网站首页  词典首页

请输入您要查询的英文单词:

 

单词 system security
释义

system security

  • 网络系统安全;系统安全保护;系统保安
1.
系统安全
CMD命令大全 - 雪Pearl的日志 - 网易博客 ... Docking Status 坞站状态 System Security 系统安全 Primary Password 主密码 ...
jen327.blog.163.com
2.
系统安全保护
Documentation ... Serial Communication( 串行通信) System Security系统安全保护) System Password( 系统密码) ...
supportapj.dell.com
3.
系统保安
EMART China ... - Advanced preparation( 预先准备项目) - System Security( 系统保安) ...
shintong.e-mart.com.cn
4.
系统安全装置
...System Power Management)或系统安全装置(System Security)….等高阶系统操作管理的程序。
blog.sina.com.cn
5.
系统安全管理
...系统插件管理(System Plug-in)   系统安全管理System Security)   分析模板管理(Analytical Template)   四、应用模型   
www.enet.com.cn
6.
系统安全防护
All New Embedded... ... 电子邮件服务( E-Mail services) 系统安全防护System security) 系统困难排除( Troubleshooting…
www.geego.com.tw
7.
系统保密
SAP字典 - MBA智库文档 ... SAP system review 系统检查 system security 系统保密 system software associates SSA 公司 ...
doc.mbalib.com

例句

释义:
1.
So needless to say, I was a bit disappointed by the lack of undergraduate software or system security courses offered at WPI.
所以不用说,我有一点失望的是WPI没有提供大学软件或系统安全课程。
www.ibm.com
2.
Here, conducting an assessment of the threat of its system using markov latent effects (MLE) modeling from the point of system security.
从系统安全的角度,采用马尔科夫潜在作用(MLE)模型对供水系统进行威胁评价。
www.lw23.com
3.
The name attribute can be the name of one of the abstract classes found in the System. Security. Cryptography namespace.
name属性可以是位于System.Security.Cryptography命名空间中的某个抽象类的名称。
msdn2.microsoft.com
4.
Any discussion of system security would be incomplete without at least a cursory word or two on the topic of passwords.
如果没有(哪怕是粗略地)提到一两句关于密码的话题,那么任何关于系统安全性的讨论都将是不完整的。
www.ibm.com
5.
To call the OpenFile method, your assembly requires a privilege level granted by the System. Security. Permissions. FileIOPermission class.
若要调用OpenFile方法,程序集要求有System.Security.Permissions.FileIOPermission类授予的权限级别。
msdn2.microsoft.com
6.
All or any of these technologies could be used to provide additional system security.
上述所有技术,或者任何一个,都可以为系统带来更强大的安全防护。
shi-wei.net
7.
The result is determined by the system security policy exclusive of any.
策略之外的系统安全策略决定。
msdn2.microsoft.com
8.
Light of actual needs, the system has taken the role of the licensing mechanism and some other maintenance of system security measures.
根据实际工作的需要,本系统采取了角色授权机制和其它一些保证系统安全的办法。
www.lunwenchina.net.cn
9.
A number of reports detailing wide-ranging system security breaches have been at the forefront of the news in the past couple of years.
在过去几年中,很多详细谈论大范围的系统安全问题的报道成为新闻的一大热点。
www.ibm.com
10.
The company specializes in the production of household intelligent control system security products.
公司主要是生产家庭智能安全控制系统的产品。
zhidao.baidu.com
1.
It is only through user authentication and end-system security assessment, the terminal can access to a dynamic network.
只有通过了用户身份鉴别且终端系统安全状况评估后,终端才能够接入到动态的网络中。
www.fabiao.net
2.
System security, as well as the efforts of the scholars and the president is the key to uphold academic freedom.
制度的保障、大学教师们的努力以及大学校长的坚持是大学坚守学术自由的关键;
www.fabiao.net
3.
For more precise control, you can use the System. Security. Cryptography classes as well.
要进行更精确的控制,也可以使用System.Security.Cryptography类。
msdn2.microsoft.com
4.
"There are already quite enough coal-fired plants coming off the system. Security of supply should be taken seriously, " he warned.
“已经有足够的燃煤电厂从电力系统中脱离出去。应该认真考虑供电安全问题。”他警告说。
www.bing.com
5.
Recently, with application of power electronics systems in various important areas, the system security and reliability are been concerned.
随着电力电子变换器在国民经济的各个重要领域的广泛应用,其安全可靠性备受关注。
www.fabiao.net
6.
SecurityException may be thrown if the system security does not grant the caller access to the called method.
如果系统安全机制没有授予调用方对被调用方法的访问权限,则可能引发SecurityException。
msdn2.microsoft.com
7.
Building the architecture of NCPC information system architecture, design the Network, building the system security and backup strategies.
本文中主要介绍了华药信息化系统架构的搭建,网络规划,系统安全和备份策略。
www.fabiao.net
8.
Discover how the characteristics of processor architecture can contribute to software defects that affect system security.
