 
English to Thai
Snarf¡ÒÃàÍÒÁÒ«Öè§àÍ¡ÊÒÃËÃ×Í file¢¹Ò´ãË­èà¾×èÍ·Õè¨Ð¹ÓÁÒãªéâ´Â·Õè¼Ùéáµè§ÍÒ¨¨Ð͹حҵËÃ×ÍäÁè͹حҵ 
English to Thai
Sneaker¼Ùé«Ö觶١ÇèÒ¨éÒ§ãËéºØ¡ÃØ¡à¢éÒä»ã¹·ÕèµèÒ§æà¾×èÍ·Õè¨Ð·´Êͺ¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑ¢ͧ·Õè¹Ñé¹(àËÁ×͹¡Ñº tiger team) 
English to Thai
Snifferâ»Ãá¡ÃÁ·Õèãªé´Ñ¡¨Ñº¢éÍÁÙÅ·Õè¢éÒÁ¼èÒ¹à¤Ã×Í¢èÒ¤ÍÁ¾ÔÇàµÍÃì hackerãªéâ»Ãá¡ÃÁ¹Õé㹡Òôѡ¨Ñº userid áÅÐÃËÑʼèÒ¹ :à¤Ã×èͧÁ×Í·Ò§ software ·ÕèµÃǨÊͺáÅоÔÊÙ¨¹ 
English to Thai
Special Information Operations (SIO)¡Òû¯ÔºÑµÔ¡Ò÷ҧ¢éÍÁÙÅ·ÕèÁÕ¤ÇÒÁ sensitive, ÊÒÁÒöÁռšÃзºÍÂèÒ§ãË­èËÅǧ, ÁÕ¤ÇÒÁàÊÕ觵èͤÇÒÁÁÑ蹤§¢Í§ªÒµÔ (ÊËÃÑ°Ï) ´Ñ§¹Ñ鹨֧µéͧ¡ÒÃãËéÁÕ¡ÒüèÒ¹¡Ãкǹ 
English to Thai
SPI – Secure Profile Inspectorà¤Ã×èͧÁ×Í㹡ÒÃà½éÒ´Ùà¤Ã×Í¢èÒÂÊÓËÃѺÃкº Unix ä´éÃѺ¡ÒþѲ¹Òâ´Â¡ÃзÃǧ¾Åѧ§Ò¹ (ÊËÃÑ°Ï) 
English to Thai
SpiesÊÒÂÅѺ:¼Ùéâ¨ÁµÕ·Õèâ¨ÁµÕ¤ÍÁ¾ÔÇàµÍÃìà¾×èÍãËéä´éÁÒ«Ö觢éÍÁÙÅà¾×èͼŻÃÐ⪹ì·Ò§¡ÒÃàÁ×ͧ 
English to Thai
Spoofing¡ÒÃáÊÃé§ÇèÒà»ç¹¼ÙéÍ×è¹ ¡Òêѡ¨Ù§¼ÙéãªéËÃ×Í·ÃѾÂÒ¡Ãâ´Â¨§ã¨ãËé¡ÃзÓã¹ÊÔ觷ÕèäÁè¶Ù¡µéͧ¤ÇÒÁ¾ÂÒÂÒÁ·Õè¨ÐãËéä´éÁÒ«Ö觡ÒÃà¢éÒ¶Ö§Ãкº¢éÍÁÙÅÍѵâ¹ÁѵÔâ´ÂáÊÃé§Ç 
English to Thai
SSL (Secure Sockets Layer)Protocol ã¹ session layer ·ÕèãËé¡Òà authentication áÅФÇÒÁÅѺá¡è application µèÒ§æ 
English to Thai
Steal¢âÁÂ:¡ÒùÓàÍÒà»éÒËÁÒÂä»à»ç¹¢Í§¼Ùé¢âÁÂâ´ÂäÁèÁÕ¡Ò÷Ôé§ÊÓà¹ÒäÇ麹·ÕèµÑé§à´ÔÁ 
