-
1 fraudulent connection
-
2 fraudulent connection
несанкционированное соединение; злонамеренное (при) соединениеАнгло-русский словарь по компьютерной безопасности > fraudulent connection
-
3 connection
соединение; присоединениеАнгло-русский словарь по компьютерной безопасности > connection
-
4 message
Англо-русский словарь по компьютерной безопасности > message
-
5 application
1. n заявление; заявкаapplication form — бланк заявки; бланк для заявления
2. n просьба, обращение3. n юр. заявление, письменное ходатайство суду или судье4. n применение, приложение; использование5. n применение, употребление6. n прикладывание, накладывание; нанесение7. n мат. наложение8. n с. -х. проф. внесение удобрений или ядохимикатовsupplemental application — дополнительное удобрение, подкормка
reissue application — заявка на выдачу переизданного или исправленного патента; заявка на переизданный патент
9. n аппликация10. n прилежание, рвение, внимание11. n информ. программаСинонимический ряд:1. administration (noun) administration; dispensation2. association (noun) association; connection; relationship3. attention (noun) attention; concentration; consideration; debate; deliberation; heed; study4. bearing (noun) aptitude; aptness; bearing; pertinence; relevance; suitability; usability; utility5. persistence (noun) assiduity; assiduousness; commitment; dedication; devotion; diligence; effort; industriousness; industry; perseverance; persistence; sedulousness6. petition (noun) bid; document; form; inquiry; petition; questionnaire; report; request; solicitation7. prayer (noun) appeal; entreaty; imploration; imprecation; orison; plea; prayer; suit; supplication8. software (noun) module; procedure; program; programming; software; software package9. use (noun) appliance; applying; duty; employment; exercise; exercising; exertion; function; implementation; operation; play; practice; service; usage; usance; use; utilisation; utilizationАнтонимический ряд:
См. также в других словарях:
Fraudulent conveyance — A fraudulent conveyance, also fraudulent transfer is a civil cause of action. It arises in debtor/creditor relations, particularly with reference to insolvent debtors. The cause of action is typically brought by creditors or by bankruptcy… … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Economic Affairs — ▪ 2006 Introduction In 2005 rising U.S. deficits, tight monetary policies, and higher oil prices triggered by hurricane damage in the Gulf of Mexico were moderating influences on the world economy and on U.S. stock markets, but some other… … Universalium
2003 Mutual-fund scandal — The mutual fund scandal of 2003 was the result of the discovery of illegal late trading and market timing practices on the part of certain hedge fund and mutual fund companies.pitzer investigationOn September 3, 2003, New York Attorney General… … Wikipedia
SEC Rule 10b-5 — is one of the most important rules promulgated by the U.S. Securities and Exchange Commission, pursuant to its authority granted under the Securities Exchange Act of 1934. The rule prohibits any act or omission resulting in fraud or deceit in… … Wikipedia
2003 mutual fund scandal — The mutual fund scandal of 2003 was the result of the discovery of illegal late trading and market timing practices on the part of certain hedge fund and mutual fund companies. Contents 1 Spitzer investigation 1.1 Late trading 1.2 Market timing … Wikipedia
Majestic 12 — This article is about the purported secret committee called Majestic 12 . For other uses, see Majestic 12 (disambiguation). The 1947 letter, purported to be signed by Harry Truman, authorizing Operation Majestic Twelve . Majestic 12 (also known… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
E-mail spam — E mail spam, also known as bulk e mail or junk e mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e mail. A common synonym for spam is unsolicited bulk e mail (UBE). Definitions of spam usually… … Wikipedia
Bankruptcy in the United States — The United States Constitution (Article 1, Section 8, Clause 4) authorizes Congress to enact uniform Laws on the subject of Bankruptcies throughout the United States. Congress has exercised this authority several times since 1801, most recently… … Wikipedia
USA PATRIOT Act — Full title Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 Acronym USA PATRIOT Act, also Patriot Act Enacted by the 107th United States Congress … Wikipedia