了解处理器架构特点如何造成影响系统安全性的软件缺陷。
msdn2.microsoft.com
9.
Data encryption is one of the basic measures for computer system security defence .
数据加密是计算机系统安全防护的基本措施之一。
dict.kekenet.com
10.
Redundancy design is an effective way to improve the system security and mission reliability of the flight control systems.
冗余设计是提高飞行控制系统安全性与任务可靠性的一种重要手段。
journal.ecust.edu.cn
1.
to protect the system security by shielding the prohibited web site according to the choice of agreement to be stopped.
并根据选择需要阻止的协议,屏蔽禁止访问的网站,从而达到保护系统安全的目的。
www.fabiao.net
2.
The industry has sought to bolster computer-system security as public and congressional scrutiny of its potential vulnerability has grown.
由于公众和国会对电力公司可能受到攻击的担心不断上升,电力行业已在设法提高电脑系统的安全性。
www.bing.com
3.
Question: I'm using an X. 509 certificate with my service and I get a System. Security. Cryptography. CryptographicException.
问:我对我的服务使用的是X.509证书,并且获得一个System.
msdn2.microsoft.com
4.
Enterprise to obtain the desired effect training activities, must have scientific and effective enterprise staff training system security.
企业要想取得培训活动的预期效果,必须要有科学、行之有效的企业员工培训体系的保障。
learning.zhishi.sohu.com
5.
It is widely used in industrial production sectors, for equipment, system security, reliability plays a very important role.
它广泛用于工业生产的各行各业,对于装备系统的安全、可靠运行起着十分重大的作用。
www.fabiao.net
6.
Among many factors that affected the system security, driver is one of the most important factors.
而其中司机的因素是影响系统安全性的重要因素之一。
www.bing.com
7.
Various forms of joint approach to meet the different needs of our customers to ensure system security, efficient operation.
多种形式的接头方式可满足客户的不同需要,保障系统的安全、高效运行。
blog.sina.com.cn
8.
Also appropriate for the device protection including Video Surveillance System, Security System and Intelligent Community System, etc.
适用于视频监控系统、安防系统、智慧社区系统等视频监控设备的保护。
www.rdgcw.com
9.
It analyzes the system security of the Agent, network transmission and resource access.
对系统在代理、网络传输、资源存取方面的安全性进行了分析。
www3.chkd.cnki.net
10.
The system security and stability depends on the capability of data error control.
通信系统的安全稳定性取决于它的数据差错的控制能力。
www.ceps.com.tw
1.
New access-control methods will also be introduced as research into operating system security continues.
随着对操作系统安全性的深入研究,将会引入新的访问控制方法。
www.ibm.com
2.
Because database is a set of information, database system security plays a crucial role on the information system security.
而数据库作为信息的载体,它的安全性对整个信息系统的安全起着决定作用。
www.fabiao.net
3.
Hence, administrators must choose a very hard to break password so that nobody can crack it, thus compromising system security.
因而,管理员必须选择非常难于破解的密码,以免被他人破解而影响系统的安全性。
www.ibm.com
4.
This primary key is called the "system security key" in netsh wlan commands.
这个主密钥在netshwlan命令中叫做“系统安全密钥”。
blog.sina.com.cn
5.
Pollution classification for the external insulation of transmission lines directly affects system security.
输电线路外绝缘污秽等级的划分关系到输电系统运行安全。
www.ceps.com.tw
6.
As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.
随着信息技术安全问题的日益突出,对网络系统进行安全分析日益重要。
www.dictall.com
7.
Furthermore, it should provide material and system security about the party's right, ways and methods when he gi. . .
应当对当事人取证的权利、方法、手段提供物质和制度保障,使其举证责任在司法实际工作中能够真正贯彻落实。
epub.cnki.net
8.
The RegistryPermission class, which is in the System. Security. Permissions namespace, controls access to registry variables.
位于System.Security.Permissions命名空间中的RegistryPermission类控制对注册表变量的访问。
msdn2.microsoft.com
9.
Maximum system security and immediate ground fault detection helps avoids nuisance tripping due to charging currents.
最高的系统安全性和接地故障检测有助于避免由充电电流造成的跳闸。
www.e-gtm.com.cn
10.
The design of a simulation system security log user interface, using MD5 algorithm users log on password security authentication.
设计一个模拟的系统用户安全登录界面,采用MD5算法实现用户登录口令的安全认证。
www.dgmini.com
1.
How to ensure power system security, economic and reliable manner, has always been committed to the power workers study.
如何保证电力系统安全、经济和可靠地运行,一直是电力工作者们致力研究的课题。
www.qk114.net
2.
Thereby we overcome the shortcoming during . caputuring packet by kernel mode or user mode only greatly improve the system security nature.
采用双层过滤的方法克服了单方面从用户态或核心态截获数据包的缺点,极大地提高了系统的安全性能。
www.fabiao.net
3.
The system car also use encryption algorithm to encrypt password to guarantee the system security.