English to Thai
Subversionà¡Ô´¢Öé¹àÁ×èͼÙéºØ¡ÃØ¡à»ÅÕè¹á»Å§¡Òû¯ÔºÑµÔ§Ò¹¢Í§µÑǵÃǨ¨Ñº¡ÒúءÃØ¡ãËéà¡Ô´ÁÕ¡ÒÃfalse negative ¢Öé¹ 
English to Thai
SYN floodàÁ×èͤÔǢͧ SYN ¶Ù¡ flood (·ÓãËéÅé¹)¡ç¨ÐäÁèÊÒÁÒöÁÕ¡ÒÃàª×èÍÁµèÍãËÁèà¡Ô´¢Öé¹ä´é 
English to Thai
Targetà»éÒËÁÒÂ:Êèǹã´Êèǹ˹Öè§ã¹¤ÍÁ¾ÔÇàµÍÃìËÃ×Íà¤Ã×Í¢èÒ ·Ñ駷Õèà»ç¹µÃá (logical) (àªè¹account, process, ¢éÍÁÙÅ) áÅзÕèà»ç¹¡ÒÂÀÒ¾ (physical) (àªè¹ componen 
English to Thai
TaxonomyÇÔ¸Õ¡ÒÃᡪÑé¹·Õèá¡ᢹ§¤ÇÒÁÃÙéÍÍ¡à»ç¹ÊèǹæáÅéÇ¡Ó˹´¤ÇÒÁÊÑÁ¾Ñ¹¸ìÃÐËÇèÒ§ÊèǹµèÒ§æÇÔ¸Õ¹Õéãªéà¾×èÍ¡ÒÃá¡áÂÐáÅзӤÇÒÁà¢éÒã¨ã¹á¢¹§¤ÇÒÁÃÙé˹Öè§æ 
English to Thai
TCP/IP – Transmission Control Protocol/Internetwork ProtocolªØ´¢Í§ protocol µèÒ§æ·Õè Internet ãªétcpwrapper 
English to Thai
Term Rule-Based Security Policy¹âºÒ¤ÇÒÁ»ÅÍ´ÀÑ·ÕèÁÕ¾×é¹°Ò¹ÍÂÙ躹¡®·Õèãªé·Ñé§ÃкºÊÓËÃѺ¼Ùéãªé·Ø¡¤¹ ¡®àËÅèÒ¹Õéâ´Â»¡µÔãªé¡ÒÃà»ÃÕºà·ÕºÃÐËÇèÒ§ÃдѺ¤ÇÒÁÅѺ¢Í§·ÃѾÂҡ÷Õè¡ÓÅѧÁÕ¡ÒÃà¢é 
English to Thai
Terminal Hijacking¡Ò÷Õè¼Ùéâ¨ÁµÕ·ÕèÍÂÙ躹à¤Ã×èͧ˹Ö觤Ǻ¤ØÁ session º¹ terminal ã´æ·Õè¡ÓÅѧ´Óà¹Ô¹ÍÂÙèhacker ·Õèâ¨ÁµÕÊÒÁÒöÊè§áÅÐÃѺ I/O ¢Í§ terminal ã¹¢³Ð·Õè¼Ùéãªé¡ÓÅѧ 
English to Thai
Terrorists¼Ùé¡èÍ¡ÒÃÃéÒÂ:¼Ùéâ¨ÁµÕ¤ÍÁ¾ÔÇàµÍÃìà¾×èÍãËéà¡Ô´¤ÇÒÁËÇÒ´¡ÅÑÇà¾×èͼŻÃÐ⪹ì·Ò§¡ÒÃàÁ×ͧTheft of Resources 
English to Thai
