| |||
impersonation (The ability of a thread to run in the security context of a security principal different from the security principal that started the process. This is usually so that a process can gain access to resources on behalf of a user) | |||
pastiche | |||
counterfeiting | |||
imitation | |||
industrial counterfeiting |
efterligning: 7 phrases in 4 subjects |
Communications | 1 |
Criminal law | 1 |
Finances | 1 |
Law | 4 |