完整性服務 的英文怎麼說

中文拼音 [wánzhěngxìng]
完整性服務 英文
integrity
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : 服量詞(用於中藥; 劑) dose
  • : Ⅰ名詞1 (事情) affair; business 2 (姓氏) a surname Ⅱ動詞1 (從事; 致力) be engaged in; devote...
  • 完整性 : integrity; integrality; wholeness; completeness; perfection
  • 服務 : give service to; be in the service of; serve
  1. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統的行為、審計系統配置和漏洞、評估敏感系統和數據的、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般的安全防護措施:存取控制、標識和認證、控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. Windows sharepoint server site administrators group, a member of the

    這樣做可能會危害器和網路的
  4. The java secure socket extension jsse enables secure internet communications with ssl tls. it provides an application framework - a java version of the ssl and tls protocols - complete with the full range of functionality including data encryption, server authentication, message integrity, and more

    Java安全套接字擴展( jsse )利用ssl / tls可以進行安全的internet通信,它提供了一個具有功能的應用程序框架一個java版本的ssl和tls協議,這些功能包括數據加密、器認證、消息,等等。
  5. Ensure resources are not leaked in the case of an abrupt unload, since an application s correctness cannot be guaranteed, but the integrity of the server must be maintained by not leaking resources

    卸載期間對象不會終結。要確保資源在突然卸載的情況下不會泄漏,因為不能保證應用程序的正確,但卻必須通過不泄漏資源來維持器的
  6. Ups to the fullest extent permitted by law specifically disclaims any implied warranties, including but not limited to any warranty of accuracy, completeness, currency, reliability, merchantability or fitness for a particular purpose, any implied warranty arising from course of dealing or course of performance, or any warranty that these pages, or the server that makes them available, are free of viruses or other harmful elements

    在法律許可的最大范圍內, ups不承擔任何默示的擔保,包括但不限於有關準確、現行有效、可靠、適銷或適合特定目的的擔保,在交易或作業過程中引發的任何默示擔保,或關於此等網頁或其器不具病毒或其它有害成分的任何擔保。
  7. Owing to local protectionism, the tourist resources which is belong to different districts were exploited by three or two districts in their own way. this caused many of non - sustainable questions, such as the repeatedly construction of sights in close quarters, exploiting in low level, the tourism market competition being in disorder, the tourist activities " integrality of tourist being hindered, the construction of uniform tourist service facilities and common infrastructure being very difficult

    對于分屬于不同行政區的旅遊資源,由於受地方保護主義的影響,多是各自為政地進行開發,結果造成景點的近距離重復建設,開發層次低,旅遊市場競爭無序,旅遊者旅遊活動的受到人為的阻礙,統一的旅遊設施和基礎設施建設難以形成等眾多非持續問題。
  8. Having taken steps to mitigate the risk to recovery log integrity when locking is disabled, it is possible to tune the heartbeating parameters of the websphere application server ha framework to change the conditions under which a server is considered failed

    當解除鎖定功能時,需要採取步驟減輕恢復日誌風險。當器發生故障時,可以調websphere application server ha的heartbeating參數。
  9. The network security mechanism has several essential factors : authentication, authorization, integrality, non - repudiation and confidentiality. authentication is very important and basic security service. and other security services all depend on it

    網路安全機制的基本要素包括:身份認證、訪問控制授權、檢測、防否認機制、可靠保護,而身份認證在安全系統中的地位極其重要,是最基本的安全,其它的安全都要依賴於它。
  10. It can provide security service that includes access control, integrality, authentication, replay attack protection, privacy and privacy of finite communication

    通過ah和esp協議來以下的安全:訪問控制,無連接,數據源認證,重放攻擊保護,機密和有限的通信流保密
  11. The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality

    Ipsec協議提供的安全集包括存取控制、無連接的、數據源鑒別、反重放攻擊、機密和有限的通信量的機密
  12. Cryptography technology provides the basis for such a mechanism. symmetric cryptosystems can provide privacy service ; hash functions and message authentication codes can provide integrity service ; asymmetric cryptosystems ( public key cryptosystems ) can provide authentication service

