Перевод: с русского на все языки

со всех языков на русский

penetration of tool

См. также в других словарях:

  • Cone penetration test — A CPT truck operated by the USGS. The cone penetration test (CPT) is an in situ testing method used to determine the geotechnical engineering properties of soils and delineating soil stratigraphy. It was initially developed in the 1950s at the… …   Wikipedia

  • hand tool — any tool or implement designed for manual operation. * * * Introduction  any of the implements used by craftsmen in manual operations, such as chopping, chiseling, sawing, filing, or forging. Complementary tools, often needed as auxiliaries to… …   Universalium

  • Jig (tool) — In metalworking and woodworking, a jig is a type of tool used to control the location and/or motion of another tool. A jig s primary purpose is to provide repeatability, accuracy, and interchangeability in the manufacturing of products.[1] A jig… …   Wikipedia

  • Security Administrator Tool for Analyzing Networks — The Security Administrator Tool for Analyzing Networks (SATAN) is a testing and reporting toolbox that collects a variety of information about networked hosts and was considered one of the best when written. In fact, it was the first truly user… …   Wikipedia

  • Harrow (tool) — In agriculture, a set of harrows is an implement for cultivating the surface of the soil. In this way it is distinct in its effect from the plough, which is used for deeper cultivation. They are commonly called harrows (plural) as they are used… …   Wikipedia

  • SAINT (software) — For other uses of the word Saint , please refer to Saint (disambiguation). SAINT (System Administrator’s Integrated Network Tool) is computer software used for scanning computer networks for security vulnerabilities, and exploiting found… …   Wikipedia

  • Cross-site scripting — (XSS) is a type of computer security vulnerability typically found in Web applications that enables attackers to inject client side script into Web pages viewed by other users. A cross site scripting vulnerability may be used by attackers to… …   Wikipedia

  • Operation Aurora — was a cyber attack which began in mid 2009 and continued through December 2009.[1] The attack was first publicly disclosed by Google on January 12, 2010, in a blog post.[2] In the blog post, Google said the attack originated in China. The attacks …   Wikipedia

  • Drilling rig — For a detailed diagram of a Petroleum drilling rig, see List of components of oil drilling rigs. Drilling rig preparing rock blasting …   Wikipedia

  • Blut-Gehirn-Schranke — Die Blut Hirn Schranke, auch Blut Gehirn Schranke genannt, ist eine bei allen Landwirbeltieren (Tetrapoda) im Gehirn vorhandene physiologische Barriere zwischen dem Blutkreislauf und dem Zentralnervensystem. Sie dient dazu, die Milieubedingungen… …   Deutsch Wikipedia

  • Endotheliale Blut-Hirn-Schranke — Die Blut Hirn Schranke, auch Blut Gehirn Schranke genannt, ist eine bei allen Landwirbeltieren (Tetrapoda) im Gehirn vorhandene physiologische Barriere zwischen dem Blutkreislauf und dem Zentralnervensystem. Sie dient dazu, die Milieubedingungen… …   Deutsch Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»