| podobné slovo | definícia |
vitamin a1 (encz) | vitamin A1, n: |
bignonia1 (gcide) | Bignonia \Big*no"ni*a\, prop. n. [Named from the Abb['e]
Bignon.]
1. (Bot.) A large genus of American, mostly tropical,
climbing shrubs, having compound leaves and showy somewhat
tubular flowers. Bignonia capreolata is the cross vine
of the Southern United States. The trumpet creeper (also
called the trumpet vine), with large red tubular flowers,
was formerly considered to be of this genus, but is now
classified as Campsis radicans.
[1913 Webster +PJC]
2. any member of the family Bignoniaceae, including the
bignonia[1], catalpa, trumpet creeper, and {princess
tree}. They typically have brightly colored tubular
(trumpet-shaped) flowers.
[PJC] |
vitamin A1 (gcide) | Retinol \Ret"i*nol\, n. [Gr. ??? resin + L. oleum oil.]
1. (Chem.) A hydrocarbon oil C32H16, obtained by the
distillation of resin, -- used as a solvent, as an
antiseptic, and in printer's ink.
[1913 Webster +PJC]
2. One of the compounds which function as vitamin A. Called
also vitamin A, vitamin A1 and vitamin A alcohol.
See vitamin A1.
[PJC]vitamin A1 \vitamin A1\ n.
retinol (C20H30O), one of the substances also called
vitamin A. It is also called more specifically {vitamin A
alcohol}. It is a required factor for human nutrition. The
USP unit of activity is equal to 0.30 micrograms of retinol.
Syn: retinol.
[WordNet 1.5 +PJC] |
vitamin a1 (wn) | vitamin A1
n 1: an unsaturated alcohol that occurs in marine fish-liver
oils and is synthesized biologically from carotene [syn:
vitamin A1, retinol] |
a1 security (foldoc) | Orange Book
A1 security
B1 security
B2 security
B3 security
C1 security
C2 security
A standard from the US Government
National Computer Security Council (an arm of the
U.S. National Security Agency), "Trusted Computer System
Evaluation Criteria, DOD standard 5200.28-STD, December 1985"
which defines criteria for trusted computer products. There
are four levels, A, B, C, and D. Each level adds more
features and requirements.
D is a non-secure system.
C1 requires user log-on, but allows group ID.
C2 requires individual log-on with password and an audit
mechanism. (Most Unix implementations are roughly C1, and
can be upgraded to about C2 without excessive pain).
Levels B and A provide mandatory control. Access is based on
standard Department of Defense clearances.
B1 requires DOD clearance levels.
B2 guarantees the path between the user and the security
system and provides assurances that the system can be tested
and clearances cannot be downgraded.
B3 requires that the system is characterised by a mathematical
model that must be viable.
A1 requires a system characterized by a mathematical model
that can be proven.
See also crayola books, book titles.
[Jargon File]
(1997-01-09)
|
da11 (vera) | DA11
DatenAustauschphase 11 [allgemeine bauabrechnung] (GAEB)
|
itesfa1ehs (vera) | ITESFA1EHS
Information Technology Enterprise Solutions - Function Area 1 -
Enterprise Hardware Solutions (mil., USA), "ITES-FA1-EHS"
|
sha1 (vera) | SHA1
Secure Hash Algorithm 1 (cryptography, SHA, RFC 3174)
|
|