同时系统还利用加密算法对密码进行加密,从而进一步保证了系统的安全性。
51lunwen.net
4.
With the increase of the distributed processing capacity, the improvement of system security and reliability capacities is also put forward.
在分布式处理能力日益提高的同时,人们对系统安全性、可靠性等方面也提出了更高的要求。
soso.361xs.com
5.
Each aspect comprehensive discourse analysis of computerized accounting system security problems.
各方面综合论述分析会计电算化系统的安全性问题。
zhidao.baidu.com
6.
High risks are typically installed without user interaction through security exploits, and can severely compromise system security.
高风险,通常是安装在用户交互通过安全漏洞,并能严重损害系统的安全性。
bbs.kaspersky.com.cn
7.
Used the case methodology to carry on the analysis to the information system security requirements.
采用个案研究法对信息系统安全需求进行分析。
www.594wm.com
8.
As the popularity of kernel module grows, the exception handling becomes an important part of system security.
由于内核模块的广泛应用,内核模块的异常处理成为重要的系统安全环节。
www.fabiao.net
9.
Strong knowledge in computer network, communication technology, system security and network security.
具备计算机网络、通信技术、系统安全、网络安全知识;
www.jobui.com
10.
In open information system, access control is an important measure that assures the information system security.
在开放式信息系统中,访问控制是保证信息系统安全的一项重要措施。
www.ceps.com.tw
1.
Although data security and system security can be considered separately, system security can have a major impact on data security.
尽管数据安全和系统安全是分开来考虑的,但是系统安全会对数据安全产生主要的影响。
www-128.ibm.com
2.
However, because system security becomes more restrictive upon initial installation, SP2 may also expose application compatibility issues.
然而,由于初期安装,系统安全会受到很大的限制性,SP2会显露出一些软件兼容性问题。
blog.donews.com
3.
Sets the system security settings to the level specified with this option.
将系统安全设置指定为该选项指定的级别。
www.ibm.com
4.
Handheld terminal from Rockwell Automation helps reduce downtime and improve control system security. . .
罗克韦尔自动化手持式终端帮助减少停工期和提高控制系统安全性……
blog.gkong.com
5.
Proposed a set of comprehensive security system security programs.
提出了一套完整的安全体系保障方案。
www.jiaoyuda.com
6.
Each module has to consider the system security and code reuse, allowing the system to the code clear, clean, help maintain.
每个模块都考虑了系统安全性和代码复用性,使系统代码清晰,整洁,利于维护。
goabroad.zhishi.sohu.com
7.
It attempts to forecast both short-term (within a few years) and long-term (2008-2010) trends that will affect system security.
他尽量预见到短期的(几年内)和长期的(2008-2010)系统安全的趋势。
www.ibm.com
8.
In general, data security and system security can be separately distinguished.
通常,数据安全和系统安全可以分开来考虑。
www-128.ibm.com
9.
The network system security involves reliability that safety and networks of information circulate directly.
网络系统安全性直接涉及到信息的安全和网络运行的可靠性。
www.fabiao.net
10.
The ESB architectural pattern improves system security, scalability and availability.
ESB体系结构模式可提供系统安全性、可伸缩性或可用性。
www.ibm.com
1.
Good security requirements and analysis practices will significantly reduce system security risk.
良好的安全需求与分析实践将极大地减少系统安全风险。
www.ibm.com
2.
The responsibility of enforcing a system security policy lies with a class called SecurityManager.
由一个名为SecurityManager的类负责实施系统安全策略。
www.ibm.com
3.
Enhancement of the computer system security, construction information is an important element of work.
加强计算机系统安全工作是信息化建设工作的重要工作内容之一。
www.kbbishe.com
4.
Most of the default operating system security settings are not configured to minimize security loopholes.
大部分操作系统的默认安全设置并未配置为最小化安全漏洞。
www-128.ibm.com
5.
This article from the active network system security point of view, aimed at designing a defense expert system model.
从主动网络系统的安全角度出发,设计了一种主动防御专家系统模型。
kns50.chkd.cnki.net
6.
System security consists of two somewhat contradictory goals.
系统安全包括两个有些冲突的目标。
www.ibm.com
7.
In March, the Food and Agriculture Organization announced the results of another study, a seed system security assessment.
今年三月,粮食和农业组织公布的另一项研究中,种子系统的安全性评估的结果。
www.maynet.cn
8.
The information system security is closely related to its database system security.
信息系统的安全性与它的数据库系统的安全性密切相关。
www.juhe8.com
9.
Review operating system security and Windows access control lists (ACLs) on the server that hosts the custom server controls.
查看承载自定义服务器控件的服务器上的操作系统安全性和Windows访问控制列表(ACL)。
msdn2.microsoft.com
10.
Thinking of top confidentiality in government business, e-Government needs much higher system security.
政府办公具有高度机密性,所以电子政务对系统安全性有非常高的要求。
www.juhe8.com
1.
