系統的安全 的英文怎麼說

中文拼音 [tǒngdeānquán]
系統的安全 英文
system safety
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • : 4次方是 The fourth power of 2 is direction
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. Then discusses the security and protection of cas

    論述了條件接收系統的安全性。
  2. Safety stratagem and its implementation of campus one - card system

    校園一卡通系統的安全策略與實施
  3. The changeless rule of network security

    實現商用操作系統的安全加固
  4. Along with the a enhancing proportion of hydroelectricity in the whole electricity system in our country, the increase of the single unit capacity, the faults ratio of the large - scale hydropower units is more and more important to the whole system safe operation, if we do n ' t manage it well, it will cause the collapse of the whole system and bring a great loss of country ' s economy, hi addition, accompany with " to dispart plant and grid, connect to the grid according to the price " put into practice, how to control the production cost of the power plant has to be put into consideration

    隨著我國水電在中所佔比重增加及單機容量增大,大型水電站和機組故障率對系統的安全運行也越來越重要,如果處理不好,甚至會引起整個崩潰,給國家帶來巨大損失。另外,隨著我國「廠網分開,競價上網」逐步實施,如何控制發電廠生產成本,也將提上各個電廠議事日程。
  5. Security analysis of the accounting by edp system

    會計電算化系統的安全性分析
  6. The security management of information system is a dynamic circulatory evolutive process

    信息系統的安全管理工作是一個動態循環演化過程。
  7. W factere w the work of strengthen the security of the enterprise information mp to be the highest priority, the whcle enthely analyses all ldnds of security problems tha a intemal netwrk of stock compan may risk thtough rystematic view. it gives out sollltions fbr the crst systffo wt on wtg, operating systeln, taling system, tu1ti - vinrs, beckalp, secwity edce and physical settings

    在此基礎上,對公司現有作出了方案,包括應用防火墻技術、 vlav技術和windows2000 )系統的安全機製作出網路和平臺,防病毒和備份方案,根據公司中心機房建設規模,以及中心機房所在地現場條件,分別就空調、后備電源、防雷擊和監控給出實施方案。
  8. Based on the fact project that the development of the self - help bank " s fontal - machine system of beijing lianyintong company, this paper introduces the centralization and the network of the fontal machine ; designs the software systematical framework of fontal - machine system and functional model ; analysizes the fontal machine system " s safe strategy, the framework of encryption / decryption and its net framework

    本論文結合實際課題? ?北京聯銀通自助銀行前置機開發,介紹了大集中數據中心建設,前置機拓撲:設計了前置機軟體體結構,功能模塊:分析了前置機系統的安全策略,加解密體結構及其網路架構。
  9. Secure technology in hfc broadband multimedia systems

    寬帶多媒體系統的安全技術
  10. Unlawful incursion has been threatening the safety of computer network system

    摘要非法入侵一直威脅著計算機網路系統的安全
  11. Realization of security strategy of web database of intranet

    系統的安全策略實現
  12. Stressing the need for everyone to act responsibly to ensure not just their own information security, mr wong said the highly interconnected nature of the information world meant we were dependent to a large extent on each other to assure the security of our data and systems. " for instance, while e - mail is becoming a common and efficient way of communication, it also poses potential threats to all it touches. and a likely tangible consequence to any laxity in our information security could be a costly negative impact on the conduct of our e - business.

    王錫泉強調,每個人都有責任去保護自己及其他人資訊,現今資訊世界高度互連,意味我們彼此之間互相倚賴以保障我們數據和系統的安全。他說:例如,電郵雖已逐漸成為普及和有效率通訊方法,但它同時會對所到之處構成潛在威脅。假如我們對資訊保馬虎了事,便有可能對我們電子業務運作造成代價不菲負面影響。
  13. The second is the integration of domino and relational database system. the e - government system of chongqing education commission adopt the odbc solution, of which the paper has elaborated the application in the intergration of notelet application. the third is the security strategy control of e - government. based on the security strategy control of domino, the author putes forward five approach of security control strategy to assure the security of the e - government system of chongqing education commission

    二是domino與關數據庫集成,在眾多domino與關數據庫介面中,市教委電子政務主要採用odbc解決方案,文中以電子政務中集成簡訊應用為例,詳細介紹了該方案應用。三是電子政務策略控制,依託domino自身,作者綜合了五個方面控制策略來保證重慶市教委電子政務系統的安全
  14. Graphic technology - safety requirements for printing press systems

    圖形技術.印刷機系統的安全要求
  15. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制問題;接著介紹了幾種浙江大學博士學位論文典型訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色訪問控制、基於任務訪問控制,以及基於公司關訪問控制、基於企業聯盟訪問控制等;在前面描述典型訪問控制模型基礎上,給出了一個網路化製造綜合訪問控制模型,包括網路化製造用戶和資源層次關圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中相關元素和關,給出了各級約束驗證和授權表達;最後我們給出了以xacml為基礎網路化製造訪問控制描述語言。
  16. The main way rogue programs get into a system is by exploiting security holes in the operating system

    惡意程序進入主要方法是利用操作系統的安全性漏洞。
  17. Inside the instrument has many kinds of scaling conversation formula which can carry out chosen scale conversation such as convert into length etc. digital clock timer wide use to clocking, timing in every industry field. it is operate brief, clocking accuracy, timing alarm, and with outer connected start stop, clear function

    本表含有前述智能流量積算控制儀部功能,增加了獨特防盜措施,提高了系統的安全性,即使在斷電情況下,亦可有效地防止盜用,保證了用戶準確計量使用,且操作簡便,可靠性高。
  18. This paper introduces the latest progress of high level radioactive waste disposal programs in the world, and discusses the key scientific issues as follows : ( 1 ) the precise prediction of the evolution of a repository site ; ( 2 ) the characteristics of deep geological environment ; ( 3 ) the behaviour of deep rock mass, groundwater and engineering material under coupled conditions ( intermediate to high temperatures, geostress, hydraulic, chemical, biological and radiation process, etc ) ; ( 4 ) the geochemical behaviour of transuranic radionuclides with low concentration and its movement with groundwater : and ( 5 ) the safety assessment of disposal system

    在介紹國內外最新研究進展基礎上,重點討論高放廢物地質處置若干關鍵科學問題:處置庫場址地質演化精確預測、深部地質環境特徵、多場耦合條件下(中(高)溫、地殼應力、水力作用、化學作用、生物作用和輻射作用等)深部巖體、地下水和工程材料行為、低濃度超鈾放射性核素地球化學行為與隨地下水遷移行為及處置系統的安全評價。
  19. Among them a link cooperates random bad, the safety of unwarrantable power system, economy moves

    其中任意一個環節配合不好,都不能保證電力系統的安全、經濟運行。
  20. Koal key management system is the core of the ic card application system security. its effectiveness has a direct impact on the whole system s security

    格爾密鑰管理是ic卡應用系統的安全核心,密鑰管理系統的安全性將直接影響到整個系統的安全
分享友人