-
1 territorial
територіальний; земельнийterritorial application of a statute — = territorial application of a law чинність (дія) закону в просторі
territorial application of a law — = territorial application of a statute
territorial claims on neighboring states — = territorial claims on neighbouring states територіальні претензії до сусідніх держав
- territorial acquisition by warterritorial claims on neighbouring states — = territorial claims on neighboring states
- territorial administration
- territorial-administrative
- territorial agreement
- territorial applicability
- territorial asylum
- territorial authorities
- territorial authority
- territorial autonomy
- territorial basis
- territorial bay
- territorial border
- territorial boundaries
- territorial claims
- territorial constituency
- territorial dispute
- territorial domain
- territorial entity
- territorial fiction
- territorial form of government
- territorial integrity
- territorial inviolability
- territorial jurisdiction
- territorial law
- territorial law
- territorial limitation
- territorial limits
- territorial lime
- territorial possessions
- territorial principle
- territorial property
- territorial rights
- territorial sovereignty
- territorial supremacy
- territorial title
- territorial unit
- territorial validity
- territorial waters
См. также в других словарях:
Integrity (operating system) — Infobox OS name = INTEGRITY caption = developer = Green Hills Software source model = Closed Source kernel type = Microkernel supported platforms = ARM, XScale, Blackfin, Freescale ColdFire, MIPS, PowerPC, x86 ui = family = Real time operating… … Wikipedia
INTEGRITY — У этого термина существуют и другие значения, см. Integrity (значения). INTEGRITY Разработчик Green Hills Software Тип ядра Микроядро velOSity Лицензия Проприетарная Состояние Активное Веб с … Википедия
Application firewall — An application firewall is a form of firewall which controls input, output, and/or access from, to, or by an application or service. It operates by monitoring and potentially blocking the input, output, or system service calls which do not meet… … Wikipedia
Application server — In n tier architecture an application server is a server that hosts an API to expose Business Logic and Business Processes for use by other applications [ [http://mediaproducts.gartner.com/reprints/microsoft/vol3/article2/article2.html Magic… … Wikipedia
Integrity Messenger — Infobox Software name = Integrity Messenger caption = developer = Integrity Messenger Corporation released = ? latest release version = 4.11 latest release date = April 29 2005 programming language = ? operating system = Microsoft Windows… … Wikipedia
Signal integrity — or SI is a measure of the quality of an electrical signal. In digital electronics, a stream of binary values is represented by a voltage (or current) waveform. Over short distances and at low bit rates, a simple conductor can transmit this with… … Wikipedia
Data integrity — in its broadest meaning refers to the trustworthiness of system resources over their entire life cycle. In more analytic terms, it is the representational faithfulness of information to the true state of the object that the information represents … Wikipedia
Circuit integrity — fireproofing of cable trays in Lingen/Ems, Germany using calcium silicate board system qualified to DIN 4102 … Wikipedia
Territorial integrity — is the principle under international law that nation states should not attempt to promote secessionist movements or to promote border changes in other nation states. Conversely it states that border changes imposed by force are acts of aggression … Wikipedia
Safety Integrity Level — (SIL) is defined as a relative level of risk reduction provided by a safety function, or to specify a target level of risk reduction. In simple terms, SIL is a measurement of performance required for a Safety Instrumented Function (SIF).Four SIL… … Wikipedia
Check Point Integrity — is an endpoint security software product developed by Check Point Software Technologies. It is designed to protect personal computers and the networks they connect to from computer worms, Trojan horses, spyware, and intrusion attempts by hackers … Wikipedia