formal security model - перевод на русский
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

formal security model - перевод на русский

Asymptotic security; Concrete security model
Найдено результатов: 2273
formal security model      
модель, математически точно отображающая принятую политику (обеспечения) безопасности
formal series         
GENERALIZATION OF A POLYNOMIAL, WHERE THE NUMBER OF TERMS IS ALLOWED TO BE INFINITE, DEFINED ALGEBRAICALLY WITHOUT CONSIDERATION OF CONVERGENCE (SO THAT E.G. EVALUATION IS NOT ALWAYS DEFINED)
Formal Laurent series; Formal series; Non-commuting formal power series; Power series ring; Ring of formal power series; K((x)); R((x)); Ring of formal Laurent series; Formal power series ring; Magnus ring; Formal power serie; Formal power series over a semiring; Operations on formal power series

математика

формальный ряд

care of securities         
  • 417x417px
  • 1981 $10,000 15.875% Registered Note
TRADABLE FINANCIAL ASSET
Securities; Financial securities; Security Finance; Securities Finance; Marketable; Debt security; Investment securities; Securities trading; Care of securities; Debt securities; Foreign security; Marketable securities; Marketable security; Sub-sovereign bonds; Securities industry; Supra-national bond; Supranational bond; Wertpapier
хранение ценных бумаг
security agent         
  • Security guard at the 13th Annual World Beer Festival in [[Durham, North Carolina]]
  • ADT]] Bel-Air Patrol vehicle
  • A Bangladeshi security guard guarding a residential colony at night
  • Private guard escort on a merchant ship providing security services against pirates.
  • Bodyguard protects Members of Parliament during public visits by visitors in the [[Chamber of Deputies of the Czech Republic]] in 2015.
  • Armored car]] with a crew of security guards in [[Guangzhou]], China
  • A group of security guards before going on duty in Hong Kong
  • Security officers at KK Times Square in [[Kota Kinabalu]].
  • A [[Kenya]]n private security guard
  • Security vehicle and officer in [[Montreal]], [[Quebec]]
  • A museum guard in 1935
  • Private security workers in [[Johannesburg]] during the [[2010 World Cup]].
  • A patrol vehicle used by Priority Protection & Investigations in [[Texas]]
  • China]]
  • Mall]] [[parking lot]] security guards (''Satpam'') in [[Jakarta]], [[Indonesia]]
  • Standing Guard
  • Security officer at the 2015 [[Stockholm Pride]] Parade
  • Security officer with vehicle in Norway
  • Security guards at an [[Australian rules football]] game
  • Watchman on duty at a residential block in [[Hong Kong]]
  • Security guards in [[Prambanan]] Temple, [[Central Java]], [[Indonesia]]
PERSON EMPLOYED TO PROTECT ASSETS
Security guards; Security Guard; Rent-a-cop; Housing Police; Security Guards; Security Officers; Security agent; Security Agents; Square badge; Security Officer; Rent a cop; Rental cop; Works police; Security agents; Security officers; Armed Security; Mall security officer; Private patrol officer; Mall cop; Mallcop; Mall security; Mall Cops; Mall Cop; Factory guard; Sentry guard; Private security guard; Privately contracted armed security personnel; Theft prevention officer; Privately Contracted Armed Security Personnel; Private Patrol Operator

общая лексика

агент безопасности

security officer         
  • Security guard at the 13th Annual World Beer Festival in [[Durham, North Carolina]]
  • ADT]] Bel-Air Patrol vehicle
  • A Bangladeshi security guard guarding a residential colony at night
  • Private guard escort on a merchant ship providing security services against pirates.
  • Bodyguard protects Members of Parliament during public visits by visitors in the [[Chamber of Deputies of the Czech Republic]] in 2015.
  • Armored car]] with a crew of security guards in [[Guangzhou]], China
  • A group of security guards before going on duty in Hong Kong
  • Security officers at KK Times Square in [[Kota Kinabalu]].
  • A [[Kenya]]n private security guard
  • Security vehicle and officer in [[Montreal]], [[Quebec]]
  • A museum guard in 1935
  • Private security workers in [[Johannesburg]] during the [[2010 World Cup]].
  • A patrol vehicle used by Priority Protection & Investigations in [[Texas]]
  • China]]
  • Mall]] [[parking lot]] security guards (''Satpam'') in [[Jakarta]], [[Indonesia]]
  • Standing Guard
  • Security officer at the 2015 [[Stockholm Pride]] Parade
  • Security officer with vehicle in Norway
  • Security guards at an [[Australian rules football]] game
  • Watchman on duty at a residential block in [[Hong Kong]]
  • Security guards in [[Prambanan]] Temple, [[Central Java]], [[Indonesia]]
PERSON EMPLOYED TO PROTECT ASSETS
Security guards; Security Guard; Rent-a-cop; Housing Police; Security Guards; Security Officers; Security agent; Security Agents; Square badge; Security Officer; Rent a cop; Rental cop; Works police; Security agents; Security officers; Armed Security; Mall security officer; Private patrol officer; Mall cop; Mallcop; Mall security; Mall Cops; Mall Cop; Factory guard; Sentry guard; Private security guard; Privately contracted armed security personnel; Theft prevention officer; Privately Contracted Armed Security Personnel; Private Patrol Operator

[si'kju(ə)ritiɔfisə]

общая лексика

офицер службы безопасности

офицер контрразведки

начальник охраны (предприятия, гостиницы и т. п.)

