設為授權設備 的英文怎麼說

中文拼音 [shèwéishòuquánshèbèi]
設為授權設備 英文
set as authorized
  • : Ⅰ動詞1 (設立; 布置) set up; establish; found 2 (籌劃) work out : 設計陷害 plot a frame up; fr...
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : Ⅰ動詞1 (具備; 具有) have; be equipped with 2 (準備) prepare; provide with; get ready 3 (防備...
  • 設為 : disabled
  • 授權 : empower; authorize; warrant
  • 設備 : equipment; device; facility; implementor; apparatus; installation; appointment; furnishing; setou...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源訪問限、口令應用以及建立份等;確定系統管理員的力和責任,包括物理安全、系統配置、帳戶置及使用限、口令管理、審計和監控、份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,其在配置、管理和應用方面提供了基本的框架。
  2. The company is located at zhejiang ningbo technology park and it engages mainly in the smelting equipment of magnesium and aluminum allo y, quantitative conveying ana pouring equipment, gas protection device and the magnesium alloy pressure casting parts. the more, it can provide services of technology development, achievements transferring, process revamping, material inspection, computer stimulation, etc. the company is based on the strong technical strength of the military technology and the research institutes and has a large number of senior research personnel. the company owns many patents and know - hows, among which the magnesium alloy smelting, gas protection, quantitative pouringas well as the later on processing technology has reached the world advanced levet. the company sticks to aim of quality first, credit supreme and would like to provide best

    公司位於浙江省寧波市科技園區凌雲路199號,是以生產鎂合金鑄件主業,包括壓鑄低壓鑄造等,並具技術開發成果轉化等功能的綜合性科技公司,以兵器工業和科研院所的雄厚實力依託,擁有自主知識產的多項專利專有技術和國際一流的技術裝,擁有教博士碩士等高級專業研究人員數名在鎂合金鑄造產品研製及后續加工方面,我公司擁有技術領先優勢,目前我公司電動工具汽車摩托車零部件it行業以及軍工方面提供配套產品配套技術咨詢與技術服務技術轉讓及聯合開發,還可以進行工藝改造材料檢測檢驗計算機模擬等多項服務
  3. In this regard, the hkma s view is that unless a customer acts fraudulently or with gross negligence, such as failing to properly safeguard his device or secret code for accessing e - banking services, he should not be responsible for any direct loss suffered by him as a result of unauthorised transactions conducted through his account

    就此而言,金管局認除非客戶作出欺詐或嚴重疏忽行,如未能妥善保管接駁電子銀行服務的或密碼,否則客戶無須對因經其帳戶進行的任何未交易引致而蒙受的直接損失負責。
  4. In the last part, a simple pmi privilege transaction model is proposed based on the authorization mechanism and its architecture components, system operation and some technical considerations in the design process are discussed. theories and implementation standards of pmi system have been further developed in this thesis, which is helpful to constructing a pki system with secure and efficient privilege management infrastructure

    本文通過對pmi屬性證書機制實現過程的計和具體特處理模型的構建,進一步豐富和發展了pmi系統的相關理論和實施標準,最終建立一個具安全高效特管理普適性平臺的pki系統奠定了堅實的基礎。
  5. The word " work " means the engineering, design ( including, but not limited to, primary design, extended preliminary design and preparation of detailed design and construction drawings ), construction ( including, but not limited to, early work, site setting out, earth back filling works, sub - structure works, civil works, above - ground works, installation and testing ) and construction management services to be performed by the development manager and subcontractors pursuant to the provisions of this contract and a written authorization, and as modified from time to time in accordance with the provisions of this contract, and includes all designs, drawings, plans, means, methods, techniques, sequences and procedures and, unless expressed to the contrary in this contract, all materials, tools, utilities, labor, equipment services, licenses, permits, tests, warranties, guarantees, transportation and other items and facilities of every kind necessary for the complete performance of this contract

    「工程」一詞應指由開發管理人和分包商根據本合同的規定和書面書執行的工程、計(包括但不限於初步計、擴初計以及深化計圖和施工圖的準) 、施工(包括但不限於前期工作、現場布局、回填土工程、次結構工程、市政工程、地上工程、安裝和測試)及施工管理服務,該等服務可根據本合同的規定被不時修訂,並包括所有的計、圖紙、計劃、手段、方法、技術、工序和程序以及,除非合同中有相反規定,所有的材料工具、施、工人、服務、執照、許可證、測試、保證、擔保、交通以及其他圓滿執行本合同所需要的各種物品和施。
  6. The original equipment manufacturer determines the platform security level of the device and its security policy and can also provide a security administrator with custom permissions for granting access

    原始製造商( oem )確定的平臺安全級別和安全策略,還可以安全管理員提供用於予訪問的自定義限。
  7. Computer were put into use in the hospital in the foreign countries from the last 1950 ' s, since then, the number of computers in the hospitals have been greatly increased and it has formed a complete computer system. the hospital information system make use of the electronic computers and communication equipment to provide information of patients and hospital management for the departments attached to the hospital and it also collects, store, process, retrieve and exchange datas, it meets the function demand of authorized users, its content involves medical decision support, medical information system, medical research support system, medical education application, nurse application, medical information retrieving, medical image and signal processing, medical equipment intellectualization and hospital management information system and so on

    計算機在醫院的應用,在國外是從50年代後期逐漸發展的,四十多年來,醫院計算機應用得到空前發展,已基本形成一個較完善的體系。醫院信息系統即利用電子計算機和通訊醫院所屬各部門提供病人診療信息和行政管理信息的收集、存儲、處理、提取和數據交換的能力,並滿足所有用戶的功能需求。內容上,涉及到醫學決策支持、醫學信息系統、醫學研究支持系統、醫學教育方面、護理應用、醫學情報檢索、醫學圖像及信號處理、醫學儀器智能化及醫院管理信息系統等諸方面。
  8. A bill to authorize major medical facility projects and major medical facility leases for the department of veterans affairs for fiscal years 2006 and 2007, and for other purposes

    461二00六及二00七會計年度退伍軍人事務部主要醫療施計畫及主要醫療租賃的法案及其他目的。
分享友人