計算機全息術 的英文怎麼說
中文拼音 [jìsuànjīquánxīshù]
計算機全息術
英文
computer holography- 計 : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
- 算 : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
- 機 : machineengine
- 全 : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
- 息 : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
- 術 : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
- 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
- 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
-
With the rapid increase of society, it has been become more and more anxious requirement of security for people " s life. how we use techniques of the modern cybernation, and computer networks, and manage of the information system, which build our new security automation system will come into view one of important and active area of research
安全防範系統是智能建築的一個子系統,隨著社會的發展,人們對安全保障的需求也越來越高,如何利用現代控制技術、網路技術、計算機信息管理技術構築新一代的安全防範系統是人們關注的熱點之一。With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data
隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施The industrial development in shandong should be located on the above - mentioned superior industries, known as the industries which is " inoculated " by the high and new technology and upgraded such as the leading industry like mechanism, electron, petrifaction and etc, or the traditional industry like energy source, textile, foodstuff, metallurgy and etc, or the high and new technique industry like electronic message, biological engineering, ocean and etc. correspond with the development and grandness of these strategic industry, the famousbrand products including the products of the household appliances, the utility type sedan, the refine chemical industrial products, computer software, halobios pharmacy, industrial revelation ware and etc should be created gradually, and then improve the structure of the industrial products
山東省工業發展應定位於上述優勢產業,即經過高新技術「嫁接」和換代升級的機械、電子、石化等主導產業,能源、紡織、食品、冶金等傳統產業,電子信息、生物工程、海洋等高新技術產業。相應于這些戰略產業的發展和壯大,逐步創造出包括家電、經濟型轎車、精細化工產品、計算機軟體、海洋生物制藥、工業新材料製品等在內的名牌產品,並進而改善工業產品結構。隨著中國加入世貿,為應對經濟全球化的挑戰,關于產業競爭力的研究成為一大熱點,但以往的研究都側重於從國家或企業的角度考慮問題,本文試圖從區域經濟的角度研究產業競爭力,探索提升產業競爭力的途徑,為研究中國產業國際競爭力提供借鑒和參考。It is possible to modify and combine existing laser, holographic and computer technology for intraoral use.
改進和綜合現有的激光、全息和計算機技術,以便用於口腔內是完全有可能的。Home automation is a combination of the modern computer technology, auto - control technology, communication technology, multimedia technology and modern architecture art by controlling the home devices and managing the information resource, home automation not only can give the services of information and the secure, comfortable and convenient environment but also can meet the need of the fast development of the information technology
家庭自動化是指運用現代計算機技術、自動控制技術、通信技術、多媒體技術和現代的建築藝術相結合,通過對機電設備的自動控制,對信息資源的管理,向用戶提供信息服務及安全、舒適、便利的環境服務,適合當今信息技術高速發展需求特點的一種技術。The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。Computer and network has spreaded all over the society. information security and sciential property right have been risen to a new level. it is a focused problem that how to protect data and software sciential property right in field of informational technology
現代社會步入數字信息化高度發達的時代,計算機和網路遍及社會的每一個角落,信息安全和知識產權不可侵犯也提到了一個新的高度,如何保證數據信息的安全和軟體知識產權成了信息技術領域關心的熱點問題。Pos system, which is called real - time management system of sales point too, means that commodity information data process was accomplished instantly during selling. so it is a new type of commercial sales system that come into practice with the popularization and development of computer technology
Pos系統是隨著計算機技術的普及、發展而出現的一種全新的自動化商業銷售系統,又稱銷售點實時管理系統,即銷售時的商品信息數據處理是在交易的一瞬間完成。Under these circumstances, we cooperate with computer specialists for the purpose of researching and developing a new method which answers the needs of prosthodontics, which covers the information disposition work of the prosthodontics office in clinical activities, in personnel files management, in storehouse property management, in economic cost accounting and so on, and which solves the problems of relative information ' s construction, disposition, storage, inquiry, statistics and dynamic monitor forthwith with advanced information technology
