火之防護 的英文怎麼說

中文拼音 [huǒzhīfáng]
火之防護 英文
resist fire
  • : fire
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • 防護 : protect; shelter; shield; guard; shielding; protection; proofing
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全措施:存取控制、標識和認證、完整性控制、密碼技術、墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總,本文對信息系統安全範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Those data, which are stored in plain text and are even protected by passwords and firewalls and intrusion detection systems, are easily filched, peculated and destroyed

    以明文形式存放的數據,即使置於口令、墻和入侵檢測系統的保下,也很容易被竊取、盜用和破壞。
  3. This scheme of dividing area makes the network and borders between systems clear, and will help to install the security devices. in dispatch center, security devices such as firewall, physical partition device are installed, and between dispatch centers, encrypting devices will be installed

    具體地說,在同一地點的不同安全區間採用墻、隔離裝置等邊界設備進行橫向隔離以抵禦非法訪問、拒絕服務等類型的攻擊,不同地點同一安全區間採用加密認證等手段,以抵禦數據在野外傳輸時可能遭遇的竊聽、偽造、篡改等類型的攻擊。
  4. The first man to walk on the moon noted that scientists must develop better onboard spacecraft technology and stronger protection shields from harmful space radiation before a manned flight to the red planet can be accomplished. " it will certainly be 20 years or more before that happens, " armstrong said during a global leadership forum

    據美聯社9月6日報道,阿姆斯特朗表示,在完成登陸星的載人飛行前,科學家們必須研發出更好的機載太空船技術以及更強的阻擋有害太空輻射的裝置。
  5. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、病毒、墻、漏洞掃描、入侵檢測、安全審計、黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行有效的規章制度。
  6. Firstly, unlike other technologies that verify security at high - level protocol, verifying security at ip level is transparent to applications and end - users that don " t have to be modified even if there is any change at ip level. secondly, another conspicuous advantage is that it can be used on any machine that uses ip protocol to communicate. no matter ipsec runs on routers, on firewall machines, on various application servers, and on end - user desktop or laptop machines, it can verify security of network transmission

    首先,在通信協議底層對數據傳輸提供安全保與其它在高層協議中提供安全保的技術不同,在ip層提供安全性保對應用程序和終端用戶都是透明的,不需要應用程序、其它通信層次和網路部件做任何改動;其次, ipsec的另一個顯著特點是它幾乎可以運行在使用ip協議進行通信的任何機器上,不論是運行在路由器、墻主機、各種各樣的應用服務器上,還是運行在終端用戶的個人計算機或筆記本電腦上,它都能提供一定的安全保障;最後,利用ipsec實現虛擬專用網是目前通過internet實現企業內部網的主要解決方案一。
  7. The company has devoted, since its inception, to a steady and healthy development mode and is the first of this kind in fuzhou region which products were tested qualified, in accordance with the state quality supervision center of fireproof construction materials gb 86241997 graded methods of inflammation of construction materials, by the zhejiang provincial firefighting brigade. its inflammation meets all standards inscribed in gb 86241997 class a non - flammable and ga 160 - 1997 non - flammable inorganic compound board. fuhong class a inorganic dampproof fireproof board is a kind of novel hi - tech board, a class decoration requirement of the gb 6566 - 2001 standard of state environment protection administration environment protection building material technology requiremen symbolizing your distinguished status and an ideal guarantee of your elegant life

    我司致力於穩健發展,產品為福建省福州地區第一家經省消總隊抽樣,通過「國家建築材料質量監督檢驗中心」按強制性國家標準gb 86241997建築材料燃燒性能分級方法進行安全性能型式檢驗,其燃燒性能達到gb 86241997規定的a級不燃性及ga 160 - 1997不燃性無機復合板全項性能合格,並同時通過國家環境保總局綠色環保建材技術要求gb 6566 - 2001標準的a類裝修材料要求。
  8. Ordinarily, this would expose your mothership to significant enemy fire. but as you can see, these marines simply don ' t have the firepower to punch through that thick protoss shield

    通常而言,使用這個技能可能會將你的母艦暴露在大量的敵軍下。但是如你所見,這些人族陸戰隊並不具備撼動神族母艦重型罩的力。
  9. Using the information in this article as a guide, along with the reference material listed below, your firewall documentation, and a network tool such as netstat to assist in validating your port usage, you should be able to successfully and effectively secure your environment

    採用本文中的信息作為指導,連同下面列出的參考資料、墻文檔以及諸如netstat類的網路工具一起來幫助確認您的埠使用情況,您就能夠成功而有效地保您的環境。
  10. Considering flaws of other types of firewalls, i integrate the firework techniques with the security supervision system of networks in aim to improve the ability of fireworks to foil the invasion of hackers or computer bugs and to supervise the whole system at any time

    由於墻具有不足處,現將墻和網路安全監測系統結合起來,則能克服現行網路安全系統無法對黑客入侵及病毒攻擊行為實時進行監控識別的缺陷,擔負起整個網路系統的安全任務。
  11. The system ensures the extranet by traditional technology, such as ids and filtering the packet, and ensures the internet by installing a set ( called isolation & exchange set ) between intranet and extranet, which is the core of the system and isolates networks & automatically exchanges data between intranet and extranet

    系統通過傳統的入侵檢測、包過濾等墻機制來保外網的安全,在內網和外網間設有一個網路隔離和數據自動交換的裝置(稱作隔離交換器)系統來保證內外網間的隔離和數據自動交換,它是系統的核心部分。
分享友人