PONS.com'u nasıl kullanmak istersin?

PONS Pur veya PONS Translate Pro'ya abone oldun mu?

Reklam ile PONS

PONS.com'u şimdiye kadar olduğu gibi reklam izlemesi ve reklam ile ziyaret et

İzlemeye ilişkin bilgileri veri koruma bilgilerinde ve gizlilik ayarlarında bulabilirsin.

PONS Pur

Üçüncü şahıslar tarafından reklam olmadan

Reklam izleme olmadan

Şimdi abone ol

PONS.com için ücretsiz bir kullanıcı hesabın olduğu takdirde, PONS Pur'a abone olabilirsin.

We process your data to deliver content or advertisements and measure the delivery of such content or advertisements to extract insights about our website. We share this information with our partners on the basis of consent and legitimate interest. You may exercise your right to consent or object to a legitimate interest, based on a specific purpose below or at a partner level in the link under each purpose. These choices will be signaled to our vendors participating in the Transparency and Consent Framework.

Cookies, device or similar online identifiers (e.g. login-based identifiers, randomly assigned identifiers, network based identifiers) together with other information (e.g. browser type and information, language, screen size, supported technologies etc.) can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here.

Advertising and content can be personalised based on your profile. Your activity on this service can be used to build or improve a profile about you for personalised advertising and content. Advertising and content performance can be measured. Reports can be generated based on your activity and those of others. Your activity on this service can help develop and improve products and services.

security analysis
Sicherheitsanalyse
se·ˈcu·rity analy·sis ISIM
analy·sis <pl analyses> [əˈnæləsɪs, pl -si:z] ISIM
1. analysis:
Analyse dişil <-, -n>
Beurteilung dişil <-, -en>
2. analysis PSIKO:
[Psycho]analyse dişil
to be in analysis Amerİng
3. analysis EKONOM:
se·cu·rity [sɪˈkjʊərəti, Amerİng -ˈkjʊrət̬i] ISIM
1. security no pl (protection, safety):
Sicherheit dişil <-, -en>
2. security no pl (guards):
Sicherheitsdienst eril <-(e)s, -e>
3. security no pl (permanence, certainty):
Sicherheit dişil <-, -en>
Kündigungsschutz eril <-es> kein pl
4. security no pl (confidence):
Geborgenheit dişil <->
5. security usu tekil (safeguard):
Sicherheit dişil <-, -en>
Schutz eril <-es> gegen +-i hali
6. security no pl (guarantee of payment):
Sicherheit dişil <-, -en>
Kaution dişil <-, -en>
Kreditsicherheit dişil <-, -en>
to use sth as security [for sth]
etw als Sicherheit [für etw -i hali] verwenden
7. security MALIYE (investment):
Wertpapier cinssiz <-(e)s, -e>
Wandelanleihe dişil <-, -n>
Effekten meslek dili pl
8. security (as guarantor):
Bürgschaft dişil <-, -en>
Garantie dişil <-, -ti̱·en>
9. security (being secret):
Geheimhaltung dişil <-, -en>
Diskretion dişil <->
security analysis ISIM MUHASEBE
security ISIM YATFINANS
Sicherheit dişil
security ISIM MALI PIYASALAR
Wertpapier cinssiz
Titel eril
PONS OpenDict

Bir kelime, bir kelime grubu veya bir çeviri mi eklemek istiyorsunuz?

Lütfen PONS OpenDict için yeni bir giriş gönderin. Gönderilen öneriler PONS editörleri tarafından incelenir ve sonuçlara uygun şekilde dahil edilir.

Madde ekle
No example sentences available

No example sentences available

Try a different entry

Tek dilli örnekler (PONS yazı işleri tarafından onaylanmamıştır)
In the early 1930s she considered metaphysical analysis to be useful for considering the psychological process of concept formation.
en.wikipedia.org
A cost-benefit analysis often dictates which disaster recovery measures are implemented.
en.wikipedia.org
Some studies perform a finite element model analysis to investigate the behaviour of the interface.
en.wikipedia.org
This program conducted full scale testing of experimental walls with different configurations and developed analysis procedures for use in design.
en.wikipedia.org
Other agency duties included, e.g., analysis of information gathered and its dissemination.
en.wikipedia.org
İnternetten örnekler (PONS yazı işleri tarafından onaylanmamıştır)
[...]
The services provided by ESCRYPT span the range from the prelimi- nary analysis, conceptualization, system design, and specification of prototype and product development of embedded security solutions to security analyses, evaluation, and certification support of safety-relevant systems.
[...]
www.etas.com
[...]
Die Dienstleistungen von ESCRYPT umfassen unter anderem Voranalyse, Konzeption, Systementwurf, Spezifikation, Prototyp- entwicklung und Produktentwicklung von eingebetteten Sicherheitslösungen sowie Sicherheitsanalysen, Evaluierung und Zertifizierungsunterstützung von sicherheitsrelevanten Systemen.
[...]
[...]
Security analyses for discovery of weaknesses in the company network
[...]
www.secunet.com
[...]
Sicherheitsanalysen zur Erkennung von Schwachstellen im Unternehmensnetzwerk
[...]
[...]
“ In our test lab, function, reliability and interoperability tests, along with individual security analyses and penetration tests, can be carried out and all of the developmental phases considered, from the design of individual services to prototypes to the testing of fully functional comprehensive systems, ” notes Angelika Ruppel of SIT in Munich.
[...]
www.fraunhofer.de
[...]
» In unserem Testlabor können Funktions-, Zuverlässigkeits- und Interoperabilitätstests sowie einzelne Sicherheitsanalysen und Penetrationstests durchgeführt und alle Entwicklungsphasen betrachtet werden, vom Entwurf einzelner Dienste über Prototypen bis hin zum Test einsatzfähiger Gesamtsysteme «, sagt Angelika Ruppel vom SIT in München.
[...]
[...]
ASKS - Architecture-Centric Security Analysis of Business Applications (funded by the BMBF)
[...]
www.informatik.uni-bremen.de
[...]
Architekturbasierte Sicherheitsanalyse geschäftskritischer Software-Systeme (gefördert vom BMBF)
[...]
[...]
Our basic analysis of information security can be excellently combined with a technical security analysis (penetration test) to detect beside organizational improvement potentials also technical weaknesses.
www.secunet.com
[...]
Unsere Basisanalyse Informationssicherheit lässt sich hervorragend mit einer technischen Sicherheitsanalyse (Penetrationstest) verbinden, um neben organisatorischen Verbesserungspotenzialen auch technische Schwachstellen aufzudecken.

Diğer dillerde ara: "security analysis"