Instead, there is the illusion of strong security, but in fact the system security is quite weak.
相反,他们的系统看似很安全,但实际上系统安全性非常脆弱。
www-128.ibm.com
2.
This new method was very useful for the system security design and optimization.
这一新方法对于进行系统安全性和最优化设计具有重要的指导意义。
www.ceps.com.tw
3.
In charge of the system security and info secret keeping.
负责公司系统的安全及信息的保密工作。
www.yingjiesheng.com
4.
Database design, program design and implementation, system security into detail.
对数据库设计、程序设计和实现、系统安全进了详细论述。
it.zhishi.sohu.com
5.
When the system security log reaches its maximum size it will stop recording security events .
当系统安全达到它的最大的限度时,它将停止记录安全事件。
bbs.bnjw.com
6.
The safety of housing Environments lies in daily safety system disaster prevention system security system etc.
居住环境的安全性表现在日常安全系统、防灾系统、防盗系统等方面。
www.bing.com
7.
Meanwhile, in order to the system security, the scheme remove trusted center bottlenecks, which fully distributed by each node to complete.
同时为了系统的安全去除可信中心这个瓶颈,由各个节点完全分布式协作来完成;
www.fabiao.net
8.
Assistant to setup firewall policy, monitor the network system security, to avoid virus, hacker and any.
协助设置防火墙策略,监控网络系统的安全性,避免病毒,黑客和任何未经授权的访问。
www.jober.cn
9.
This contributes towards strengthening the overall system security by declining the stated risk.
这种方法通过降低风险增强了系统的总体安全性。
www.ibm.com
10.
With expansion in power system scale and capacity, the computation and analysis work to keep system security become heavy day by day.
随着电网规模和容量的日益扩大,保证电网运行方式安全的暂态稳定计算量日趋繁重。
www.ceps.com.tw
1.
System Security - Embedded Security hardware tamper detected.
系统安全性-检测到。
www.redinside.com
2.
At present, however, the computer system security the biggest threat is itself vulnerabilities.
目前来看,对计算机系统安全威胁最大的就是本身的漏洞。
wenwen.soso.com
3.
Is thrown if system security does not grant the caller access to the called method.
如果系统安全机制没有授予调用方对被调用方法的访问权限,则引发。
msdn2.microsoft.com
4.
You can choose from the System, Security, or Application event logs.
可以从系统事件日志、安全性事件日志或应用程序事件日志中进行选择。
msdn2.microsoft.com
5.
Verifying the system security is vital for the process of restoration.
验证系统安全是非常重要的改造的过程。
bbs.a9vg.com
6.
Finally, it is proved that the authentication scheme designed meets our transport needs of CBTC system security.
最后初步证明所设计的身份认证方案是符合我们CBTC系统安全传输需求的。
www.fabiao.net
7.
The research will be presented at the Network and Distributed System Security Symposium in early February.
研究将在二月初网络和分布式系统安全座谈会上发表。
www.bing.com
8.
For a compendium of system security definitions.
以获得关于系统安全定义的概要。
www-128.ibm.com
9.
The idea of system security must be in harmony in training plan, teaching material, textbooks, safety practice and so on.
必须在培养方案、教材、教学过程、安全实践等各个环节融入系统安全的思想。
www.ceps.com.tw
10.
In system security, internal threats are considered of higher severity than external threats.
在系统安全性方面,内部威胁被认为比外部威胁具有更高的严重度。
www.ibm.com
1.
In system security, internal threats are considered of higher severity than external threats.
在系统安全性方面,内部威胁被认为比外部威胁具有更高的严重度。
www.ibm.com
2.
Operating system security and access control lists (ACLs) on the server that hosts the custom server control.
承载自定义服务器控件的服务器上的操作系统安全性和访问控制列表(ACL)。
msdn2.microsoft.com
3.
Train users and promote security awareness to ensure system security and to improve server and network efficiency.
训练使用者并推广安全意识以确保系统安全与改善伺服器和网路的效能。
www.aboutcase.com.tw
4.
tight system security, with advanced user, resource, data, and memory protection.
严格的系统安全,并通过先进的用户,资源,数据和内存保护。
blog.sina.com.cn
5.
Then there's the need to bridge the gap between traditional computer security and research into industrial-control-system security.
还有就是需要将传统方式上电脑安全和研究与工业控制系统的安全联系起来。
dongxi.net
6.
System Security - Security password retry count exceeded .
系统安全性-超出安全性密码重试次数。
www.bing.com
7.
There are two classes of security problems in distributed computing system, security of hosts and security of distributed applications.
分布式计算系统安全问题分为两大类:分布式计算的安全和主机的安全。
www.dictall.com
8.
Along with this database, the TE implements security policies that add another level to system security.
除了这个数据库以外,TE还实现了安全策略,从而增添了另一个级别的系统安全性。
www.ibm.com
9.
System security design and implementation services.
设计系统保安及实施服务。
www.delphitech.com.hk
10.
