单词 | security-analysis |
释义 | 例句释义: 证券分析,安全分析,有价证券分析,安全性分析 1. First published in 1934, his Security Analysis is still considered to be the value investing bible for investors of every ilk. 1934年初版以后,他的《证券分析》一直被各类投资者奉为价值投资的圣经。 www.bing.com 2. The U. N. 's food security analysis unit and a famine warning project known as FEWS-NET say the famine in southern Somalia is growing worse. 联合国粮食安全分析机构和饥荒预警系统网(FEWSNET)表示,索马里南部的饥荒正在恶化。 www.ebigear.com 3. Static security analysis is an important component of energy management system, as an important means to ensure secure operation. 电力系统的静态安全分析是能量管理系统的重要组成部分,是保证系统安全运行的重要手段。 www.boshuo.net 4. Security analysis shows ESMT could guarantee data availability to a certain degree as well as effectively enhance data confidentiality. 安全性分析表明,ESMT能够在保证一定程度的数据可用性的同时,有效的增强数据传输的机密性。 www.fabiao.net 5. The object of security analysis is to answer, or assist in answering, certain questions of a very practical nature. 证券分析的目的是要回答或帮助回答某些非常实际性的问题。 blog.sina.com.cn 6. As information technology security issues become more prominent, the network system security analysis is becoming increasingly important. 随着信息技术安全问题的日益突出,对网络系统进行安全分析日益重要。 www.dictall.com 7. The range of modeling and simulation are: the reactor coolant system (RCP) and the auxiliary systems relative to security analysis. 建模与仿真的范围是:反应堆冷却剂系统(RCP)、与安全分析相关的一回路辅助系统。 www.13191.com 8. All the above can be used as theoretical basis of seismic security analysis and control and economic loss analysis of power supply system. 该工作可作为电力系统地震后安全分析与控制和经济损分析的理论基础。 www.boshuo.net 9. Accurate short-term load forecasting plays an essential role in planning, economical scheduling and security analysis in production. 精确的负荷预测对于电力系统的生产安排、经济调度和安全分析都起着十分重要的作用。 www.juhe8.com 10. Through the security analysis, the model has settled users' best riding problem yet still achieved security property. 安全分析表明,在解决用户跨步问题的前提下,没有降低模型的安全性。 epub.cnki.net 1. The Intelligent Investor was the layman's version of Security Analysis. 而《聪明的投资者》则是《证券分析》一书给外行人看的版本。 www.ftchinese.com 2. To resolve these problems, this paper on two issues: the program for Remote BATS research and static security analysis software development. 为解决上述问题,本文主要研究了两个问题:远方互投方案研究和静态安全分析软件开发。 www.fabiao.net 3. The theoretical security analysis shows that the credibility of this model equals the non-interference model based on the trusted root. 理论分析结果表明,该模型的可信性与基于可信根的无干扰可信模型等价。 www.jsjkx.com 4. Delves into top-down investment methodology as well as individual security analysis. 深入研究了自上而下的投资方法,以及个人安全分析。 www.ccebook.net 5. A third is an original copy of the book you hold in your hands, Graham and Dodd's Security Analysis. 其三乃阁下手捧之格雷厄姆和多德所著《证券分析》(余所藏为原印本)。 blog.sina.com.cn 6. The research shows that extension set and correlation degree analysis is the utility method of network security analysis and control. 研究表明,可拓集与关联度分析是网络安全分析与控制的有效工具。 lib.cqvip.com 7. Assist to complete each promotion of financial product, and participate in making the security analysis report. 协助完成各项金融产品的推广,并参与完成证券分析报告。 www.tianya.cn 8. The main book on the fundamental analysis of stocks is Security Analysis by Graham and Dodd. 基本面分析方面主要的书是格雷厄姆和多德写的《证券分析》。 bbs.translators.com.cn 9. That doesn't mean your child needs an M. B. A. in security analysis or that you need to hire a financial adviser to tutor your preschooler. 