控制權標包 的英文怎麼說
中文拼音 [kòngzhìquánbiāobāo]
控制權標包
英文
control token packet- 控 : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
- 制 : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
- 權 : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
- 標 : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
- 控制權 : command
- 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
-
The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。In a word, it presents a comprehensive and systemic analysis on mbo in china and foreign countries, from the followly fire aspects : the background of mba, the policy environment, the objective firms, the pricing methods, the financing system, find out differences of mba and the causes of them, and combinating special eco - nomic environment and economic traces of our country, the author puts forward counterplan. these counterplans primarily include : from strengthening laws, enhancing the information to publish, culturing to agency and etc to come to perfect the mbo policy environment on our country ; defining objective firms of mbo in realm that the state - owned property is decided to withdraw ; with the clean property worth for the foundation, synthesize to consider managers " contribute and the value of control powers with company, and pass the market mechanism to come for right price of the objective firms ; pass growing the organization investor, creative financing tool and optimizing the assistant financial system, establishing the valid withdrawing way of financing etc to resolve the financing problem
在此基礎上,論文從收購背景、政策環境、目標企業、定價方法、融資體制等五個方面對中外mbo做了全面系統的對比分析,找出了兩者的差異及原因,並結合我國特有的經濟環境和經濟軌跡,提出了相應的對策措施。這些對策主要包括:從健全法律法規、加強信息披露、培育中介機構等方面來完善我國mbo的政策環境;在國有資產決定退出的領域內對mbo的目標企業進行界定;以凈資產值為基礎,綜合考慮管理層貢獻和公司控制權兩個因素,通過市場機制來為目標公司正確定價;通過培育機構投資者、創新融資工具和優化配套金融制度、建立有效的融資的撤出渠道等來解決融資問題。Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on
安全性策略配置目標包括控制對數據的原始訪問、保護內核和系統軟體的完整性、防止有特權的進程執行危險的代碼,以及限制由有特權的進程缺陷所導致的傷害。The results show that : ( l ) adoption of the intermittent mean price instead of the point price at the end of the option will help to reduce the chances of profit - making manipulated by managers and to curb the manager ' s motive to control the stock price ; ( 2 ) generally speaking, stock price of mean price option is more incentive to the managers than that of the black - scholes ; ( 3 ) when the stock market slumps at the end of the option, mean price option will ensure a moderate insurance for the managers ; ( 4 ) when stock price slumps alone with the overall situation of the stock market in the intermittent option, mean price option. however, will be inefficient as an incentive. chapter four addresses the questions concerning the manager ' s manipulation of the stock price, and the increase of the option risks because of long - term slump of the stock market
第三部分包括第三至五章,第三章針對時點價格容易被控制和時點價格的波動性太大,增加了經理期權的風險等問題,研究採用期權期內的平均價格替代期權期末的時點價格計算經理股票期權收益,構建了幾何型平均價格期權定價公式,並與black ? scholes期權定價公式進行了定量對比分析,結果表明: ( 1 )採用期權期內平均價格替代期權期末時點價格有利於降低經理通過操縱股價的牟利機會,遏制經理操縱股價的動機; ( 2 )一般條件下,平均價格期權股票價格對經理的激勵作用優于標準期權; ( 3 )當臨近期權期末股價下跌時,平均價格期權能為經理提供適度保險; ( 4 )當期權期內,股票受大市持續走弱影響而下跌時,平均價格期權失去了激勵作用。The main conclusions read as follows : ( 1 ) on the premise of stabling the land contract right, the land use right could be transferred, in order to make better use of land ; ( 2 ) propose considering the net profit of land and farmer ' s minimum living guarantee synthetically to make the price standard of land, drawing up the fee of tlur according to the difference between the net profit of land and the contract fee, and perfecting the land grades system additionally ; ( 3 ) to reduce the transaction costs of land transference, we should establish and perfect the medium mechanism of land transference ; ( 4 ) to affect the institutional changes positively, government should do a good job of macro - control, and optimize the institution environment continually
