Subject | English | Polish |
transp., nautic. | Cargo Securing Manual | poradnik mocowania ładunków |
IT | Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace | strategia Unii Europejskiej w zakresie bezpieczeństwa cybernetycznego |
IT | Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace | strategia bezpieczeństwa cybernetycznego Unii Europejskiej: otwarta, bezpieczna i chroniona cyberprzestrzeń |
gen. | Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace | strategia bezpieczeństwa cybernetycznego Unii Europejskiej |
energ.ind. | Energy 2020 - A strategy for competitive, sustainable and secure energy | "Energia 2020" – Strategia na rzecz konkurencyjnego, zrównoważonego i bezpiecznego sektora energetycznego |
gen. | Energy 2020 - A strategy for competitive, sustainable and secure energy | strategia "Energia 2020" |
R&D. | Inclusive, innovative and secure societies | Integracyjne, innowacyjne i bezpieczne społeczeństwa |
econ., fin. | price securing | ustalanie cen |
gen. | safe and secure environment | bezpieczne i zabezpieczone środowisko |
gen. | secure a deal | ubić interes |
comp., MS | secure bit | serwer iSNS firmy Microsoft (The bit in a key message used to notify the supplicant and authenticator when a key exchange is complete and a link is considered secure. The bit is set to 0 (not secure) or 1 (secure)) |
comp., MS | secure channel | bezpieczny kanał (A Security Support Provider (SSP) that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols) |
R&D. | Secure, clean and efficient energy | Bezpieczna, ekologiczna i efektywna energia |
fin. | secure copy of the model | kopia zapasowa modelu |
fin. | secure copy of the model | zabezpieczona kopia modelu |
comp., MS | secure desktop | bezpieczny pulpit (A desktop that is isolated from other processes running on the system. The secure desktop increases the security of the elevation prompt) |
comp., MS | secure digital card | karta pamięci SD (A memory card about the size of a postage stamp that is supported by many types of devices) |
crim.law., IT | Secure Information Exchange Network Application | aplikacja sieci bezpiecznej wymiany informacji |
comp., MS | Secure/Multipurpose Internet Mail Extensions | S/MIME (An Internet e-mail security-oriented protocol that adds public key encryption and support for digital signatures to the widely used MIME e-mail protocol) |
comp., MS | secure network | sieć zabezpieczona (A logical portion of a network that client computers can access if they either meet corporate health policy or are exempt from meeting corporate health policy) |
comp., MS | secure note | bezpieczna notatka (Any information (e.g. account numbers, sensitive data, etc) with a title and some free-form text that can be stored in a secure manner in a personal vault) |
polit. | secure reading room | zabezpieczona czytelnia |
comp., MS | secure repository | repozytorium zabezpieczeń (The software module responsible for authenticating the valid use of protected content and protecting trusted software processing from modification and observation) |
IT | secure-signature-creation device | bezpieczne urządzenie służące do składania podpisu elektronicznego |
IT | secure-signature-creation device | bezpieczne urządzenie służące do składania podpisów |
comp., MS | Secure Sockets Layer | Secure Sockets Layer, protokół SSL (The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation) |
reliabil. | secure state of an electric power system | stan pewny systemu elektroenergetycznego |
reliabil. | secure state of an electric power system | stan bezpieczny systemu elektroenergetycznego |
comp., MS | Secure Store Service | Usługa bezpiecznego magazynu (The shared service that securely stores credential sets for external data sources and associates those credential sets to identities of individuals or to group identities. This service can be used to support a variety of solutions. For example, the stored credentials can be leveraged by certain applications to enable single sign-on) |
comp., MS | secure zone | bezpieczna strefa (A DNS zone that is stored in Active Directory and to which access control list (ACL) security features are applied) |
zoot. | silkworm breeding in small bags to secure its eggs | rozmnażanie jedwabników |
gen. | The EU Internal Security Strategy in Action: Five steps towards a more secure Europe | Strategia bezpieczeństwa wewnętrznego UE w działaniu: pięć kroków w kierunku bezpieczniejszej Europy |