这并不意味着你家孩子需要念个证券分析领域的MBA、或者你该聘个理财顾问来给家里的学龄前儿童来个启蒙教育。 chinese.wsj.com 10. Please discusses and selects an industry to do security analysis. 请选择一个行业进行分析讨论。 img3.zhubajie.com 1. In 1934 Graham and Dodd had co-authored the seminal text on investing, Security Analysis. 1934年,格雷厄姆与多德合著了投资领域影响深远的教科书《证券分析》(SecurityAnalysis)。 www.ftchinese.com 2. In general, no. I am no longer an advocate of elaborate techniques of security analysis in order to find superior value opportunities. 现在来说,我不再是对证券做出精细的分析,以找出更好的价值机会的技术的支持者了。 www.bing.com 3. And so this concludes my song and Web security analysis. 我的歌曲和Web安全性分析到此就结束了。 www.ibm.com 4. At last, NS-2 platform is adopted to simulate them and make performance and security analysis. 采用NS-2平台对其进行仿真,并进行性能和安全性分析。 www.ceps.com.tw 5. At last NS-2 platform was adopted to simulate it and make performance and security analysis. 最后采用NS-2平台对其进行仿真,并进行了性能和安全性的分析。 www.ceps.com.tw 6. A Security Analysis of the IPSec Based WLAN Solution and a Study of Its Algorithm 基于IPSec的无线局域网安全通信机制分析及其算法研究 www.ilib.cn 7. Security Analysis of a Multistage Chaotic Encryption System and its Secret Key Mapping Technique 一个多级混沌加密系统的安全性分析及其密钥映射技术 service.ilib.cn 8. Operational Research Insurance Managerial Accounting International Trade International Finance Security Analysis and Investment 运筹学保险学管理会计国际贸易国际金融证券投资学 wenku.baidu.com 9. Environmental Security Analysis of In fluence of Genetically Modified Soybean to Local Soybean and Its Countermeasure 种植转基因大豆对地产大豆的环境安全分析与对策研究 www.ilib.cn 10. attack graph; network attack modeling; vulnerability detection; scalability; network security analysis; network key point; 攻击图;网络建模;漏洞检测;可扩展性;网络安全浅析浅析;网络关键节点; www.zidir.com 1. Security Analysis and Improvement of A Zero-knowledge Proof Identification Scheme 一种零知识证明协议的安全分析与改进 service.ilib.cn 2. Security analysis of a threshold shared verification signature scheme 对一个门限共享验证签名方案的安全性分析 www.ilib.cn 3. Security Analysis and Improvement of a Message Recovery Signature Scheme 一个具有恢复消息的数字签名方案的安全性分析及其改进 www.ilib.cn 4. the modern power system; static voltage stability study; modal analysis method; Jacobian matrix; power system static security analysis; 现代电力系统;静态电压稳定性;模态浅析浅析法;雅可比矩阵;稳定裕度;静态安全浅析浅析; www.zidir.com 5. Network Security Protocol by PKI Structure and Security Analysis of Its Typical Cryptosystem PKI结构下网络安全协议模型及典型密码体制安全性分析 www.ilib.cn 6. The positive Chinese line surmounts the tower pile foundation to the embankment flood prevention security analysis Appraisal 阳汉线跨越塔桩基对堤防防洪安全的分析评价 www.ilib.cn 7. Remote Sensing Dynamic Change Monitoring of Cultivated Land and Ecological Environment Security Analysis in Region of Yellow River Mouth 黄河口耕地遥感动态临测及其生态环境安全分析 www.ilib.cn 8. The security analysis of the chaotic spreading sequences generated by the extended chaotic map 广义映射混沌扩频序列的保密性分析 ilib.cn 9. The security analysis for the determination of lightning arrester protective range with fold line and ground ball methods 折线法和滚球法确定避雷针保护范围的安全性分析 service.ilib.cn 10. Security Analysis and Solution of Transparent Factory Network-- Ethernet for Industrial Control Networks 透明工厂网络的安全性分析与解决方案--用于工业控制网络的以太网 scholar.ilib.cn 1. Security Analysis and Radioprotection Method of Sealed Source Used in Nuclear Logging 