- validation activities
- Программирование: действия по подтверждению соответствия
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Validation (drug manufacture) — Within the highly regulated environment for development and manufacturing of Pharmaceutical Drugs and medical devices there is a requirement within the regulations to provide an appropriate amount of assurance that critical processes in producing … Wikipedia
Verification and validation — IV V redirects here. For NASA s IV V Facility, see Independent Verification and Validation Facility. Verification and validation is the process of checking that a product, service, or system meets specifications and that it fulfills its intended… … Wikipedia
Independent software verification and validation — ISVV stands for Independent Software Verification and Validation. ISVV is targeted at safety critical software systems and aims to increase the quality of software products, thereby reducing risks and costs through the operational life of the… … Wikipedia
Verification and Validation — Verification Validation is the process of checking that a product, service, or system meets specifications and that it fulfils its intended purpose. These are critical components of a quality management system such as ISO… … Wikipedia
Debt validation — This article is about debt validation under the Fair Debt Collection Act. For debt validation under the Fair Credit Billing Act, see Fair Credit Billing Act. Debt Validation, or debt verification , refers to a consumer s right to challenge a debt … Wikipedia
Common Criteria Evaluation and Validation Scheme — (CCEVS) is a United States Government program administered by the National Information Assurance Partnership (NIAP) to evaluate information technology (IT) product conformance to the Common Criteria international standard. CCEVS Logo Objectives… … Wikipedia
CIA transnational activities in counterproliferation — This article deals with activities of the U.S. Central Intelligence Agency, specifically dealing with arms control, weapons of mass destruction (WMD) and weapons proliferation. It attempts to look at the process of tasking and analyzing, rather… … Wikipedia
NeuGRID — is EU funded project within the frame of the Information Communication and Technologies Work Frame [http://cordis.europa.eu/fp7/ict/home en.html Home page of the ICT Information and Communication Technologies Work Frame] . Aim of the project is… … Wikipedia
Identity correlation — Definition In information systems, identity correlation is a process that reconciles and validates the proper ownership of disparate user account login IDs (user names) that reside on systems and applications throughout an organization and can… … Wikipedia
FIPS 140-2 — The Federal Information Processing Standard (FIPS) Publication 140 2, FIPS PUB 140 2, is a U.S. government computer security standard used to accredit cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial… … Wikipedia
Security Content Automation Protocol — The Security Content Automation Protocol (SCAP) is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation (e.g., FISMA compliance). The National Vulnerability Database… … Wikipedia