security officer         
  • Security guard at the 13th Annual World Beer Festival in [[Durham, North Carolina]]
  • ADT]] Bel-Air Patrol vehicle
  • A Bangladeshi security guard guarding a residential colony at night
  • Private guard escort on a merchant ship providing security services against pirates.
  • Bodyguard protects Members of Parliament during public visits by visitors in the [[Chamber of Deputies of the Czech Republic]] in 2015.
  • Armored car]] with a crew of security guards in [[Guangzhou]], China
  • A group of security guards before going on duty in Hong Kong
  • Security officers at KK Times Square in [[Kota Kinabalu]].
  • A [[Kenya]]n private security guard
  • Security vehicle and officer in [[Montreal]], [[Quebec]]
  • A museum guard in 1935
  • Private security workers in [[Johannesburg]] during the [[2010 World Cup]].
  • A patrol vehicle used by Priority Protection & Investigations in [[Texas]]
  • China]]
  • Mall]] [[parking lot]] security guards (''Satpam'') in [[Jakarta]], [[Indonesia]]
  • Standing Guard
  • Security officer at the 2015 [[Stockholm Pride]] Parade
  • Security officer with vehicle in Norway
  • Security guards at an [[Australian rules football]] game
  • Watchman on duty at a residential block in [[Hong Kong]]
  • Security guards in [[Prambanan]] Temple, [[Central Java]], [[Indonesia]]
PERSON EMPLOYED TO PROTECT ASSETS
Security guards; Security Guard; Rent-a-cop; Housing Police; Security Guards; Security Officers; Security agent; Security Agents; Square badge; Security Officer; Rent a cop; Rental cop; Works police; Security agents; Security officers; Armed Security; Mall security officer; Private patrol officer; Mall cop; Mallcop; Mall security; Mall Cops; Mall Cop; Factory guard; Sentry guard; Private security guard; Privately contracted armed security personnel; Theft prevention officer; Privately Contracted Armed Security Personnel; Private Patrol Operator
security officer офицер контрразведки
computer security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware

общая лексика

компьютерная безопасность

Смотрите также

attack detection; information security; intruder detection

data security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware

общая лексика

защита [безопасность] данных

защита данных от неавторизованного доступа, модификации или разрушения

Смотрите также

data control; data protection; information security; security

data security         
  • While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
  • Cryptographic]] techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Social Engineering and Privilege escalation
THE PROTECTION OF COMPUTER SYSTEMS AND NETWORKS FROM THEFT, DAMAGE, MISUSE OR DATA LEAK
Security (computers); Computer insecurity; Software security; It security; IT security; Security architecture; Pc security; Cybersecurity; Cyber security; Computing security; Securing a computer; Security Language; COMPUSEC; Cyber Security; Security Architecture; Digital security; IT Security; Computer Security; Computer security industry; Cyberspace Security; Cyber security and countermeasure; Security (computing); Computer security incident; Computer security breach; Compsec; Cyber security expert; Cyber-security; E-security; Computer security and identity theft; Data Security; International Cybercrime Reporting and Cooperation Act; E-Security; Car cyber attack; System security; Security of computer systems; Cyber hygiene; Computer hygiene; Draft:Cyber hygiene; Information technology security; Cybersecurity law; Digital hygiene; History of computer security; Multi-vector attack; Direct-access attack; Economic impact of security breaches; Economic impact of malware
засекреченность (безопасность) данных; недоступность данных; защита данных
ring of formal power series         
GENERALIZATION OF A POLYNOMIAL, WHERE THE NUMBER OF TERMS IS ALLOWED TO BE INFINITE, DEFINED ALGEBRAICALLY WITHOUT CONSIDERATION OF CONVERGENCE (SO THAT E.G. EVALUATION IS NOT ALWAYS DEFINED)
Formal Laurent series; Formal series; Non-commuting formal power series; Power series ring; Ring of formal power series; K((x)); R((x)); Ring of formal Laurent series; Formal power series ring; Magnus ring; Formal power serie; Formal power series over a semiring; Operations on formal power series
кольцо формальных степенных рядов

Определение

БОИНГ
(Boeing) Уильям Эдуард (1881-1956) , американский авиаконструктор и промышленник. В 1916 основал фирму "Пасифик аэро продактс" (Pacific Aero Products), сменившую название через несколько месяцев на "Боинг эрплейн" (Boeng Airplane Co.) и выпускавшую до 1927 в основном военные самолеты. Организовал почтовые авиаперевозки, в 1926 создал свою авиатранспортную компанию. Его имя носит современная фирма "Боинг".

Википедия

Concrete security

In cryptography, concrete security or exact security is a practice-oriented approach that aims to give more precise estimates of the computational complexities of adversarial tasks than polynomial equivalence would allow. It quantifies the security of a cryptosystem by bounding the probability of success for an adversary running for a fixed amount of time. Security proofs with precise analyses are referred to as concrete.

Traditionally, provable security is asymptotic: it classifies the hardness of computational problems using polynomial-time reducibility. Secure schemes are defined to be those in which the advantage of any computationally bounded adversary is negligible. While such a theoretical guarantee is important, in practice one needs to know exactly how efficient a reduction is because of the need to instantiate the security parameter - it is not enough to know that "sufficiently large" security parameters will do. An inefficient reduction results either in the success probability for the adversary or the resource requirement of the scheme being greater than desired.

Concrete security parametrizes all the resources available to the adversary, such as running time and memory, and other resources specific to the system in question, such as the number of plaintexts it can obtain or the number of queries it can make to any oracles available. Then the advantage of the adversary is upper bounded as a function of these resources and of the problem size. It is often possible to give a lower bound (i.e. an adversarial strategy) matching the upper bound, hence the name exact security.

Как переводится formal security model на Русский язык