核测井用密封放射源辐射防护方法和安全性分析 service.ilib.cn 2. The Security Analysis of the Framework Structure with Unequal Foundation Settlement 地基不均匀沉降后的某框架结构安全性分析 168.160.184.78 3. Security analysis of a signature scheme with message recovery 一个具有消息恢复的签名方案的安全性分析 service.ilib.cn 4. Network security analysis and countermeasures of dispatching automation system in Sanshui 三水调度自动化系统网络信息安全分析与对策 www.ilib.cn 5. Formal Model and Security Analysis for Cryptographic Protocols in the Distributed Network Environment 分布式网络环境下密码协议形式模型和安全性 www.ilib.cn 6. Security Analysis and Solutions of a Video Conference System 视频会议系统的安全分析与措施 service.ilib.cn 7. Network Security Analysis and Countermeasures in Libraries of Colleges and Universities 高校图书馆网络安全分析与对策 service.ilib.cn 8. Dynamic Security Analysis of Frame Structure Encountering Blasting Seismic Wave, 汪芳,框架结构在爆破地震波作用下的动力安全性分析, www.luxinzheng.net 9. SOAP Message Security Analysis and Implementation of Encryption, Signature SOAP消息安全性分析及其加密、签名的实现 ilib.cn 10. Research on Security Analysis of District Power Network Considering the Maximal Load Forecasting 考虑最大负荷预测的地区电网静态安全分析研究 service.ilib.cn 1. security analysis of public - key cryptography based on chaotic attractors of neural networks and its implementation 基于神经网络混沌吸引子的公钥密码算法安全性分析及其实现 www.ichacha.net 2. A Masked Electronic Codebook Mode of Operation and Its Security Analysis 一个伪装的电码本模式及其安全性分析 service.ilib.cn 3. Security Analysis of Publicly Available Keyless Watermarking System 公开可得到的无密码水印系统的安全性分析 service.ilib.cn 4. Improvement of TLS in the Wireless Environment and its Security Analysis TLS在无线环境下的改进及安全性分析 www.ilib.cn 5. Key exchange implementation and security analysis for IPSec based virtual private network 基于IPSec的虚拟专用网络密钥交换实现及其安全分析 www.ilib.cn 6. Security Analysis of an Elliptic-Curve Based Encryption Scheme 对一种基于椭圆曲线加密体制的安全性分析 service.ilib.cn 7. Security Analysis and Researching Guides for Encryption Algorithms 密码算法的安全性分析及研究方向 www.ilib.cn 8. Security Analysis on a Multicast Source Authentication Scheme 一个组播源认证方案的安全分析 www.ilib.cn 9. Dual-velocity protocol of hybrid QKD system and its security analysis 复合量子密钥分发系统双速协议及其安全性分析 www.ilib.cn 10. Security analysis and improvement of several partial blind signature schemes 对几种部分盲签名方案的安全性分析与改进 www.ilib.cn 1. Mainstream operating system security analysis and security 主流操作系统安全性分析及安全策略 www.ilib.cn 2. A Statistic Analysis of Investors'Information Demand from Security Analysis 投资者对证券分析师的信息需求统计分析 www.ilib.cn 3. A Novel Multilevel Security Petri Net and its Security Analysis 一种新的安全Petri网及其多级安全机制分析 service.ilib.cn 4. Security Analysis and Protection of Public Security Information Network of City-Level 地市级公安信息网安全分析与防范 www.ilib.cn 5. Security analysis of a digital multisignature scheme 一种多重数字签名方案的安全性分析 service.ilib.cn 6. Environmental Security Analysis and Evaluation of High-rise Buildings 高层建筑的环境安全分析与评价 service.ilib.cn 7. Security Analysis and Solution of User Password Identification Scheme 用户名密码认证方案的安全性分析及解决方案 www.ilib.cn 8. Reinforcing Technology and Security Analysis of Existing Tunnel 既有隧道安全性分析与加固技术 ilib.cn 9. Research and Security Analysis on Identity Authentication 身份认证技术的研究与安全性分析 ilib.cn 10. Design and Application of Static Security Analysis in a Sub-Transmission Network Based on Twice Topology Analysis 基于双拓扑分析的地区电网静态安全分析 