-
1 Information Assurance and Security Engineering Directorate
Military: IASEDУниверсальный русско-английский словарь > Information Assurance and Security Engineering Directorate
-
2 Naval Electronics Systems Security Engineering office
Универсальный русско-английский словарь > Naval Electronics Systems Security Engineering office
-
3 Security Plan Evaluation Report
Engineering: SPERУниверсальный русско-английский словарь > Security Plan Evaluation Report
-
4 security control center
Engineering: SCCУниверсальный русско-английский словарь > security control center
-
5 security control of air traffic and electromagnetic radiation
Engineering: SCATERУниверсальный русско-английский словарь > security control of air traffic and electromagnetic radiation
-
6 security control system
Engineering: SCSУниверсальный русско-английский словарь > security control system
-
7 security design modification
Engineering: SDMУниверсальный русско-английский словарь > security design modification
-
8 security design report
Engineering: SDRУниверсальный русско-английский словарь > security design report
-
9 security hypertext transfer protocol
Engineering: S-HTTPУниверсальный русско-английский словарь > security hypertext transfer protocol
-
10 security inspector
Engineering: SIУниверсальный русско-английский словарь > security inspector
-
11 security manager
Engineering: SM -
12 security organization response exercise
Engineering: SORXУниверсальный русско-английский словарь > security organization response exercise
-
13 security procedure
Engineering: SPУниверсальный русско-английский словарь > security procedure
-
14 security subsystem
Engineering: SSУниверсальный русско-английский словарь > security subsystem
-
15 security system operational recording and analysis
Engineering: SSORAУниверсальный русско-английский словарь > security system operational recording and analysis
-
16 security verification system
Engineering: SVSУниверсальный русско-английский словарь > security verification system
-
17 security, screening system
Engineering: SSSУниверсальный русско-английский словарь > security, screening system
-
18 Security Constrained Economic Dispatch
Power engineering: SCEDУниверсальный русско-английский словарь > Security Constrained Economic Dispatch
-
19 security analysis
[sɪ'kjʊ(ə)rɪtɪəˌnælɪsɪs]Electrical engineering: SA -
20 security constrained dispatch
Electrical engineering: SCDУниверсальный русско-английский словарь > security constrained dispatch
См. также в других словарях:
Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… … Wikipedia
Information Systems Security Engineering Professional — is a designation awarded by the International Information Systems Security Certification Consortium [http://www.isc2.org (ISC)2] .For experienced information security professionals with an International Information Systems Security Certification… … Wikipedia
Information Systems Security Engineering — (ISSE) is the process used to discover and meet the users protection needs. ISSE should be part of systems engineering (SE) and the formal certification and accreditation process to ensure that security solutions are effective and efficient. E… … Wikipedia
Security controls — are safeguards or countermeasures to avoid, counteract or minimize security risks. To help review or design security controls, they can be classified by several criteria, for example according to the time that they act, relative to a security… … Wikipedia
Security policy — is a definition of what it means to be secure for a system, organization or other entity. For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by mechanisms such as doors,… … Wikipedia
Security protocol notation — Security (engineering) protocol notation is a way of expressing a protocol of correspondence between entities of a dynamic system, such as a computer network. In the context of a formal model, it allows reasoning about the properties of such a… … Wikipedia
Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… … Wikipedia
Security-focused operating system — This is an alphabetical list of operating systems with a sharp security focus. Their order does not imply rank.In our context, Security focused means that the project is devoted to increasing the security as a major goal. As such, something can… … Wikipedia
Security modes — Generally, Security modes refer to information systems security modes of operations used in mandatory access control (MAC) systems. Often, these systems contain information at various levels of security classification. The mode of operation is… … Wikipedia
Security lighting — In the field of physical security, security lighting is often used as a preventative and corrective measure against intrusions or other criminal activity on a physical piece of property. Security lighting may be provided to aid in the detection… … Wikipedia
Security sector reform — (SSR) is a concept to reform or rebuild a state s security sector that emerged first in the 1990s in Eastern Europe. It starts where a dysfunctional security sector is unable to provide security to the state and its people effectively and under… … Wikipedia