立墻權 的英文怎麼說

中文拼音 [quán]
立墻權 英文
iu arietrm
  • : 動1 (站) stand; remain in an erect position 2 (使豎立; 使物件的上端向上) erect; stand; set up...
  • : 名詞(磚、石等築成的屏障或外圍) wall
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源訪問限、口令應用以及建備份等;確定系統管理員的力和責任,包括物理安全、系統配置、帳戶設置及使用限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. In the end of the paper put forth several propositions of china ' s legislation on insider trading including the current situation, comments on the provisions of the present securities law on insider trading, and certain ideas about how to improve the legislation on insider trading. the paper proposes that complete civial liability system be established, the system of the right to include short - swing trading be improved, the mechanism of china wall be established, and the powers and rights of securities supervision administrative committee be improved

    包括內幕交易的民事責任、內幕交易的行政責任和內幕交易的刑事責任。第三部分是完善我國關于證券內幕交易法的若干構想,包括我國內幕交易行為的特點與成因、對現行《證券法》及相關法律對內幕交易相關制度的規定的評析及完善內幕交易法的若干構想。主要包括對內幕交易構成要件的完善、完善短線交易歸入制度、設「中國」制度、建健全完善的內幕交易民事責任制度等。
  3. While acknowledging the right of the united states to control its border, the mexican president said the proposed fence is not the solution to the immigration problem

    當被提醒美國有利掌控自己的邊界時,墨西哥總統說建的想法不是解決移民問題的辦法。
  4. Towards the house the chestnut - trees we have before mentioned rose high above the wall, without in any way affecting the growth of other luxuriant shrubs and flowers that eagerly dressed forward to fill up the vacant spaces, as though asserting their right to enjoy the boon of light and air

    在大廈那邊,我們前面已經提到過,栗子樹高高地聳著,長得比圍還高,其他的花木也欣欣向榮地生長著,並不受栗子樹的影響,它們熱切地向四面八方蔓延開去,布滿了園中的空地,象在堅持它們也有享受陽光和空氣似的。
分享友人