System Security - Invalid remote change requested.
系统安全性-请求了无效的远程更改。
wenku.baidu.com
1.
Defense information threat to take the initiative to solve the problem of information system security key.
主动防御信息威胁是解决信息系统安全问题的关键所在。
wenwen.soso.com
2.
System Security - The system has been tampered with.
系统安全性-系统受到了干扰。
wenku.baidu.com
3.
System Security -IBM Security password retry count exceeded .
系统安全性-超出IBM安全性密码重试计数。
www.bing.com
4.
Set the root password for the new installed system (System Security field).
为新安装的系统设置根密码(SystemSecurity字段)。
www.ibm.com
5.
Series on developerWorks is a must-have tool for Linux system security.
系列文章是实现Linux系统安全性的一个必备工具。
www-128.ibm.com
6.
In the current network and distributed system security, buffer overflow is widely used by more than 50%.
在当前网络与分布式系统安全中,被广泛利用的50%以上都是缓冲区溢出。
kns50.chkd.cnki.net
7.
It's good to meet the payment system security, ease-of-use requirements.
它很好的满足了移动支付系统安全性、易操作性的要求。
zhidao.baidu.com
8.
Disables commands that might compromise system security when sqlcmd is executed from a batch file.
从批处理文件执行sqlcmd时,将禁用可能危及系统安全的命令。
msdn2.microsoft.com
9.
System security and password protection.
可设置密码以提高安全性。
www.cybosoft.com.cn
10.
In addition against system security, it designs role-management solutions for security strategy.
此外针对系统安全问题,设计以角色管理的安全策略解决方案。
www.boshuo.net
1.
Authenticating user is a core part of system security.
对用户的认讧是系统安全的核心组成部分之一。
dictsearch.appspot.com
2.
Lastly, personnel management, security systems, auditing system security management and other aspects of e-commerce.
最后从人员管理、保密制度、审计制度等方面论述了电子商务的安全管理。
blog.sina.com.cn
3.
Security policy is the base of system security management.
安全策略是系统安全管理的基础。
www.ceps.com.tw
4.
It introduces combination information security model based on network and system security.
从网络和系统安全的角度介绍了一种信息安全系统的组合模型。
www.ceps.com.tw
5.
Gets the type of child object that can inherit the System. Security. AccessControl. ObjectAccessRule object.
获取能够继承System.Security.AccessControl.ObjectAccessRule对象的子对象的类型。
msdn2.microsoft.com
6.
in order to maintain the security of the system information , system security is also designed.
为了维护系统信息数据的安全性,对系统安全进行了设计。
www.ichacha.net
7.
And two of the tax system security significance.
并从两方面探讨了纳税担保制度的意义。
it.zhishi.sohu.com
8.
There are two aspects included in database system security, which is access control security strategy and communication channel security.
数据库系统的安全性主要包括两个方面:访问控制策略和传输通道安全。
www.fabiao.net
9.
Openning of network and migration of mobile agent make the mobile agent system security more complicated than other systems.
网络的开放性和代理的移动性,使得移动代理系统的安全问题与别的系统相比显得更加复杂。
www.594wm.com
10.
Snapshot of system security policy and user rights are saved.
系统安全策略和用户权利的快照已被保存。
www.fan6.net
1.
In addition, the entire system uses a sound security policy to ensure system security and reliability.
另外,整个系统采用了完善的安全策略,保证了系统的安全性和可靠性。
www.13191.com
2.
So, it's such an important problem that how to protect information system security.
因此,如何保障信息系统的安全性,是一个非常重要的问题。
www.fabiao.net
3.
Woody: Well, hiding files isn't a part of system security.
嗯,隐藏文件并非是系统安全的一部分。
wiki.fcctt.org
4.
Moreover manages slightly has careless , but also can cause to the system security harm and the destruction.
而且管理上稍有不慎,还会引起对系统安全的危害和破坏。
dictsearch.appspot.com
5.
So in this paper, a RE card reader with the high capability is designed by using PSAM card to improve system security.
文中首先设计了一种高性能的射频卡读写器,并采用PSAM卡认证技术提高系统的安全性;
www.xactad.org
6.
Finally, the paper briefly introduces the institution of Classified Protection of Information System Security issued in China.
文章在最后介绍了中国信息系统安全等级保护制度。
www.ceps.com.tw
7.
The main question of information system security risk of our country is legal problem.
我国在信息系统安全风险评估方面存在的主要问题就有法制建设欠缺。
www.juhe8.com
8.
We should also offer system security to ecological improvement by reforming our taxation system.
通过税收制度改革,为生态文明建设提供制度保障;
www.fabiao.net
9.
HUANG Mei. Electric power system security and stabilitycont rol & digital power system. North China Electric Power , 2001 (2) : 12213.
黄梅。电力系统安全稳定控制与数字电力系统。华北电力技术,2001(2):12213。
www.wangd.com
10.
Mazieres, D. et al. "Separating Key Management from File System Security" . 17th ACM Symp. on Operating Systems Principles. (1999).
