- security constraints
- Безопасность: ограничения в системе безопасности, ограничения для обеспечения безопасности
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Security policy — is a definition of what it means to be secure for a system, organization or other entity. For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by mechanisms such as doors,… … Wikipedia
Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… … Wikipedia
United States security assistance to the Palestinian Authority — (PA) has been provided since the Palestinian Authority was established by the Oslo Accords in the mid 1990s. The security assistance was given on an ad hoc basis and often covert at the outset. Since 2005 the U.S. State Department has… … Wikipedia
Food security — refers to the availability of food and one s access to it. A household is considered food secure when its occupants do not live in hunger or fear of starvation. World wide around 852 million people are chronically hungry due to extreme poverty,… … Wikipedia
Social Security Administration — Official seal Agency overview Formed August 14, 1935 Jurisdiction … Wikipedia
Air Force Security Forces — AFSC Enlisted: 3P0X1, Officer: 31PX) (formerly named Air Police, then Security Police; colloquially called cops by USAF personnel), are the military police of the United States Air Force. Airmen in this field go through 13 weeks of initial… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Software Security Assurance — Software is itself a resource and thus must be afforded appropriate security. Software also contains and controls data and other resources. Therefore, it must be designed and implemented to protect those resources. Software Security Assurance is… … Wikipedia
Database security — concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links)… … Wikipedia
Managed security service — In computing, managed security services (MSS) are network security services that have been outsourced to a service provider. A company providing such a service is a managed security service provider (MSSP) [1] Also Managed security services (MSS) … Wikipedia
Human Security Report 2005 — The Human Security Report 2005 is a report outlining declining world trends of global violence from the early 1990s to 2003. The study reports major worldwide declines in the number of armed conflicts, genocides, human rights abuses, military… … Wikipedia