正是在這種狀況下,我們和計算機專業人員合作,旨在研究和建立完全符合口腔修復科專業要求,能夠涵蓋修復科在臨床醫療活動、人事檔案管理、庫房資產管理、經濟成本核算等相關活動中需要解決的信息處理問題,將相關信息的構建、處理、存儲、查詢、統計、實時動態監控等操作以先進的信息技術處理方式加以解決。2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model
針對計算機信息系統安全體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態防禦以及協同通信平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算機信息系統安全體系建設的動態縱深防禦安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全防護層次的概念,提出了信息類別、威脅級別和安全保障級別的定義,闡述了進行計算機信息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技術的分級要求,從而便於進行計算機信息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於保障上述安全體系動態協同能力的協同通信平臺。At first, the meaning and its essentiality of interception technology on computer video - leaking information is explained. the growing history and general situation of this kind of interception technology are summarized, and the main work of this paper is pointed out
文章首先系統地介紹了研究計算機視頻泄漏信息截獲技術對保障計算機信息安全有重要的意義,闡述了該技術的發展概況及本文工作的重點是在實用化過程中的幾個關鍵技術的解決方案。On the basis of exploring the various conceptions the writer redefined computer crime and set forth a new and original view as follows : " computer crime is the behavior of the person who brings serious harm to society by using computer as a tool and by using the technology of computer information and specialized knowledge to illegally to encroach on the safety of computer and its network
在探討各式概念的基礎上,對計算機犯罪概念重新作了界定,提出了自己獨到的見解。認為「計算機犯罪是行為人利用計算機信息技術和專門知識,以計算機為工具,非法侵害計算機及其網路安全的嚴重危害社會的行為。 」Our research project is basic condition platform construction project of the national science and technology of the ministry of science and technology. this paper researches the security audit techniques which watch and track actions in network information systems, and develops audit tool software. on the base of technology research, we will constitute technology standards that have own intelligence property, so that we could enhance network recovery capability to protect important computer information systems
本文課題是科技部國家科技基礎條件平臺建設項目,研究對網路信息系統進行全面監視和對網上行為進行跟蹤的安全審計技術,開發符合信息安全管理需要的審計工具軟體,為構建網路安全信息系統提供技術支持,並在技術研究的基礎上研究制定具有自主知識產權且能與國際接軌的技術標準,以提高國內信息網路防禦能力,保護國家關鍵基礎設施,維護國家事務、經濟建設、國防建設、尖端科學技術等重要領域的計算機信息系統的安全。By comprehensive application of computer, communication, photo - electricity and sense etc. we shall develop a variety of software relative to the olympics and build the information management system for the olympic competition, develop and adopt the network computer ( nc ) technology and provide a mass, high speed, safe and steady information management platform for the olympics, linking the press information system and provide timely, fast and convenient information service for the sportsman or sportswoman and the olympic working personnel and the public
通過計算機、通信、光電、傳感等多項技術的綜合應用,開發各類與奧運相關的軟體,建立奧運會比賽信息管理系統;開發應用網路計算機( nc )技術,為奧運提供大容量、高速、安全、穩定的信息管理平臺,並與新聞信息系統聯接,為運動員、奧運會服務人員及公眾提供適時、快速、便捷的信息服務。Common technology requirement in computer information system classified security protection
計算機信息系統安全等級保護通用技術要求Network technology requirement in computer information system classified security protection
計算機信息系統安全等級保護網路技術要求Operating system technology requirement in computer information system classified security protection
計算機信息系統安全等級保護操作系統技術要求Database management system technology requirement in computer information system classified security protection
計算機信息系統安全等級保護數據庫管理系統技術要求Technical requirements of physical security for computer information system section 1 : local computing environment
計算機信息系統實體安全技術要求第1部分:局域計算環境With the scale of computer information system ( cis ) expanding and the security technology developing, a systematic and normalized computer information system security architecture ( cissa ) is needed to strengthen the design, development, implementation, evaluation and management of cissa. in order to normalize the build of cissa, and construct the security defense architecture in our country, a uniform cissa model and the implementary standard must be built
隨著計算機信息系統規模的不斷擴大和信息安全技術的不斷發展,為了加強計算機信息系統安全體系的設計、開發、使用、評估和管理,需要對計算機信息系統安全體系進行系統化的認識和規范化的建設,因此必須建立統一的計算機信息系統安全體系模型和實施標準,規范計算機信息系統的安全體系建設,構築我國計算機信息系統安全防範體系。分享友人