等著,〈自档案系统安全性中区分钥匙管理〉,见《第十七届美国电脑协会论作业系统原则研讨会》,(1999)。
dict.ebigear.com
1.
Mazieres, D. et al. "Separating Key Management from File System Security" . 17th ACM Symp. on Operating Systems Principles. (1999).
等著,〈自档案系统安全性中区分钥匙管理〉,见《第十七届美国电脑协会论作业系统原则研讨会》,(1999)。
dict.ebigear.com
2.
If you're infected with System Security 2009, you should know what you're fighting.
如果你感染了系统的安全性2009年,你应该知道你在战斗。
word.hcbus.com
3.
These are system-critical files and loss of their integrity threatens overall system security.
这些文件是系统关键型文件,它们失去完整性会威胁到总体系统安全性。
www.ibm.com
4.
Security requirements for trustworthy systems managing certificates for electronic signatures - System security requirements
电子签名用可靠系统管理证书的安全要求.系统安全要求
www.mapeng.net
5.
Computerization unregulated financial software used Accounting information system security and confidentiality poorer;
电算化所用财务软件不够规范;会计信息系统的安全性、保密性较差;
wenwen.soso.com
6.
Research on an Application Class Communication Security Model on Operating System Security Framework
操作系统安全结构框架中应用类通信安全模型的研究
www.ilib.cn
7.
Network security including system security, namely hardware platform, operating system and application software;
网络安全包括系统安全,即硬件平台、操作系统、应用软件;
www.bing.com
8.
State-of-the-art of Information System Security Engineering: The concept and methodology
信息系统安全工程概念与方法研究
www.ilib.cn
9.
Information security technology Commom technology requirement for information system security
信息安全技术信息系统安全通用技术要求
www.itreviews.cn
10.
Bidding strategy adjustment considering system security constraints
考虑系统安全约束调整发电报价策略
ilib.cn
1.
Operating System Security Enhancement at the System Call Level
系统调用层的操作系统安全增强
www.ilib.cn
2.
Review on Study of Risk Evaluation for IT System Security
信息系统安全风险评估研究综述
ilib.cn
3.
accounting integrity; appraise system; encourage and restrain system; system security;
会计诚信;评价体系;制度保障;激励约束机制;
www.zidir.com
4.
Analysys of the Factors Affecting the Computer Network System Security and Countermeasures
影响计算机网络系统安全的因素分析及对策
ilib.cn
5.
Understanding Classified Standard for Computer Information System Security Levels
计算机信息系统安全等级划分准则解读
service.ilib.cn
6.
Intrusion-tolerant based architecture for distributed database system security
基于入侵容忍的分布式数据库安全体系结构
www.ilib.cn
7.
System security solutions for agricultural credit service network of prefecture and municipality
地市级农信业务网络系统安全解决方案
www.ilib.cn
8.
Embedded information system security architecture: Design and Application
嵌入式信息系统安全体系构建与应用
www.ilib.cn
9.
Some consideration on the establishment of information system security evaluating criterion
关于建立信基系统安全性评估准则的几点考虑
www.ilib.cn
10.
Study of Management Information System Security
一种管理信息系统安全性研究
www.ilib.cn
1.
Study of Management Information System Security
一种管理信息系统安全性研究
www.ilib.cn
2.
Certified Information System Security Professional
信息系统安全专家认证
www.fortunechina.com
3.
Surveillance, Access Control system, Fire control and fire-alarm system, Security and emergency systems
安全监控系统、门禁及安检设备系统、消防及应急设备系统
finance.news.tom.com
4.
Design and realization of the report module in information system security evaluation tool
信息安全评估工具中报告模块的设计与实现
www.ilib.cn
5.
Research of Implementing Information System Security Framework
信息系统安全体系实施研究
www.nci.ac.cn
6.
Intrusion-tolerant based architecture for database system security
基于容忍入侵的数据库安全体系结构
www.ilib.cn
7.
Prospective Thinking of Chinese Political System Security in the Context of Globalization
全球化背景下中国政治制度安全的前瞻性思考
www.ilib.cn
8.
The Security communication and Network Security and Information System Security
信息安全的三个重要领域
www.ilib.cn
9.
Research on Test Methodology for Network Intrusion Detection System Security
网络入侵检测系统安全性能检测研究
service.ilib.cn
10.
Research On Criterion-based Operating System Security Test And Evaluation Index System
基于标准的系统安全测试指标体系的研究
www.ilib.cn
1.
Research On Criterion-based Operating System Security Test And Evaluation Index System
基于标准的系统安全测试指标体系的研究
www.ilib.cn
2.
Operating System Security Based Policies for Computer Virus Prevention
基于操作系统安全的计算机病毒防御策略
ilib.cn
3.
Mainstream operating system security analysis and security
主流操作系统安全性分析及安全策略
www.ilib.cn
4.
Computer information system security system technology frame
计算机信息系统安全防范体系技术框架
www.ilib.cn
5.
