- Branche: Computer
- Number of terms: 4807
- Number of blossaries: 1
- Company Profile:
Sun Microsystems is a multinational vendor of computers, computer software and hardware, and information technology services.
A security-related system action that is audited. Events are grouped into classes. This term is used in XSCF firmware.
Industry:Computer
A security attribute that does not have the property of uniqueness and that can be shared by many principals.
Industry:Computer
A scripting element that contains a valid scripting language expression that is evaluated, converted to a String, and placed into the implicit out object.
Industry:Computer
The contract between a J2EE component and its container. The contract includes life-cycle management of the component, a context interface that the instance uses to obtain various information and services from its container, and a list of services that every container must provide for its components.
Industry:Computer
A scope over which security policies are defined and enforced by a security administrator. A security policy domain has a collection of users (or principals), uses a well-defined authentication protocol or protocols for authenticating users (or principals), and may have groups to simplify setting of security policies.
Industry:Computer
The component of a floating-point number that is multiplied by a signed power of the base to determine the value of the number. In a normalized number, the significand consists of a single nonzero digit to the left of the radix point and a fraction to the right.
Industry:Computer
The collection of data about the use of system resources. Auditing provides a record of security-related system events. This term is used in XSCF firmware.
Industry:Computer
A resource that can only be in use by at most one thread at any given time. Where several asynchronous threads are required to coordinate their access to a critical resource, they do so by synchronization mechanisms. See also mutual exclusion, mutex lock, semaphore lock, single-lock strategy, spin lock.
Industry:Computer
The code that implements the functionality of an application. In the Enterprise JavaBeans architecture, this logic is implemented by the methods of an enterprise bean.
Industry:Computer
A representation of the combination of one or more Connector components that share a single engine component for processing incoming requests.
Industry:Computer