www.ilib.cn 1. Identity Authentication Mechanism Based on Chaotic Theory and its Security Analysis 基于混沌理论的身份认证机制及其安全性分析 service.ilib.cn 2. Wlan Security Analysis and Implementation of Intrusion Detection on Linux 基于Linux的无线网络安全分析与入侵检测 service.ilib.cn 3. Security Analysis and Research of Routing Protocols in Wireless Sensor Network 无线传感器网络路由协议的安全性分析与研究 service.ilib.cn 4. Security Analysis about Operation in Municipal Drainage System 城市排水系统运行安全性分析 168.160.184.78 5. Security analysis of a new ID-based signcryption 基于ID的新签密方案的安全性分析 service.ilib.cn 6. Mandatory Access Control Modeling and Security Analysis: A Petri-Nets Based Method 基于Petri网的强制访问控制模型及其安全分析 service.ilib.cn 7. Improved CBC mode of operation and its security analysis 改进的CBC模式及其安全性分析 service.ilib.cn 8. Security Analysis and Improvement of Wired Equivalent Privacy 有线等价私密算法的安全性能分析与改进 www.ilib.cn 9. Determination of Residual Nicarbazin by HPLC and Security Analysis 尼卡巴嗪残留量测定和安全性分析 www.ilib.cn 10. Security Analysis for Steam Turbine Starting and Stopping without Motor Pump 汽动给水泵实现大型汽轮机组启停的安全性分析 www.ilib.cn 1. The Data Security Analysis of the Nonvolatile Memorizer 非易失存储器数据安全性研究 www.ilib.cn 2. Introduction and security analysis of triple churning algorithm in EPON EPON三重搅动加密算法及其安全性分析 www.ilib.cn 3. Detecting and security analysis of spillway radial gate in Shimen reservoir 石门水库溢洪道弧形闸门检测与安全分析 scholar.ilib.cn 4. A Security Analysis On Network Services Of Routers and the Corresponding Strategies 路由器网络服务安全性分析与对策 service.ilib.cn 5. Security Analysis on Administrative Model of Role-Based Access Control 基于角色访问控制管理模型的安全性分析 www.ilib.cn 6. The Security Analysis to Balanced Shrinking Generators 平衡收缩序列的安全性分析 www.ichacha.net 7. Security Analysis and Security Protection for Stock Network 证券网络的安全分析与防范措施 ilib.cn 8. security analysis of ku - chien ' s remote authentication scheme 远程身份认证方案的安全性分析 www.ichacha.net 9. Research on seismic security analysis and flow load control of power supply system 供电系统地震安全分析与负荷控制研究 service.ilib.cn 10. Security analysis for proactive secret sharing system 先应秘密共享系统的安全性分析 www.ilib.cn 1. The Security Analysis on the JSP Application and the Solving Countermeasures JSP应用安全分析及解决对策 www.ilib.cn 2. Data Communication Security Analysis in Same CityCollectFees System 同城收费系统中数据传输的安全性分析 service.ilib.cn 3. Security Analysis On The Query Policy For Database Encryption System 密文数据库查询策略安全性的分析 ilib.cn 4. Security analysis on authorized group signature 授权群签名的安全性分析 scholar.ilib.cn 5. Security Analysis on Electronic Business System 企业电子商务系统的安全性分析 www.ilib.cn 6. Security Analysis of Hunan Electric Power Computer Wide Area Network 湖南电力计算机广域网安全分析 ilib.cn 7. The Security Analysis and Improvement of Remote Online Network Racks 远程在线实验平台的安全性分析与改进 ilib.cn 8. The Security Analysis of Broadband IP Metropolitan Area Network 宽带城域网的网络安全分析 www.ilib.cn 9. DAMODARAN ON VALUATION: Security Analysis for Investment and Corporate Finance 价值评估:证券分析、投资评估与公司理财 www.china-pub.com 10. New Approach to Load-shedding in Static State Security Analysis of Power Systems 静态安全分析中的联动切负荷算法 www.ilib.cn 1. Research of User Authentication Mechanismand Its Security Analysis 身份认证机制研究及其安全性分析 www.ilib.com.cn 2. Research on computer network security analysis model 计算机网络安全性分析建模研究 service.ilib.cn 3. Security Analysis of Area