Electric Power System Security and Stability Control & Digital Power System
电力系统安全稳定控制与数字电力系统
www.ilib.cn
6.
The two main advantages of using a reverse proxy server are system security and performance
使用反向代理服务器的两个主要优点体现在系统安全性和性能上
www-128.ibm.com
7.
Several Key Techniques for System Security of Multilayer Network Structure
多层网络结构系统安全的几个关键技术
www.ilib.cn
8.
Design and Implementation of Agent-Based Application System Security
基于软件代理的应用系统安全性设计与实现
www.ilib.cn
9.
Threats and Countermeasures to Inter- Domain Routing System Security
域间路由系统的安全威胁及其对策
www.ilib.cn
10.
Research of Immune-Based Technology for the Firewall System Security
基于免疫的防火墙系统安全技术研究
ilib.cn
1.
Research of Immune-Based Technology for the Firewall System Security
基于免疫的防火墙系统安全技术研究
ilib.cn
2.
A Systematic Approach and Efficient Tools for Inter-Domain Routing System Security
实现域间路由系统安全的系统化方法和有效工具
service.ilib.cn
3.
Research of Internet Security and Computer System Security Criteria
互联网安全与计算机系统安全标准研究
www.ilib.cn
4.
Protect Computer System Security in an All-around Way
谈全面保护电脑系统安全
www.ilib.cn
5.
system security, stability, network speeds;
系统安全、稳定、网络传输速度快;
www.bing.com
6.
Summary on Power System Security Problems on 2004 IEEE PES Meeting and Recommendation for Developing Defence Measures
2004会议电网安全问题综述及防止大面积停电事故建议
www.ilib.cn
7.
Risk Based Power System Security Assessment in Power Market Environment
电力市场环境下基于风险的电力系统安全评估
www.ilib.cn
8.
An Object-Oriented Method for Information System Security Evaluation
一种面向对象的信息系统安全评估方法
ilib.cn
9.
An Risk-Analysis-Centric Model of Information System Security Engineering
以风险分析为中心的信息系统安全工程模型
scholar.ilib.cn
10.
Application Research of Network System Security Backup
网络系统安全备份应用的研究
ilib.cn
1.
An Risk-Analysis-Centric Model of Information System Security Engineering
以风险分析为中心的信息系统安全工程模型
scholar.ilib.cn
2.
Application Research of Network System Security Backup
网络系统安全备份应用的研究
ilib.cn
3.
Research of Information System Security Evaluation
信息安全评估研究
ilib.cn
4.
On the Multilevel Inkling Integrate Judgment of E-Commerce System Security
电子商务系统安全多级模糊综合评判
www.ilib.cn
5.
Using security-enhanced Linux for enhancing system security
增强系统安全
www.ilib.cn
6.
Information System Security and Research of Evaluation's Strategy
信息系统安全与评测策略研究
www.ilib.cn
7.
Concept model and evaluation model of information system security risk
信息系统安全风险的概念模型和评估模型
www.ilib.cn
8.
Research of the Web-Based Remote Control System Security
基于Web的远程监控系统安全研究
ilib.cn
9.
Mine Pit Elevator Electrically Controlled System Security Reliability Design Based on PLC Technology
基于PLC技术的矿井提升机电控系统安全可靠性设计
www.ilib.cn
10.
Appraisal on Influence of Soil and Water Conservation to System Security of Water Resources
水土保持对水资源系统安全的影响评价
www.ilib.cn
1.
Appraisal on Influence of Soil and Water Conservation to System Security of Water Resources
水土保持对水资源系统安全的影响评价
www.ilib.cn
2.
Research of Sub-key Encryption Method for Database System Security
子密钥数据库安全加密算法研究
ilib.cn
3.
System security (e. g. , firewalls, access control)
系统安全(如,防火墙、访问控制)
www.exam8.com
4.
Design and Realization of Information System Security
涉密信息系统设计和实现
www.ilib.cn
5.
Computer-Based Power System Security Analysis
电力系统计算机安全分析
ilib.cn
6.
Restore Default File System Security Settings
文件系统安全参数设置程序
h50176.www5.hp.com
7.
Network and Information System Security Strategy in Power Plant
发电厂网络与信息系统安全策略
scholar.ilib.cn
8.
Implementation of embed real timeoperating system security
嵌入式实时操作系统安全策略的实现
ilib.cn
9.
Research and implementation of application system security technology based on Java platform
基于Java平台应用系统安全技术的研究与实现
ilib.cn
10.
Research on rule set in information system security evaluation tool
信息系统安全评估工具中规则集的研究
service.ilib.cn
1.
Research on rule set in information system security evaluation tool
信息系统安全评估工具中规则集的研究
service.ilib.cn
2.
Research on Information System Security Models
信息系统安全模型研究
service.ilib.cn
3.
Investigation of System Security of Database
数据库系统安全性初探
www.ilib.cn
4.
