-
1 sicheres Hypertext-Tranfer-Protokoll
Hypertext-Tranfer-Protokoll n: sicheres Hypertext-Tranfer-Protokoll n KN sHTTP, secure HTTP (durch Verschlüsselungen und Authentifizierungen)Deutsch-Englisch Wörterbuch der Elektrotechnik und Elektronik > sicheres Hypertext-Tranfer-Protokoll
-
2 öffentliche Beschaffung
государственные закупки
—
[ http://www.eionet.europa.eu/gemet/alphabetic?langcode=en]
государственные закупки
Закупки товаров и услуг, производимые государственными организациями за счет средств государственного бюджета, в целях выполнения задач, поставленных государством перед этими организациями. Как правило, осуществляются на основе и в соответствии с государственным заказом для нужд собственно государственного потребления (закупки оборудования, вооружений) и для обеспечения потребностей населения, например, создания и поддержания государственных резервов на случай чрезвычайных обстоятельств и вмешательства, при необходимости, в рыночные процессы (например, государственные закупки зерна и иного продовольствия). Вся деятельность в этой области регулируется Федеральным законом от 21 июля 2005 г. № 94-ФЗ «О размещении заказов на поставки товаров, выполнение работ, оказание услуг для государственных и муниципальных нужд» в последней редакции. См. также: Закрытые процедуры в закупочной деятельности, Закупка, Закупка у единственного источника, Закупочная документация, Закупочная комиссия, Конкурс, Запрос цен, Конкурсный лист, Тендер.
[ http://slovar-lopatnikov.ru/]EN
public procurement
The governmental process of purchasing supplies, equipment and services, or purchasing contracts to secure the provision of supplies, equipment and services, which are often sold by the private sector. (Source: OED / RHW)
[http://www.eionet.europa.eu/gemet/alphabetic?langcode=en]Тематики
EN
DE
FR
Немецко-русский словарь нормативно-технической терминологии > öffentliche Beschaffung
-
3 Wüstenausbreitungskontrolle
контроль за опустыниванием
—
[ http://www.eionet.europa.eu/gemet/alphabetic?langcode=en]EN
desertification control
Remedial and preventive actions adopted against desertification include irrigation, planting of trees and grasses, the erection of fences to secure sand dunes, and a careful management of water resources. (Source: WRIGHT)
[http://www.eionet.europa.eu/gemet/alphabetic?langcode=en]Тематики
EN
DE
FR
Немецко-русский словарь нормативно-технической терминологии > Wüstenausbreitungskontrolle
См. также в других словарях:
HTTP cookie — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia
Secure Shell — or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. RFC 4252] Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for TELNET… … Wikipedia
Secure communication — includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no… … Wikipedia
Secure by design — Secure by design, in software engineering, means that the software has been designed from the ground up to be secure. Malicious practices are taken for granted and care is taken to minimize impact when a security vulnerability is discovered. For… … Wikipedia
Secure voice — (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. Contents 1 History 2 Analog Secure Voice technologies 3 Di … Wikipedia
Secure Digital Music Initiative — (SDMI) was a forum formed in late 1998, composed of more than 200 IT, consumer electronics, security technology, ISP and recording industry companies, ostensibly with the purpose of developing technology specifications that protected the playing … Wikipedia
Secure electronic transaction — (SET) is a standard protocol for securing credit card transactions over insecure networks, specifically, the Internet. SET is not itself a payment system, but rather a set of security protocols and formats that enables users to employ the… … Wikipedia
Secure Flight — is an airline passenger screening program under development by the Transportation Security Administration. It compares passenger information from Passenger Name Records, containing information given by passengers when booking their flights,… … Wikipedia
HTTP-Tunnel Client — is a program created by HTTP Tunnel Corporation that masks application data as HTTP traffic to bypass firewalls. This is done by routing all outgoing traffic through port 80, the standard HTTP traffic port, and encapsulating this inside HTTP… … Wikipedia
Secure two-party computation — (2PC) is sub problem of secure multi party computation (MPC) that has received special attention by researchers because of its close relation to many cryptographic tasks. It is concerned with the question: Can two party computation be achieved… … Wikipedia
Secure Password Authentication — is a protocol used to authenticate with a Simple Mail Transfer Protocol (SMTP) server. The protocol is attributed to Microsoft, but it is not an original protocol, but based on the NTLM authentication scheme.NTLM Authentication Scheme for… … Wikipedia