- cost-effective security
- безопасность, выбираемая по критерию "стоимость-эффективность"
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Security theater — consists of security countermeasures intended to provide the feeling of improved security while doing little or nothing to actually improve security. [cite book last = Schneier first = Bruce authorlink = Bruce Schneier title = Beyond Fear:… … Wikipedia
Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro … Wikipedia
Cost of conflict — is a tool which attempts to calculate the price of conflict to the human race. The idea is to examine this cost, not only in terms of the deaths and casualties and the economic costs borne by the people involved, but also the social,… … Wikipedia
Aetos Security Management — The Aetos Security Management Private Limited, is one of the five commercial Auxiliary Police forces authorised to provide armed security officers in Singapore to government organisations as well as private companies. A fully owned subsidiary of… … Wikipedia
security and protection system — Introduction any of various means or devices designed to guard persons and property against a broad range of hazards, including crime, fire, accidents, espionage, sabotage, subversion, and attack. Most security and protection systems… … Universalium
security — /si kyoor i tee/, n., pl. securities, adj. n. 1. freedom from danger, risk, etc.; safety. 2. freedom from care, anxiety, or doubt; well founded confidence. 3. something that secures or makes safe; protection; defense. 4. freedom from financial… … Universalium
Security vs. Civil Liberties — ▪ 2003 By Stephen J. Phillips Technology was at the forefront of international efforts to fight terrorism and bolster security in 2002 in the wake of the terrorist attacks in the U.S. on Sept. 11, 2001. The rush to deploy new technologies… … Universalium
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Port security — refers to the defense, law and treaty enforcement, and counterterrorism activities that fall within the port and maritime domain. It includes the protection of the seaports themselves, the protection and inspection of the cargo moving through the … Wikipedia
Payment Card Industry Data Security Standard — The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e purse, ATM, and POS cards. Defined by the Payment Card… … Wikipedia
Ring (computer security) — In computer science, hierarchical protection domains, [Paul A. Karger, Andrew J. Herbert, [http://doi.ieeecomputersociety.org/10.1109/SP.1984.10001 An Augmented Capability Architecture to Support Lattice Security and Traceability of Access] , sp … Wikipedia