The E-mail System Security Reinforcing Technology
邮件系统的安全性加固技术
www.ilib.cn
5.
Research of Information System Security Assessment based on Components Composition
基于构件组装的信息系统安全评估
service.ilib.cn
6.
The research on application of PKI technology in Internet taxpaying system security
PKI技术在网上报税系统中的应用
ilib.cn
7.
Solution for Call System Security in E-Government Intranet
电子政务内网呼叫系统安全性解决方案
www.ilib.cn
8.
Analysis of the network system security
网络系统安全性的分析
service.ilib.cn
9.
Study of document exchanging system security based on PKI
基于PKI体系的公文流转系统安全的研究
service.ilib.cn
10.
Research on Operating System Security Model
操作系统安全模型研究
www.ilib.cn
1.
Research on Operating System Security Model
操作系统安全模型研究
www.ilib.cn
2.
Computer System Security and Data Assurance
计算机系统与数据的安全
www.zftrans.com
3.
Survey of Hunan Power System Security Management
湖南电力系统安全管理综述
www.ilib.cn
4.
Fuzzy Synthetic Judgment of Ammunition Disposal System Security Based on AHP and Triangular Module
基于AHP和三角模的弹药处废系统安全模糊评判
ilib.com.cn
5.
System security related to water-saving society establishment
构建节水型社会的体制保障
www.ilib.cn
6.
The Evaluation of Information System Security Risk
信息系统安全风险评估
www.ilib.cn
7.
Exploration on the Network System Security
关于网络系统安全方案的探讨
www.ilib.cn
8.
random login code model, an increase of system security;
采用随机登陆代码模式,增加了系统的安全性;
good2.com
9.
Fuzzy Risk Assessment of Information System Security Based on Entropy-weight Coefficient Method
基于熵权系数法的信息系统安全模糊风险评估
ilib.cn
10.
Introduction to Information System Security
信息系统安全导论
www.huachu.com.cn
1.
The Application of Distributed Stability Control Device FWK-300 in Power System Security and Stability Control
FWK-300分布式稳定制装置在电网安全稳定控制中的应用
www.cec.org.cn
2.
Research on Information System Security Performance Evaluation Model based on IATF
一种基于IATF的信息系统安全性评价模型的研究
ilib.cn
3.
Research on Structure Model of Information System Security Based on Systems Engineering
基于系统工程的信息系统安全体系结构模型研究
www.ilib.cn
4.
Assess system security using a Linux LiveCD
使用LinuxLiveCD评估系统的安全性
www-128.ibm.com
5.
A Consideration of System Security and Renew
系统安全与恢复浅析
www.ilib.cn
6.
Lack of confidence in system security
对系统安全性缺乏信心
517rz.jingc.com
7.
Probability of Risk in Information System Security and It's Characteristic
信息系统安全风险的概率描述及基本特征
service.ilib.cn
8.
Probe of Web system security technique
关于Web系统安全性技术问题的探讨
service.ilib.cn
9.
The Research on the Model of Information System Security Evaluation Based on Term Indices
基于术语指标的电子商务系统安全评价模型
www.cnki.com.cn
10.
Study on Effect of Load Models on Power System Security
负荷模型对电网安全性的影响研究
www.ilib.cn
1.
Study on Effect of Load Models on Power System Security
负荷模型对电网安全性的影响研究
www.ilib.cn
2.
Design of Security Risk Assessment Tools for Information System Security Based on Web
基于Web的信息系统安全风险评估工具的设计
www.ilib.cn
3.
The Study on Constructing Zhejiang Freeway Online-Network System Security Model
浙江省高速公路联网系统安全模型构建的研究
scholar.ilib.cn
4.
What to do well for ensuring information system security
确保信息系统安全应做好哪些工作
www.ilib.cn
5.
The Evaluation of Enterprise Information System Security Based on EC
基于电子商务的企业信息系统安全的评价
service.ilib.cn
6.
Files and File system Security
文件与文件系统安全
bbs.zdnet.com.cn
7.
Information System Security Metrics Based on Attack Tree
基于攻击树的信息系统安全度量
ilib.cn
8.
File system security model based on lineage mechanism
基于血统机制的文件系统安全
service.ilib.cn
9.
The research of field bus system security based on neural network
基于神经网络理论的现场总线系统安全性评价的研究
www.ilib.cn
10.
The Study about Evaluation Model for System Security Based on Attack Tree Analysis
基于威胁树的系统安全评价模型研究
service.ilib.cn
1.
The Study about Evaluation Model for System Security Based on Attack Tree Analysis
基于威胁树的系统安全评价模型研究
service.ilib.cn
2.
thirdly, the necessity and feasibility of the disciplinary system security implementation of the Criminal Code in our country;
再次是在我国实现保安处分制度刑法化的必要性和可行性;
paper.pet2008.cn
3.
Pay Attention to Study and Applications for Information System Security Theory
重视信息系统安全理论的研究与应用
www.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2024/11/13 3:34:55