- security classification procedure
- Военный термин: порядок определения грифов секретности
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
security and protection system — Introduction any of various means or devices designed to guard persons and property against a broad range of hazards, including crime, fire, accidents, espionage, sabotage, subversion, and attack. Most security and protection systems… … Universalium
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
National Industrial Security Program — The National Industrial Security Program, or NISP, is the nominal authority (in the United States) for managing the needs of private industry to access classified information. The NISP was established in 1993 by Executive Order 12829.[1] The… … Wikipedia
Criminal Procedure Code, 1973 (India) — Criminal Procedure Code, 1973 Criminal law in India An Act to consolidate and amend the law relating to Criminal Procedure. Citation Act No. 2 of 1974 Enacted by … Wikipedia
Manual of Patent Examining Procedure — MPEP redirects here. For the drug, see 2 Methyl 6 (phenylethynyl)pyridine. The Manual of Patent Examining Procedure (MPEP) is published by the United States Patent and Trademark Office (USPTO) for use by patent attorneys and agents and patent… … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Cyber security and countermeasure — Cybercrime (or computer crime) refers to any crime that involves a computer and a network.[1] In general, a countermeasure is a measure or action taken to counter or offset another one. In computer security a countermeasure is an action, device,… … Wikipedia
Oppenheimer security hearing — The Oppenheimer security hearing was a 1954 inquiry by the United States Atomic Energy Commission into the background, actions and associations of J. Robert Oppenheimer, the American scientist who had headed the Manhattan Project that developed… … Wikipedia
JEL classification codes — Articles in journals are usually classified according to the system used by the Journal of Economic Literature (JEL). The JEL is published quarterly by the American Economic Association and contains survey articles and information on recently… … Wikipedia
List of Statutory Rules of Northern Ireland, 1997 — This is an incomplete list of Statutory Rules of Northern Ireland in 1997.1 100* Buses (Section 10B Permits) (Amendment) Regulations (Northern Ireland) 1997 S.R. 1997 No. 1 * Temporary Speed Limit (Upper Ballinderry, Lisburn) Order (Northern… … Wikipedia
List of Statutory Instruments of the United Kingdom, 1992 — This is a complete list of all 1922 Statutory Instruments published in the United Kingdom in the year 1992. NOTOC 1 100* North Hull Housing Action Trust (Transfer of Property) Order 1992 S.I. 1992/1 * Merchant Shipping (Radio Installations)… … Wikipedia