本文的主要結論是: ( 1 )在穩定土地承包權的前提下,土地使用權應進行市場化流轉,實現農村土地的有效利用和適度規模經營; ( 2 )建議綜合考慮土地純收益和農產最低生活保障來制訂土地價格標準,而土地使用權流轉費應根據土地純收益與集體承包費的差額來確定,另外必須健全土地分等定級制度; ( 3 )為了降低土地流轉的交易費用,必須建立和規范土地交易中介機制; ( 4 )做好宏觀調控工作,不斷優化制度環境,發揮政府在制度變遷中的積極作用。Acquisition of a listing company prefers to such a process : in order to acquire or hold the control of a listing company, the acquirer, a person or a corporation, buys enough equity securities ( public or private ) of the target company through tender offers or through agreements with some shareholders under the permission of law. in china, the legitimate forms of acquisition can be through tender offers or through private agreements
上市公司收購是指收購人(包括自然人與法人)為了獲得對目標公司(上市公司)的控制權,通過向目標公司全體有表決權股東發出公開收購(買入)要約的方式,或在法律許可范圍內與部分有表決權股東簽訂收購(買入)協議的方式,一般以高於市價的代價,獲取足夠的該公司發行在外的有表決權股票(含可上市流通與不可上市流通)的行為,其在我國的法定形式包括要約收購與協議收購兩種。Through analyzing at present situation of civil construction industry of our country, the author discloses some current problems and brings out a few methods and measures for resolving these problems. taking the case of contract management and claims of yellow river xiao lang di dam project as an example, author illustrates again the importance for enterprises in our country to establish modern business enterprise system and run project according to international codes and customs
論文最後通過黃河小浪底水利樞紐工程中合同管理與索賠這一具體案例的分析,再一次證明了只要我國的工程建設主體按現代企業制度進行管理,真正實現與國際慣例接軌,嚴格實施項目業主負責制、建設監理制、招標承包制,按照fidic合同條件進行項目管理,採取措施保證監理工程師的地位和權利,並不斷提高監理工程師的水平,我國的工程項目管理水平將會得到更大提高,工程項目在建設周期、工程質量和投資控制等方面均會收到理想效果。The effectiveness of net - bank risk management require a clear goal of risk management, that is to establish a complete system of risk control to caution the risk effectively ; to own an advanced net technology with a legal intellectual property, and a combination of technology and services ; to find a law to abide by and to operate legally, and to find a good legal environment ; to supervise it and to manipulate closely, and to establish a special institution to supervise the operation of the inner and outer banking system ; to armed with talents with comprehensive knowledge of net - banking management
網路銀行風險管理有效性的要求包括明確網路銀行風險管理的目標;能有效地防範安全風險,建立完備的安全風險控制體系;擁有先進的自主知識產權的網路技術,科學的網路銀行技術與產品、服務的組合;有法可依,依法經營,有良好的外部法律環境;嚴密的監管與控制技術,在網路銀行內外部建立專門的監督控制機構;擁有高素質的復合型的網路銀行管理與技術人才。Four chapters including chapter 5 and chapter 6 and chapter 7 and chapter 8 were consisted of part 3 as empirical analysis. in order to improve reliability and classic and effectiveness of research conclusions to the greatest extents, characteristics of statistic samples and time periods were emphasized in the studies and the kinds of statistical software and test tools were used in the periods of models being built
第三部分為我國上市公司控制權變更的實證分析,包括第五章、第六章、第七章和第八章共四章內容,實證是該部分的最大特徵,統計樣本選取注重其代表性和時序發展特徵,統計指標全面和多角度反映研究對象,運用統計軟體和多種檢驗手段建立模型,以便最大限度提高研究結論的可靠性、代表性和有效性。The risk control system shall at least include an investment decision - making process, an investment authorization system, a research and report system, a risk assessment and performance evaluation indicator system