ThreatÀѤء¤ÒÁ:ÇÔ¸Õ«Ö觤ÇÒÁÊÒÁÒöËÃ×Íਵ¹Ò¢Í§¼Ùé¤Ø¡¤ÒÁãªé㹡ÒáèÍãËéà¡Ô´¼Å¡ÃзºÍÂèÒ§ÃéÒÂáçµèÍÃкºÍѵâ¹ÁѵÔ,ÊÔè§ÍӹǤÇÒÁÊдǡ, ËÃ×Í¡Òû¯ÔºÑµÔ¡Òà ÈÑ¡ÂÀÒ¾·Õ 
English to Thai
Threat Agent¼Ùé¤Ø¡¤ÒÁ:ÇÔ¸Õ¡ÒÃáÅÐÊÔ觵èÒ§æ·Õèãªé㹡ÒéÇÂâÍ¡Òʶ֧¤ÇÒÁÅèÍáËÅÁã¹Ãкº¢éÍÁÙÅ,¡Òû¯ÔºÑµÔ¡Ò÷ҧ¢éÍÁÙÅ, áÅÐÊÔè§ÍӹǤÇÒÁÊдǡ·Ò§¢éÍÁÙÅ ÃÇÁ¶Ö§ ÍѤ¤ÕÀÑÂ,ÀѸ 
English to Thai
Threat Assessment¡ÒûÃÐàÁÔ¹ÀѤء¤ÒÁ:¡Ãкǹ¡ÒûÃÐàÁÔ¹¤èÒÍÂèÒ§à»ç¹·Ò§¡ÒâͧÃдѺ¡Òäء¤ÒÁµèÍÃкº¢éÍÁÙÅáÅСÒÃ͸ԺÒ¶֧ÅѡɳТͧÀѤء¤ÒÁ 
English to Thai
Tigerà¤Ã×èͧÁ×Í software ·Õè scan ËҨشÍè͹¢Í§Ãкº 
English to Thai
Tiger Team¤³Ð·Ó§Ò¹¢Í§¼ÙéàªÕèÂǪҭ·Ò§¤ÍÁ¾ÔÇàµÍÃì·Õèä´éÃѺ¡ÒÃʹѺʹع¨Ò¡ÀÒ¤ÃÑ°áÅÐàÍ¡ª¹¤³Ð¹Õé¨Ð¾ÂÒÂÒÁà¨ÒÐÃкº»éͧ¡Ñ¹¢Í§¤ÍÁ¾ÔÇàµÍÃìà¾×èÍ·Õè¨ÐËÒáÅЫèÍÁÃÙÃÑèÇ·Ò§´éÒ¹¤ 
English to Thai
Toolà¤Ã×èͧÁ×Í:á¹Ç·Ò§Ë¹Ö觷Õèãªé㹡ÒéÇÂâÍ¡Òʶ֧¤ÇÒÁÅèÍáËÅÁ¢Í§à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃìËÃ×Íà¤Ã×Í¢èÒ 
English to Thai
ToolkitªØ´ software ·ÕèÁÕ script, â»Ãá¡ÃÁ, ËÃ×Í autonomous agentµèÒ§æ·Õèãªé©ÇÂâÍ¡ÒÊ㹤ÇÒÁÅèÍáËÅÁµÑÇÍÂèҧ˹Ö觢ͧ toolkit ·Õèá¾ÃèËÅÒ¤×Í toolkit ·ÕèÁÕª×èÍÇèÒ 
English to Thai
Topologyá¼¹·ÕèËÃ×Íá¼¹¼Ñ§¢Í§à¤Ã×Í¢èÒ topology ·Ò§¡ÒÂÀҾ͸ԺÒ¶֧¡ÒÃÇÒ§ÊÒ Êèǹ topology ·Ò§µÃáÐËÃ×ͷҧ俿éÒ͸ԺÒ¶֧¡ÒÃÇÔ觢ͧ¢éÍÁÙÅ 
English to Thai
Trace PacketPacket ੾ÒÐ packet ˹Ö觷Õèãªéã¹à¤Ã×Í¢èÒ packet switching àÁ×èÍ packet ¹Õéà´Ô¹·Ò§ä»¶Ö§·Õèã´ã¹à¤Ã×Í¢èÒ·Õè·Õè¹Ñ鹨еéͧÊè§ÃÒ§ҹ¶Ö§µÓá˹觢ͧ packet 