    對稱密鑰密碼技術提供了機密;雜湊函數和消息認證碼提供了完整性服務;非對稱密鑰密碼技術(公鑰密碼技術)提供了身份認證
  13. System functions of gsmb based on " godson " cpu was programmed by the discussion of " godson " cpu micro - system structure finalization and by the introduction of " godson " cpu performance requirements. this essay also specified on gsmb board level system structure, bios level solving and selection of important chips. moreover, problems related to high speed circuit design such as mensurability, pcb layout signal integrity, electromagnetic coexist were researched

    通過對「龍芯1號」 ( godson ) cpu微體系結構定型的討論和關于「龍芯1號」 cpu所需達到的的能指標的介紹,規劃了基於「龍芯1號」 cpu的高速器主板gsmb的系統功能,並敘述了根據系統功能所設計的gsmb板級系統結構、 bios級解決方案和重要晶元的選型;另外還研究了高速電路設計所涉及的如可測試、信號、電磁兼容等一系列問題,並依據研究構建了基於ibis的軟體模擬模型,同時藉助eda模擬分析工具對關鍵線網與關鍵模塊進行了板級模擬。
  14. The goa1 of network secur1 ty technology is to ensure the a la11abi 1 i ty of netu ' ork ser ' i ces and the i ntegri ty and confl dent i a1 i ty of ne1u ' ork informa1 1on

    計算機網路安全技術就是在這樣的背景下提出來的。其目的是保障網路的可用以及網路信息的與保密
  15. You can use replay attacks to create data integrity issues as well as denial - of - service attacks

    重播攻擊可用於造成數據問題以及拒絕攻擊。
  16. The thesis emphasizes in exertion of the function of the local government in the developing process of agriculture information, construction of information service system, cultivation in skilled and experienced staff, and so on. deep research has been carried out for the thesis within the yantai municipality, according to the thesis generally analyzing the following five restricted elements in the development of agriculture information. that is, some leaders in different levels have n ' t paid enough attention to this point ; in this case, there is not enough investigation

    著重從農業信息化發展過程中市政府職能的發揮,信息體系建設,農業信息化人才和軟體建設等方面入手,深入研究和綜合分析了煙臺市農業信息化的制約因素:主要存在著各級領導對農業信息化的重視程度不夠,投入不足;農業信息網路人才缺乏,農民對信息化的認識和利用不足;信息發布、傳輸滯后且實用不高;農業信息網路體系不夠善,水平不高;政府缺乏宏觀調控,農業信息資源合程度不夠等制約因素。
  17. Ipsec offers security services including connectionless integrity, data origin authentication, protection against replays, confidentiality and limited traffic flow confidentiality for ip and upper layer protocols

    Ipsec為ip及上層協議提供了無連接、數據源身份認證、抗重播攻擊、數據內容的機密和有限的通信流量機密等安全
  18. It also analyzes the security features of 3g. detailed discussion is focused on the authentication and key agreement used in 3g " s access network, and the mechanisms adopted for providing data encryption service and data integrity service. the algorithms and protocols used to implement the above mechanisms are introduced

    分析了3g的安全特徵,對3g接入網路中的認證和密鑰協商、數據機密、數據完整性服務等機制進行了深入的探討,對實現上述各種機制的演算法和協議做了詳細的介紹。
  19. Basis on above, the thesis researches the verification and calibration of instrument as service product and expatiates on meaning of thought mode for translating " after sales service " into " service product ". through describing of service blueprinting methods, it verifies that service process of instrument verification and calibration is an integrate marketing process of service product. further, using < wp = 6 > service - blueprinting methods draws the outline of the touching line of service product of instrument verification and calibration between internal and external

    在此基礎上,對儀器檢測和校對作為產品的確定進行了研究,闡述了將傳統的「產品售後」思維模式轉化為「產品」的意義,進一步通過對藍圖法的描述,證明「儀器檢測和校對過程」是一個產品營銷過程,在此基礎上運用藍圖法勾畫儀器檢測和校對營銷的內外接觸線。
  20. A rekeying method that can provide data confidentiality services and data integrity services is given

    該密碼協議提供數據保密完整性服務
分享友人