- internal security plan
- Военный термин: план обеспечения внутренней безопасности
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Internal Security Operations Command — The Internal Security Operations Command (ISOC) (Thai: กองอำนวยการรักษาความมั่นคงภายใน abbrev. กอ.รมน.) is a unit of the Thai military devoted to national security issues. It was responsible for suppression of leftist groups during the 1970s and… … Wikipedia
Internal resistance to South African apartheid — Internal resistance to the apartheid system in South Africa came from several sectors of society and saw the creation of organisations dedicated variously to peaceful protests, passive resistance and armed insurrection. ANC and the PACAlthough… … Wikipedia
Security level management — (SLM) comprises a quality assurance system for electronic information security. The aim of SLM is to display the IT security status transparently across a company at any time, and to make IT security a measurable quantity. Transparency and… … Wikipedia
Security Level Management — (SLM) ist ein Qualitätssicherungssystem für die elektronische Informationssicherheit. SLM hat zum Ziel, den IT Sicherheitsstatus jederzeit unternehmensweit transparent darzustellen und IT Sicherheit zu einer messbaren Größe zu machen. Transparenz … Deutsch Wikipedia
Internal Revenue Code — The Internal Revenue Code (or IRC; more formally, the Internal Revenue Code of 1986, as amended) is the main body of domestic statutory tax law of the United States organized topically, including laws covering the income tax (see Income tax in… … Wikipedia
Plan 9 from Bell Labs — Infobox OS name = Plan 9 from Bell Labs caption = Glenda, the Plan 9 Bunny developer = Bell Labs source model = Free software/Open source kernel type = Hybrid supported platforms = x86, MIPS, DEC Alpha, SPARC, PowerPC, ARM ui = rio / rc family =… … Wikipedia
Security Audit — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… … Deutsch Wikipedia
Security Scan — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… … Deutsch Wikipedia
Security Test — Als IT Sicherheitsaudit (englisch IT Security Audit; von lateinisch audit: „er/sie hört“; sinngemäß: „er/sie überprüft“) werden in der Informationstechnik (IT) Maßnahmen zur Risiko und Schwachstellenanalyse (engl. Vulnerability Scan) eines IT… … Deutsch Wikipedia
Internal conflict in Peru — Warbox|conflict=Internal Conflict in Peru caption=Areas where Shining Path was active in Peru. date=May 17, 1980 present, largely ended by 2000 campaign= place=Peru casus=Decision by guerrillas to rise against Peruvian state territory=None status … Wikipedia
Internal control — In accounting and organizational theory, Internal control is defined as a process effected by an organization s structure, work and authority flows, people and management information systems, designed to help the organization accomplish specific… … Wikipedia