- personnel requirements information system methodology
- Военный термин: методика использования информационной системы для определения потребностей в ЛС
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Information technology audit — An information technology audit, or information systems audit, is an examination of the controls within an Information technology (IT) infrastructure. An IT audit is the process of collecting and evaluating evidence of an organization s… … Wikipedia
System Shock 2 — Developer(s) Irrational Games Looking Glass Studios Publisher(s) Electronic Arts … Wikipedia
Oklahoma State System of Higher Education — Established March 11, 1941 Type Public University System Chancellor Dr. Glen D. Johnson, Jr. Location Oklahoma City, Oklahoma … Wikipedia
Enterprise Information Security Architecture — (EISA) is a part of enterprise architecture focusing on information security throughout the enterprise. Definition Enterprise Information Security Architecture (EISA) is the practice of applying a comprehensive and rigorous method for describing… … Wikipedia
Active Denial System — Humvee with ADS mounted The Active Denial System (ADS) is a non lethal, directed energy weapon developed by the U.S. military.[1] It is a strong millimeter wave transmitter primarily used for crowd control (the goodbye effect [ … Wikipedia
СДА 06-2009: Термины и определения, используемые в Единой системе оценки соответствия в области промышленной, экологической безопасности, безопасности в энергетике и строительстве — Терминология СДА 06 2009: Термины и определения, используемые в Единой системе оценки соответствия в области промышленной, экологической безопасности, безопасности в энергетике и строительстве: Access (access to a system or scheme) opportunity… … Словарь-справочник терминов нормативно-технической документации
Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro … Wikipedia
Counterintelligence — This article is a subset article of intelligence cycle security. Counterintelligence or counter intelligence (see spelling differences) (CI) refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence… … Wikipedia
Penetration test — A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious user, known as a Black Hat Hacker, or Cracker. The process involves an active analysis of the system for any… … Wikipedia
Counter-intelligence — This article is a subset article of intelligence cycle security. National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process… … Wikipedia
IDEF — ( Integration DEFinition ) is a family of modeling languages in the field of software engineering. They cover a range of uses from function modeling to information, simulation, object oriented analysis and design and knowledge acquisition. These… … Wikipedia