風險控制制度至少應當包括投資決策流程、投資授權制度、研究報告制度、風險評估和績效考核指標體系。Applying the key technique of concurrent engineering - design for function ( dff ), design for assembly ( dfa ) and design for manufacture ( dfm ) of the method of design for " x ", the virtual design of the torque converter is accomplished in catia v5. then the model constitution and the simulation of virtual process of the torque converter is done in catia v5, including the model constitution and the simulation of 5 - aixe nc virtual process of the vane, the model constitution ( material : pvc ) of the idler pulley rapid prototyping ( rp ) and the virtual assembly and the motion simulation of the torque converter, etc. 3 - d data exchange between various cad systems is realized by using step standard. the lever of classing the character model of the torque converter is given
應用并行工程的關鍵技術之一? ?面向產品全生命周期的設計dfx中面向功能的設計dff 、面向裝配的設計dfa和面向製造的設計dfm的方法,在catiav5中完成液力變矩器虛擬設計;在catiav5中對液力變矩器進行虛擬加工建模和模擬,包括液力變矩器導輪葉片五軸數控加工刀軌建模與模擬、導輪快速成型rp建模( pvc材料) 、液力變矩器虛擬裝配和運動模擬等;採用step標準實現多cad系統之間三維數據交換,提出液力變矩器特徵模型的分級標準並對三維模型數據進行分級管理,制定相應的權限等級以規范合作廠家的產品數據管理層次。Gt2 used an acl file, known as gridmap file, to map grid identity to a local identity associated with an unix account. gt3 installation uses the same file as used by a gt2 installation
Gt2通過訪問控制列表文件來映射全局用戶證書標識到本地帳號的方式進行授權, gt3工具包也採用了同樣的方法。The main contents of this paper are outlined as follows, ( 1 ) the physical significations and the correlativities of the often - used h performance targets are summarized, the selection strategies of the weighting functions are researched, and loop - shaping method as well as standard problems of robust h control are introduced. the frequency domain methods of robust h control are also introduced to solve the rate - based congestion control problem of the high - speed communication networks, and the h based controller are designed to deal with the time - delay problem of the single bottleneck node and multiple resources networks
主要研究內容包括( 1 )總結了各種常見h性能指標的物理意義及相互關系,探索了權函數的選取策略,介紹了迴路成形方法及h控制標準問題;最後把h控制頻域設計方法應用於解決高速通信網路基於流速的擁塞控制問題,設計基於h控制理論的流控制器用於解決多源單瓶頸網路中時變不確定多時滯問題。The cisssps adopts three - layer - structure design conforming to j2ee standard, which internally includes platform modules such as search engine, application install management, data management, resources management, safety control etc. and externally provides unified connecting points for information service, unified customer identity attestation, authorization management and access control
四川公安綜合信息查詢系統採用符合j2ee標準的三層架構設計開發,內部包含查詢引擎、應用配置管理、數據管理、資源管理、安全控制等平臺化組件;對外提供統一的信息服務接入,統一的用戶身份認證、授權管理和訪問控制。Tender offer refers to legal activities that a natural person or legal person ( so called the offerer ) discloses the take - over - bid ( tender offer ) to all of the shareholders of the target company, i. e., the listed company, during a given course and by a statutory approach, to buy certain amount of voting negotiable securities to which are attached rights for voting, in order to obtain or reinforce the control power upon the listed company
具體而言,要約收購的法律內涵包括四個方面:其主觀上是收購人以謀取目標公司控制權為目的;其主體是收購人(要約人)和目標公司股東,而無需徵得目標公司董事會的同意;其客體是目標公司發行在外的有表決權的證券;其客觀方面的特徵是收購人在證券交易市場外向公司所有股東公開發出收購要約,購買該公司有表決權的證券。Searches for an audit control rule with the same user as the specified rule, and with compatible inheritance and propagation flags ; if a compatible rule is found, the rights contained in the specified rule are removed from it
搜索以下的審核控制規則:與指定的規則具有相同的用戶,並具有兼容的繼承和傳播標志;如果找到兼容規則,則從中移除指定的規則中包含的權限。分享友人