English to Thai
Traceroute¡ÒÃÊè§ trace packet à¾×èÍËÒ¢éÍÁÙÅ à»ç¹¡ÒõԴµÒÁàÊé¹·Ò§¢Í§ packet UDP ¨Ò¡ host ·ÕèÍÂÙè local ä»Âѧ host ·ÕèÍÂÙèËèÒ§ä¡Å â´Â»¡µÔáÅéÇ traceroute ¨ÐáÊ´§¶Ö§ 
English to Thai
Tranquility¡®¤ÇÒÁ»ÅÍ´ÀÑÂÃкØÇèÒÃдѺ¤ÇÒÁ»ÅÍ´ÀÑ¢ͧ active object ˹Öè§äÁèÊÒÁÒöà»ÅÕè¹ä´éã¹ÃÐËÇèÒ§ËéǧàÇÅҢͧ¡ÒÃà¡Ô´¡Ô¨¡ÃÃÁ 
English to Thai
Tripwireà¤Ã×èͧÁ×Í·Ò§ software ÊÓËÃѺ¤ÇÒÁ»ÅÍ´ÀÑ ËÅÑ¡¡Ò÷ӧҹ¾×é¹°Ò¹¤×Í·Ó§Ò¹ÃèÇÁ¡Ñº°Ò¹¢éÍÁÙÅ·Õèà¡çº¨Ó¹Ç¹ byte ¢Í§ fileäÇéáÅÐËÒ¡µÃǨÊͺä´éÇèҨӹǹ byte à»ÅÕè¹ 
English to Thai
Trojan Horseâ»Ãá¡ÃÁ·Õè´ÙàËÁ×͹ÇèÒÁÕ»ÃÐ⪹ìáÅÐäÁèÁÕਵ¹ÒÃéÒÂáµèÁÕ code «è͹ÍÂÙè«Ö觨ЪèÇÂãËéÁÕ¡ÒÃà¡çºÃǺÃÇÁ, à»Ô´à¼Â, ·ÓãËé¼Ô´¾ÅÒ´,ËÃ×Í·ÓÅÒ¢éÍÁÙÅâ´ÂäÁèä´éÃѺ͹ح 
English to Thai
Trusted Computer System Evaluation Criteria(TCSEC)Ãкº·ÕèÁÕ¡ÒÃãªéÁҵáÒÃÃѺÃͧ software áÅÐhardware ÍÂèÒ§à¾Õ§¾Í·Õè¨ÐÊÒÁÒö¹ÓÁÒãªé㹡ÒôÓà¹Ô¹¡ÃÃÁÇÔ¸Õ¢éÍÁÙÅ·Ñé§ËÅÒ·Õèà»ç¹¤ÇÒÁÅѺä´é¾ÃéÍÁæ¡Ñ¹ 
English to Thai
Trusted Computing Base(TCB)¡Åä¡¡Òû¡»éͧÃкº¤ÍÁ¾ÔÇàµÍÃìâ´Âàºç´àÊÃ稫Öè§ÃÇÁ¶Ö§ hardware,firmware, áÅÐ software â´Â¡ÒÃÃÇÁàÍÒ¡Åä¡àËÅèÒ¹Õéà¢éÒ´éÇ¡ѹ¡ç¨ÐÊ觼Ŷ֧¡Òúѧ¤Ñºãªé¹âºÒ¡Ҡ
English to Thai
« Prev Next »
All of ProZ.com
  • All of ProZ.com
  • Term search
  • Jobs
  • Forums
  • Multiple search