- security actions plan
- план мероприятий по обеспечению безопасности
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Security level management — (SLM) comprises a quality assurance system for electronic information security. The aim of SLM is to display the IT security status transparently across a company at any time, and to make IT security a measurable quantity. Transparency and… … Wikipedia
Plan W — (sometimes referred to as the W Plan Fact|date=March 2007), during the Second World War, was a plan of joint military operations between Ireland and the United Kingdom devised between 1940–1942, to be executed in the event of a an invasion of… … Wikipedia
Plan de restructuration — Restructuration Une restructuration est une opération par laquelle un ensemble organisé voit sa structure organisationnelle remaniée en vue d’atteindre à une nouvelle configuration. Le terme est principalement utilisé en urbanisme et en… … Wikipédia en Français
Plan Condor — Opération Condor Pour les articles homonymes, voir Opération Condor (homonymie). L opération Condor (en espagnol : Operación Cóndor) est le nom donné à une campagne d assassinats et de lutte anti guérilla conduite conjointement par les… … Wikipédia en Français
Plan Colombie — Le plan Colombie (en espagnol, Plan Colombia), est un plan né en partie avec les discours électoraux d’Andrés Pastrana, proposant un Plan Marshall pour la Colombie, en même temps que des stratégies nouvelles de lutte contre le narcotrafic[1]. Ce… … Wikipédia en Français
Security issues in Colombia — This article covers national and international security issues in Colombia. External threats Colombia does not face any known foreign threats. The only neighbor that might pose a potential military challenge over as yet unresolved territorial… … Wikipedia
Actions in Inner Mongolia (1933–1936) — Warbox conflict=Inner Mongolia (1933 36) partof=Second Sino Japanese War date=April 1933 to December 1936 place= Chahar and Suiyuan provinces result= 1933 Japanese victory, 1936 Chinese victory combatant1= 1933 flagicon|Japan Imperial Japanese… … Wikipedia
ITIL Security Management — The ITIL Security Management process describes the structured fitting of security in the management organization. ITIL Security Management is based on the Code of practice for information security management also known as ISO/IEC 17799.A basic… … Wikipedia
National Special Security Event — Secretary of Homeland Security Janet Napolitano (center) at a security news conference for Super Bowl XLIV, on February 1, 2010 A National Special Security Event (NSSE) is an event of national or international significance deemed by the United… … Wikipedia
Covert United States foreign regime change actions — History of the United States This article is part of a series United States Portal … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia