| lexicalization | eng: Computer security procedures |
| subclass of | (noun) a particular course of action intended to achieve a result; "the procedure of obtaining a driver's license"; "it was a process of trial and error" process, procedure |
| Note: 18 other instance(s) ommited in the following list |
| has instance | e/CBL Index |
| has instance | e/CESG Claims Tested Mark |
| has instance | e/Certified Information Security Manager |
| has instance | e/Certified Information Systems Security Professional |
| has instance | e/Common Criteria Testing Laboratory |
| has instance | e/Cryptographic Module Testing Laboratory |
| has instance | e/Cyber-security regulation |
| has instance | e/Defense in depth (computing) |
| has instance | e/Department of Defense Information Assurance Certification and Accreditation Process |
| has instance | e/Department of Defense Information Technology Security Certification and Accreditation Process |
| has instance | e/Dynablock |
| has instance | e/Enterprise Privacy Authorization Language |
| has instance | e/Exit procedure |
| has instance | e/Fuzz testing |
| has instance | e/Google hacking |
| has instance | e/Hardening (computing) |
| has instance | e/Information assurance |
| has instance | e/Information technology security audit |
| has instance | e/Intruder detection |
| has instance | e/Labeled Security Protection Profile |
| has instance | e/Mobile device forensics |
| has instance | e/MyNetWatchman |
| has instance | e/National Strategy to Secure Cyberspace |
| has instance | e/Network security policy |
| has instance | e/Not Just Another Bogus List |
| has instance | e/Off-site data protection |
| has instance | e/Patch Tuesday |
| has instance | e/Penetration test |
| has instance | e/Privilege separation |
| has instance | e/Protection Profile |
| has instance | e/Responsible disclosure |
| has instance | e/Schneiers Law |
| has instance | e/Security Target |
| has instance | e/Security controls |
| has instance | e/Security management |
| has instance | e/Security through obscurity |
| has instance | e/Security-evaluated operating system |
| has instance | e/System High Mode |
| has instance | e/fr/Analyse forensique |
| has instance | c/fr/Standard en sécurité informatique |