Перевод: с русского на английский

с английского на русский

ISC principle

См. также в других словарях:

  • Timeline of Islamic science and engineering — This timeline of Islamic science and engineering covers the general development of science and technology in the Islamic world during the Islamic Golden Age, usually dated from the 7th to 16th centuries.From the 17th century onwards, the advances …   Wikipedia

  • Indiana Railroad — Infobox SG rail railroad name=Indiana Railroad logo filename=indianarailroadlogo.jpg logo size=80px old gauge= marks= locale=Indiana start year=1930 end year=1941 hq city=Indianapolis, IndianaThe Indiana Railroad (IR) was the last of the typical… …   Wikipedia

  • Sonora — For other uses, see Sonora (disambiguation). Sonora Estado Libre y Soberano de Sonora   State   …   Wikipedia

  • C++11 — C++11, also formerly known as C++0x,[1] is the name of the most recent iteration of the C++ programming language, replacing C++TR1, approved by the ISO as of 12 August 2011.[2] The name is derived from the tradition of naming language versions by …   Wikipedia

  • Avicennism — (PerB|فلسفه سینایی) is a school of early Islamic philosophy which began during the middle of the Islamic Golden Age. The school was founded by Avicenna (Ibn Sina), an 11th century Persian philosopher who attempted to redefine the course of… …   Wikipedia

  • Bell–LaPadula model — The Bell LaPadula Model (abbreviated BLP) is a state machine model used for enforcing access control in government and military applications.[1] It was developed by David Elliott Bell and Leonard J. LaPadula, subsequent to strong guidance from… …   Wikipedia

  • Bell-LaPadula model — The Bell LaPadula Model is a state machine model used for enforcing access control in government and military applications. [cite book|last=Hansche|first=Susan|coauthors=John Berti, Chris Hare|title=Official (ISC)2 Guide to the CISSP… …   Wikipedia

  • Phishing — In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic… …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Outline of energy — See also: Index of energy articles In physics, energy (from the Greek ἐνέργεια – energeia, activity, operation , from ἐνεργός – energos, active, working [1]) is a scalar physical quantity that describes the amount of work that can be performed by …   Wikipedia

  • Timeline of medicine and medical technology — Timeline of medicine and medical technologyAntiquity* c. 2600s BC Imhotep wrote texts on ancient Egyptian medicine describing diagnosis and treatment of 200 diseases in 3rd dynasty Egypt. * c. 2596 BC¹ The legendary date of composition of Huangdi …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»