- computer security legislation
- законодательство о безопасности вычислительных систем
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Timeline of computer security hacker history — This is a timeline of computer security hacker history. Hacking and system cracking appeared with the first electronic computers. Below are some important events in the history of hacking and cracking.1970s1971* John T. Draper (later nicknamed… … Wikipedia
Computer Misuse Act 1990 — United Kingdom Parliament Long title An Act to make provision for securing computer material against unauthorised access or modification; and for connected purposes. Statute book … Wikipedia
Computer recycling — Computer monitors are typically packed into low stacks on wooden pallets for recycling and then shrink wrapped.[1] Computer recycling or electronic recycling is the recycling or reuse of computers or other electronics. It includes both finding… … Wikipedia
Computer Fraud and Abuse Act — The Computer Fraud and Abuse Act is a law passed by the United States Congress in 1986, intended to reduce cracking of computer systems and to address federal computer related offenses. The Act (codified as 18 U.S.C. § 1030) governs… … Wikipedia
Computer Assisted Passenger Prescreening System — The Computer Assisted Passenger Prescreening System (often abbreviated CAPPS) is a counter terrorism system in place in the United States air travel industry. The United States Transportation Security Administration (TSA) maintains a watchlist,… … Wikipedia
Security vs. Civil Liberties — ▪ 2003 By Stephen J. Phillips Technology was at the forefront of international efforts to fight terrorism and bolster security in 2002 in the wake of the terrorist attacks in the U.S. on Sept. 11, 2001. The rush to deploy new technologies… … Universalium
Cyber-security regulation — In the United States government, cyber security regulation comprises directives from the Executive Branch and legislation from Congress that safeguards information technology and computer systems. The purpose of cyber security regulation is to… … Wikipedia
List of United States federal legislation — NoTOC This is a partial list of notable United States federal legislation, in chronological order. At the federal level in the United States, legislation (a.k.a. statutes or statutory law ) consists exclusively of Acts passed by the Congress of… … Wikipedia
Information technology security audit — A computer security audit is a manual or systematic measurable technical assessment of a system or application. Manual assessments include interviewing staff, performing security vulnerability scans, reviewing application and operating system… … Wikipedia
Illinois Security Lab — The Illinois Security Lab is a research laboratory at the University of Illinois Urbana Champaign established in 2004 to support research and education in computer and network security. The lab is part of the UIUC Computer Science Department and… … Wikipedia