Глоссарий





Новости переводов

19 апреля, 2024

Translations in furniture production

07 февраля, 2024

Ghostwriting vs. Copywriting

30 января, 2024

Preparing a scientific article for publication in an electronic (online) journal

20 декабря, 2023

Translation and editing of drawings in CAD systems

10 декабря, 2023

About automatic speech recognition

30 ноября, 2023

Translation services for tunneling shields and tunnel construction technologies

22 ноября, 2023

Proofreading of English text



Глоссарии и словари бюро переводов Фларус

Поиск в глоссариях:  

Subject access request

Глоссарий терминов по социальной инженерии и информационной безопасности
    Under gdpr, data subjects can now make a subject access request to an organisation for all personal information held on them and an in-depth description of how it is being processed. this request must be met “without undue delay and any event within one month of the receipt of the request”. organisations should have streamlined processes in place to handle such requests smoothly and efficiently. === src="images/icons/information2.png" alt="tab-nabbing"




Organisation, английский
  1. An owner or an operator, or a person or a body that is both owner and operator.

  2. 1. a group of people set up for a particular purpose 2. the planning or arranging of something  the organisation of the rota 3. the way in which the component parts of something are arranged

  3. Организационная структура (компании)


Information, английский
  1. Knowledge of a particular event or situation, or knowledge communicated or received concerning a particular fact.

  2. Информация

  3. Facts about something  have you any information about the treatment of sunburn?  the police won’t give us any information about how the accident happened.  you haven’t given me enough information about when your symptoms started.  that’s a very useful piece or bit of information. (note: no plural: some information; a piece of information.)

  4. N информация | attr. информационный flow, structure source of ~ источник информации 1 ранее использовался в более широком значении как ‘умозаключе- ние’. 2 получение выводных данных в процессе обработки информации и/или языка и само выводное знание, умозаключение; мыслительная операция, в ходе которой человек выходит за пределы данных в тек- сте сведений и получает новую информацию. 3 аффикс, вставляемый внутрь корня слова при словообразовании или словоизменении.

  5. In admiralty courts, implies a clause introduced into a citation, intimating that in the event of a party cited not appearing, the court will proceed in his absence.

  6. Информация; данные; сведения

  7. Координационный комитет ин4юрмации о проектируемых и возводимых объектах строительства

  8. Literally that which forms within, but more adequately

  9. Data that has been recorded, classified, organized, related or interpreted so that meaning is apparent.

  10. Contextualised data providing answer to a certain question decreasing uncertainty.

  11. Информация, сведения


Description, английский
  1. Описание

  2. Описание (примеров осуществления изобретения)

  3. N описание phonetic ~ фонетическое описание sensory-based ~ псхл. описание, основанное на восприятиях structural ~ структурное описание

  4. Описание; характеристика description formописательная форма

  5. Описание; характеристика; обозначение

  6. Part of a patent application or specification. discloses the invention as claimed, specifies the technical field to which the invention relates and indicates any prior art the applicant is aware of.


Streamlined, английский

Tab-nabbing, английский
    Occurs when a malicious url opens in a browser’s open tab. it usually happens without the user being immediately aware of it. the tabs opened are often designed to imitate a legitimate site in order to trick the user into entering their credentials or providing other sensitive information.


Steganography, английский
    The practice of concealing a file within another one. for example, a social engineer might hide a malicious executable inside a jpeg file, which he then emails to his victim. upon clicking a seemingly benign photo, a malicious trojan then gets activated which communicates back to the attacker’s command and control centre. this makes steganography a useful technique for data exfiltration or credential harvesting. steganographic techniques can also be used by rogue employees to exfiltrate data out of an organisation by hiding confidential files, e.g. customer database files that are hidden amongst graphic design files.