- isolation attack
- наступательные действия [удар] с целью изоляции противника (напр. в районе, населенном пункте)
English-Russian military dictionary. 2014.
English-Russian military dictionary. 2014.
Attack therapy — is a controversial type of psychotherapy evolved from ventilation therapy. It involves highly confrontational interaction between the patient and a therapist, or between the patient and fellow patients during group therapy, in which the patient… … Wikipedia
1984 Rajneeshee bioterror attack — Infobox civilian attack title = 1984 Rajneeshee bioterror attack caption = Four of the restaurants in The Dalles affected by the attack location = The Dalles, Oregon, United States coordinates = coor dms|45|36|4|N|121|10|58|W|city (45.601218, 121 … Wikipedia
Shatter attack — In computing, a shatter attack is a programming technique employed by hackers on Microsoft Windows operating systems that can be used to bypass security restrictions between processes in a session. A shatter attack takes advantage of a design… … Wikipedia
2009 attack on the Sri Lanka national cricket team — Gaddafi Stadium, destination of attacked convoy Location Lahore, Pakistan … Wikipedia
Events leading to the attack on Pearl Harbor — More than a decade s worth of events leading to the attack on Pearl Harbor occurred prior to the actual attack. War between Japan and the United States had been a possibility that each nation s militaries planned for since the 1920s, though real… … Wikipedia
Dog attack — Classification and external resources Dogs typically attack using their teeth[1] ICD 10 … Wikipedia
User Interface Privilege Isolation — (UIPI Isolation des privilèges de l IHM) est une technique de sécurité utilisée par Windows Vista et Windows Server 2008 pour se protéger contre les exploits d injection de code. UIPI évite qu un processus ayant un bas niveau de sécurité… … Wikipédia en Français
User Interface Privilege Isolation — (UIPI) is a technology introduced in Windows Vista and Windows Server 2008 to combat code injection exploits. By leveraging Mandatory Integrity Control, it prevents processes with a lower integrity level (IL) from sending messages to higher IL… … Wikipedia
Shatter attack — «Подрывная атака» (англ. shatter attack) программная технология, которая используется хакерами для обхода ограничений безопасности между процессами одного сеанса в операционной системе Microsoft Windows. Она опирается на недостаток… … Википедия
international relations — a branch of political science dealing with the relations between nations. [1970 75] * * * Study of the relations of states with each other and with international organizations and certain subnational entities (e.g., bureaucracies and political… … Universalium
United States — a republic in the N Western Hemisphere comprising 48 conterminous states, the District of Columbia, and Alaska in North America, and Hawaii in the N Pacific. 267,954,767; conterminous United States, 3,022,387 sq. mi. (7,827,982 sq. km); with… … Universalium