Navigation Parallel Airway 平行区域导航航路安全性分析 www.ilib.cn 4. User IdentityNetwork Based Behavior Security Analysis 网络行为分析用户关联安全分析 wenku.baidu.com 5. Security Analysis and Measures of WEB Application Program WEB应用程序安全性分析及措施 www.ilib.cn 6. Design and security analysis of GSM authentication scheme GSM系统认证算法的设计与安全性分析 www.ilib.cn 7. Practical Analysis on EMS Static Security Analysis Module EMS中静态安全分析模块实用化分析 www.ilib.cn 8. Security analysis of electronic records filing 电子文件归档的安全性分析 www.ilib.cn 9. Security analysis of Chang et al. 's signature scheme with message recovery 对Chang等人的消息可恢复式签名方案的安全性分析 service.ilib.cn 10. Conducting a workplace security analysis 工作场所安保分析 blog.sina.com.cn 1. Operational Security Analysis of Coal Types in Banshan Power Plant 半山电厂燃用煤种的运行安全性分析 www.ilib.cn 2. Security analysis of tow threshold signature scheme 两种门限签名方案的安全性分析 www.ilib.cn 3. Security Analysis of Online Education and Solutions 远程教育网络安全分析及解决方案 www.ilib.cn 4. Security Analysis Of Air-Conditioning Cooled Medium 空调冷媒的安全性分析 www.ilib.cn 5. Installation and security analysis of library FTP server 图书馆FTP服务器的建立和安全分析 service.ilib.cn 6. Overturning security analysis of ladle turret 钢包旋转塔的倾覆安全分析 www.ilib.cn 7. Computer-Based Power System Security Analysis 电力系统计算机安全分析 ilib.cn 8. The Security Analysis and Countermeasures of Fried Food 油炸食品安全性分析及对策措施 www.ilib.cn 9. Web-based Decision Support System for Security Analysis 基于Web的证券分析决策支持系统 ilib.cn 10. Application of Security Analysis of Grounding System using CDEGS Software in Large Power Plant CDEGS软件在大型火力发电厂接地系统安全分析中的应用 www.ilib.cn 1. Security analysis of a key management scheme for multicast based on the one-way function tree 基于单向函数树的多播密钥管理方案安全性分析 www.ilib.cn 2. Master of Social Science (Security Analysis) 社会学硕士(安全分析) www.baike.com 3. Security analysis and basic strategies for GPRS access GPRS接入的安全分析与基本对策 www.ilib.cn 4. Security analysis and solutions of campus network 校园网安全分析及解决方法 www.ilib.cn 5. Security Analysis of Proxy Blind Signature Scheme 代理盲签名方案的安全性分析 www.ilib.cn 6. The Security Analysis and the Security Tactics of Library's Information System 图书馆信息系统的安全分析与安全策略 www.ilib.cn 7. The Security Analysis about the Threshold Digital Signature Scheme Based on Discrete Logarithm and Quadratic Residue 基于离散对数和二次剩余的门限数字签名体制的安全性分析 service.ilib.cn 8. Security Analysis About One Phase of Power Network Short to Ground in Ship 船舶电网单相对地短路的安全性分析 ilib.cn 9. Security Analysis Using Value-Based Metrics 证券分析:基于价值的方法 eclass.cfaspace.com 10. Foundations of Security Analysis and Design 安全分析与设计基础 list.dangdang.com 1. Security Analysis Tool for Auditing Network 用于检杳网络的安全分析工具 sh.netsh.com 2. PART VII ADDITIONAL ASPECTS OF SECURITY ANALYSIS. DISCREPANCIES BETWEEN PRICE AND VALUE 第VII部分证券分析的其他方面。价格和价值的偏离 blog.sina.com.cn 3. Power System Probabilistic Security Analysis Based on Small Signal Stability Region 基于小扰动稳定域的电力系统概率安全分析 ilib.com.cn 4. Security analysis and design of special computer LAN 专用计算机局域网安全性分析与设计方法讨论 www.ilib.cn 5. Network security analysis based on intrusion detection technology 基于入侵检测技术的网络安全分析 www.ilib.cn 6. Security analysis of feed-forward stream cipher 前馈序列密码的安全性分析 www.ilib.cn 7. Security analysis of urban central heating 城市集中供热的安全性与分析 ilib.cn 8. The Security Analysis of GSM System's Airborne Interface GSM系统的空中接口安全性分析 