Скачать книгу
Access Points
PC
|
Personal Computer
|
PCB
|
Process Control Block
|
PDT
|
Performance Degradation Time
|
PDP
|
Policy Decision Points
|
PEP
|
Policy Enforcement Points
|
PKI
|
Public Key Infrastructure
|
PMC
|
Performance Monitoring Counters
|
POR
|
Proof of Retrievability
|
POC
|
Proof of Concept
|
PPW
|
Performance Per Watt
|
PUE
|
Power Usage Effectiveness
|
PVM
|
Parallel Virtual Machine
|
PV
|
Public Verifiability
|
QoS
|
Quality of Service
|
RaaS
|
Resources as a Service
|
RBAC
|
Role-Based Access Control
|
RDBMS
|
Relationship Database Management System
|
RDPC
|
Remote Data Processing Scheme
|
RDS
|
Relational Database System
|
RED
|
Random Early Detection
|
RLE
|
Run-Length Encoding
|
RPC
|
Remote Procedure Call Protocol
|
RPM
|
Red Hat Package Manager
|
RSA
|
Rivest–Shamir–Adleman
|
RTT
|
Round-Trip Time
|
S3
|
Simple Storage Service
|
SAN
|
Storage Area Network
|
SaaS
|
Software as a Service
|
SAML
|
Security Assertion Markup Language
|
SC
|
Storage Controller
|
SDN
|
Software-Defined Networks
|
SECaaS
|
Security as a Service
|
SEaaS
|
Sensor Event as a Service
|
SFI
|
Software Fault Isolation
|
SIEM
|
Security Information and Event Management
|
SLA
|
Service-Level Agreements
|
SMC
|
Secure Multi-Party Computation
|
SME
|
Small Medium Enterprise
|
SMP
|
Symmetric Multi-Processing
|
SOAP
|
Simple Object Access Protocol
|
SOA
|
Service-Oriented Architecture
|
SPT
|
Shadow Page Table
|
SQL
|
Structured Query Language
|
SSC
|
SQL Server Compact
|
SSH
|
Password-Based Auth
|
SSI
|
Single System Image
|
STP
|
Spanning Tree Protocol
|
TCSEC
|
Trusted Computer System Evaluation Criteria
|
TDS
|
Tabular Data Stream
|
TPA
|
Third-Party Auditor
|
TPAS
|
Third-Party Auditing Service
|
TPM
|
Trusted Platform Module
|
TTP
|
Trusted Third Party
|
TCG
|
Trusted Computing Group
|
TCP/IP
|
Transmission Control Protocol/Internet Protocol
|
UDB
|
User Database
|
UFS
|
User-Facing Service
|
VDCs
|
Virtual Data Centers
|
VDI
|
Virtual Desktop Infrastructure
|
VEE
|
Virtual Environment Extension
|
VLAN
|
Virtual Local Area Network
|
VLB
|
Valiant Load Balancing
|
VM
|
Virtual Machine
|
VMLM
|
Virtual Machine Live Migration
|
VMM
|
Virtual Machine Migration
|
VO
|
Virtual Organization
|
VPC
|
Virtual Predict Checkpointing
|
VPN
|
Virtual Private Network
|
WaaS
|
Workflow as a Service
|
Скачать книгу
|