Kako želite uporabljati PONS.com?

Ste že naročnik Čistega PONS-a?

PONS z oglaševanjem

Nadaljuj na PONS.com kot običajno z oglaševanjem in oglaševalskim sledenjem

Podrobnosti o sledenju in informacije o varstvu podatkov najdete pod Nastavitvami zasebnosti.

PONS Pur

brez oglaševanja s strani tretjih ponudnikov

brez sledenja

Naročite zdaj

V kolikor že imate svoj uporabniški PONS.com račun, se lahko na čisti PONS naročite .

We process your data to deliver content or advertisements and measure the delivery of such content or advertisements to extract insights about our website. We share this information with our partners on the basis of consent and legitimate interest. You may exercise your right to consent or object to a legitimate interest, based on a specific purpose below or at a partner level in the link under each purpose. These choices will be signaled to our vendors participating in the Transparency and Consent Framework.

Cookies, device or similar online identifiers (e.g. login-based identifiers, randomly assigned identifiers, network based identifiers) together with other information (e.g. browser type and information, language, screen size, supported technologies etc.) can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here.

Advertising and content can be personalised based on your profile. Your activity on this service can be used to build or improve a profile about you for personalised advertising and content. Advertising and content performance can be measured. Reports can be generated based on your activity and those of others. Your activity on this service can help develop and improve products and services.

saccordèrent
Sicherheitsanalyse
se·ˈcu·rity analy·sis SAM.
analy·sis <pl analyses> [əˈnæləsɪs, pl -si:z] SAM.
1. analysis:
Analyse ž. spol <-, -n>
Beurteilung ž. spol <-, -en>
2. analysis PSIH.:
[Psycho]analyse ž. spol
to be in analysis am. angl.
3. analysis GOSP.:
se·cu·rity [sɪˈkjʊərəti, am. angl. -ˈkjʊrət̬i] SAM.
1. security no pl (protection, safety):
Sicherheit ž. spol <-, -en>
Hochsicherheitsgefängnis sr. spol /-trakt m. spol
2. security no pl (guards):
Sicherheitsdienst m. spol <-(e)s, -e>
Wachdienst m. spol
3. security no pl (permanence, certainty):
Sicherheit ž. spol <-, -en>
Kündigungsschutz m. spol <-es> kein pl
4. security no pl (confidence):
[innere] Sicherheit ž. spol
Geborgenheit ž. spol <->
5. security usu ed. (safeguard):
Sicherheit ž. spol <-, -en>
Schutz m. spol <-es> gegen +tož.
6. security no pl (guarantee of payment):
Sicherheit ž. spol <-, -en>
Kaution ž. spol <-, -en>
Kreditsicherheit ž. spol <-, -en>
to use sth as security [for sth]
etw als Sicherheit [für etw tož.] verwenden
7. security FINAN. (investment):
Wertpapier sr. spol <-(e)s, -e>
Wandelanleihe ž. spol <-, -n>
Effekten strok. pl
8. security (as guarantor):
Bürgschaft ž. spol <-, -en>
Garantie ž. spol <-, -ti̱·en>
9. security (being secret):
Geheimhaltung ž. spol <-, -en>
Diskretion ž. spol <->
security analysis SAM. RAČUN.
security SAM. INVEST. IN FINAN.
Sicherheit ž. spol
security SAM. FINAN. TRGI
Wertpapier sr. spol
Titel m. spol
PONS OpenDict

Bi želeli dodati besedo, frazo ali prevod?

Prosimo, pošljite nam nov vnos za PONS OpenDict. Oddane predloge pregleda uredniška ekipa PONS in jih ustrezno vključi v rezultate.

Dodaj vnos
No example sentences available

No example sentences available

Try a different entry

Enojezični primeri (nepregledani od uredništva PONS)
What we wanted out of that was for the community to help with security analysis, bug reporting, performance enhancement, understanding corner cases, and a whole lot more.
www.techworld.com.au
Tracking insider activity can be one of the most fruitful aspects of the security analysis process.
www.fool.ca
Other programmes will follow on topics including family succession, security analysis and social enterprise.
www.universityworldnews.com
In 2006, conducted a security popularity poll and developed a list of 100 network security analysis tools in order of popularity based on the responses of 3,243 people.
en.wikipedia.org
The software package could help in security analysis, business intelligence, fraud detection and other use cases, according to the company.
www.computerworld.co.nz
Primeri iz spleta (nepregledani od uredništva PONS)
[...]
The services provided by ESCRYPT span the range from the prelimi- nary analysis, conceptualization, system design, and specification of prototype and product development of embedded security solutions to security analyses, evaluation, and certification support of safety-relevant systems.
[...]
www.etas.com
[...]
Die Dienstleistungen von ESCRYPT umfassen unter anderem Voranalyse, Konzeption, Systementwurf, Spezifikation, Prototyp- entwicklung und Produktentwicklung von eingebetteten Sicherheitslösungen sowie Sicherheitsanalysen, Evaluierung und Zertifizierungsunterstützung von sicherheitsrelevanten Systemen.
[...]
[...]
Security analyses for discovery of weaknesses in the company network
[...]
www.secunet.com
[...]
Sicherheitsanalysen zur Erkennung von Schwachstellen im Unternehmensnetzwerk
[...]
[...]
“ In our test lab, function, reliability and interoperability tests, along with individual security analyses and penetration tests, can be carried out and all of the developmental phases considered, from the design of individual services to prototypes to the testing of fully functional comprehensive systems, ” notes Angelika Ruppel of SIT in Munich.
[...]
www.fraunhofer.de
[...]
» In unserem Testlabor können Funktions-, Zuverlässigkeits- und Interoperabilitätstests sowie einzelne Sicherheitsanalysen und Penetrationstests durchgeführt und alle Entwicklungsphasen betrachtet werden, vom Entwurf einzelner Dienste über Prototypen bis hin zum Test einsatzfähiger Gesamtsysteme «, sagt Angelika Ruppel vom SIT in München.
[...]
[...]
ASKS - Architecture-Centric Security Analysis of Business Applications (funded by the BMBF)
[...]
www.informatik.uni-bremen.de
[...]
Architekturbasierte Sicherheitsanalyse geschäftskritischer Software-Systeme (gefördert vom BMBF)
[...]
[...]
Our basic analysis of information security can be excellently combined with a technical security analysis (penetration test) to detect beside organizational improvement potentials also technical weaknesses.
www.secunet.com
[...]
Unsere Basisanalyse Informationssicherheit lässt sich hervorragend mit einer technischen Sicherheitsanalyse (Penetrationstest) verbinden, um neben organisatorischen Verbesserungspotenzialen auch technische Schwachstellen aufzudecken.

Poglej "security analysis" v drugih jezikih