www.ilib.cn 9. Security Analysis of the Open Crude Tanks in Oil Field 油田原油罐敞口运行的安全性分析 www.ilib.cn 10. Security Analysis and Policy in NGN Networking NGN组网的安全性分析与安全策略 www.ilib.cn 1. Security Analysis of ASP Network Database ASP环境下的网络安全分析 www.ilib.cn 2. Security Analysis of Embankment Stability Based on Reliability Theory 基于可靠度理论的路堤稳定安全性分析 www.ilib.cn 3. A Network Security Analysis Method Research and Application Based on Case-based Reasoning 基于安全案例推理的网络安全分析方法研究与应用 www.ilib.cn 4. Security Analysis of the Integrated Campus-card System Based on Intranet 基于校园网的一卡通系统安全性分析 ilib.cn 5. Security Analysis of Authenticated Key Exchange Protocol Based on Password 基于口令认证的密钥交换协议的安全性分析 www.ilib.cn 6. Implementation of VPN Based on IPSec and Its Security Analysis 基于IPSec的虚拟专用网的实现和安全性分析 www.wanfangdata.com.cn 7. Security analysis of authenticated encryption based on Oracle model 基于Oracle模型的可认证加密协议安全性分析 www.ilib.cn 8. Security Analysis of Authentication Based on Environment Variable in CGI Mode CGI模式中基于环境变量认证的安全性分析 www.ilib.cn 9. Security Analysis of a Key for Multicast Based on the One-way Function Tree 基于单向函数树的多播密钥安全性分析 www.ilib.cn 10. Food Security Analysis of Mushroom Dictyophora rubrovalvata 红托竹荪的食品安全分析 service.ilib.cn 1. Security Analysis by Benjamin Graham and David Dodd (1934 Edition) 证券分析(1934版)本杰明·格雷厄姆;戴维·多得 blog.sina.com.cn 2. A Network Security Analysis Method Research and Application Based on Graph Theory 基于图论的网络安全分析方法研究与应用 www.ilib.cn 3. Security Analysis of DFH Communication System 相关跳频通信系统安全性分析 www.ilib.cn 4. Break-even Security Analysis and graph 盈亏安全幅度分析和盈亏平衡图 www.51ea.com 5. Security Analysis and Improvement of Cheat-Proof Secret Sharing Scheme Based on RSA 基于RSA防欺诈秘密共享体制的安全性分析和改进 service.ilib.cn 6. Security analysis of student Ioan 助学贷款证券化探析 www.ilib.cn 7. Security analysis of computer LAN 计算机局域网安全浅析 service.ilib.cn 8. Research of Security Analysis and Audit Technique Based on Network Content 网络内容安全分析及审计技术研究 www.ilib.cn 9. Security Analysis of Some Proxy Multi-Signature Schemes Based on Elliptic Curve Cryptosystem 基于椭圆曲线的代理多签名方案的安全性分析 service.ilib.cn 10. Security Analysis of Real-Time Embedded Software System Based on Time Petri Nets 基于时间Petri网的实时嵌入式软件系统安全性分析 ilib.cn 1. The Structure of Internet Education System and the Security Analysis 网上教学体系结构和安全性分析 www.ilib.cn 2. Security analysis of two protocol based on RSA 两个基于RSA的密码协议的安全性分析 www.ilib.cn 3. The security analysis and solutions for network's management based on SNMP 基于SNMP网管的安全性分析及解决办法 www.ilib.cn 4. The security analysis based on images information hiding 基于图像的信息隐藏安全性分析 www.ilib.cn 5. MARKET ANALYSIS AND SECURITY ANALYSIS 697 市场分析和证券分析697 blog.sina.com.cn 6. Security Analysis of Summer Peak for Beijing Grid in 2007 2007年北京电网度夏方式分析 www.ilib.cn 7. Security analysis of Intemet layers 因特网各层安全性分析 www.ilib.cn 8. Security analysis on a kind of group signatures 对一种群签名方案的安全性分析 service.ilib.cn 9. Computer security analysis model based on fault tree 基于故障树的计算机安全性分析模型 service.ilib.cn 10. Security Analysis and Prevention Based on DNS Attack 基于DNS攻击的安全分析及其防范 168.160.184.78 1. Protocols Security Analysis Based on Ideal 基于理想的协议安全性分析 www.ilib.cn 2. Economy and security analysis of AC UHV in China 交流特高压在中国应用的经济和安全分析研究 www.ilib.cn |
随便看 |
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。