軟體保密 的英文怎麼說

中文拼音 [ruǎnbǎo]
軟體保密 英文
software privacy
  • : Ⅰ形容詞1 (質地不硬) soft; flexible; supple; pliable 2 (柔和) soft; mild; gentle 3 (軟弱) we...
  • : 體構詞成分。
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 軟體 : [計算機] software軟體包 (程序包) software package; 軟體程序 software program; 軟體跟蹤方式 soft...
  1. Operating system is the only basic software anear the hardware. its security is the base of other software. if there is no the security base, the security of application system or security system building on operating system, such as pki, encryption techniques, is not ensured

    操作系統是唯一緊靠硬的基本,其安全職能是其他安全職能的根基,缺乏這個安全的根基,構築在其上的應用系統以及安全系統,如pki 、加技術的安全性是得不到根本障的。
  2. The author wish this study win be used in the development of numerical control dividing lathe that can divide into groups of the size for precise measure of thickness of ompressor carboy hatch soft shim the system of pneumatic measure applied widely for component measurement in produce process in factory. the author 100kup a large number related documents over about one and half year for research and went to factory and related research institute for investigating

    並希望將這一研究結果應用於對「壓縮機缸蓋墊片」厚度尺寸精測量分組的數控分選機的研製。氣動測量系統以其測量倍率高、測量精度高、測量力小( 0 . 05 1n ) 、對被測工件有自潔作用、測量精度持性好、抗干擾能力強等優點而被廣泛應用於工廠生產過程中的零件檢測。
  3. " the apparent paradox that openness about your methods leads to better security is not unique to computer software - military and diplomatic cryptographers have known for a century that it is folly to depend on the secrecy of your encoding method rather than the secrecy of your keys, " says raymond

    Raymond說: 「公開您的方法將導致更好的安全性這個明顯矛盾的觀點並非計算機所獨有,軍事和外交上的解者知道這個觀點已有一百年了:依賴編碼方法的性而不依賴鑰的性是非常愚蠢的。 」
  4. So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security

    但由於計算機網路具有連接形式多樣性、終端分佈不均勻性和網路的開放性、互連性等特徵,致使網路易受黑客、駭客、惡意和其它不軌的攻擊,所以網上信息的安全和是一個至關重要的問題。對于軍用的自動化指揮網路和銀行等傳輸敏感數據的計算機網路系統而言,其網上信息的安全和尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。
  5. Our country ' s missions and other bodies abroad should help attract emigrant singaporeans back home by maintaining close ties with them and keeping them posted on developments at home. traditional festivals, like the various new year ' s days of singapore ' s several races, the moon cake festival, deepavali, hari raya and christmas, are good occasions for get - together with overseas singaporeans

    有關吸引移居海外的新加坡人迴流,參與促進國家繁榮進步的各項硬建設工程,我國設在世界各國的大使館領事館商業辦事處等有關團,應該扮演積極的角色,加強和移居各國的新加坡人持更切的聯絡與接觸,把國內各項發展的實況傳達給他們。
  6. Koal software, which is approved by the state secrets bureau, is one of the first qualification corporations on computer information system integration related to national secrets. koal software, a pilot unit of computer network security services authentication by the computer network and information security administrtion office, has an experienced team for information system integrated security construction and services management and implementation. to users, it is a reliable long - time system security provider

    格爾是國家局批準的首批「涉及國家秘的計算機信息系統集成」資質單位,是國信安辦認定的首批計算機網路安全服務試點單位,擁有一支經驗豐富的信息系統整安全建設與安全服務的項目管理與實施隊伍,是用戶信息系統能夠得到長久安全障的可信賴的信息安全服務商。
  7. Having been studied and analyzed by cryptologist for over 10 years all over the world, pgp algorithm has been regarded as of security, high efficiency and operability. consequently, series of pgp ' s standard for application to protect e - mail came out. now a great deal of pgp ' s commercial software or free software has been developed

    經過十多年世界范圍的應用研究和碼分析家們的分析, pgp被認為是安全、高效和易於實現的加演算法,形成了應用於護電子郵件的一系列標準,並且有相當多的商業和免費被相繼開發。
  8. Refractory fiber and product is manufactured by means of dry method and wet method. as an excellent insulation material, it has comparatively low volume density, good softness and very low thermal conductivity coefficient. sticking method, ancjoring method and folding method can be selected respectively. this product can be used in various industrial kilns & furmaces for lowering heat consumption

    耐火纖維及製品是採用干法、濕法生產的具有較低度、較好柔性、極低的導熱系數的優質絕熱溫材料,施工時可分別採用粘貼法、錨固法、折疊塊形式施工,適用於各種工業窯爐降低熱耗之用。
  9. First of all, the government should highlight the construction of infrastructure and system. second, the enterprises need to be initiative and creative in this process. finally, the software merchant and consultant ought to be collaborate tightly with enterprises and help them to fulfill their goal

    政府應主要加強基礎建設和制度障;企業要積極主動地在制和管理上進行創新;提供商和咨詢分析公司要與企業緊合作,幫助其實現信息化。
  10. In the second part of this paper, it makes a detailed analysis among fluid - model - based, smith - principle - based and two - pd - controllers - based by comparing to the method and application of control theory. then it gets the laws to keep the control loop stable. in order to analyze the dynamic and transient characters, three congestion control algorithms mentioned above have been carried out in the nist atm network simulator and the successful outcomes are brought out

    本論文對atm網路abr業務擁塞控制的控制理論演算法進行了總結,簡要分析了其優點和缺點;運用控制理論的分析方法和觀點對基於流控制模型、史斯預估控制模型和雙重比例微分控制模型三種擁塞控制演算法加以具的分析,從而分析了怎樣確控制環的穩定性;在nistatm網路模擬中嵌入以上三種擁塞控制演算法,從而對演算法的動態和瞬態特性進行模擬分析,以此證明控制演算法的有效性;最後提出了今後atm網路abr業務擁塞控制演算法的發展趨勢。
  11. The meijiayi mjy channels therapeutic apparatus developed by our company, combines the advanced microcomputer technics with the profound traditional chinese medicine methods as well s the human channelss science, magically takes advantages of modern electronic technics and the outer treatment of chinese medicine, realistically simulated the effects like acupuncture, aprapathy, essage, eating, kin scraping and cupping, etc. which improve the comprehensive effects, especially for the common ailments and geriatric diseases in digest digestive system, respiratory system and nervous system

    旋翼式多流束濕式基表,雙脈沖采樣方式進行數據採集,採用計算機技術進行數據處理顯示控制閥門動作。它採用獨特的卡口安全及護措施動態安全可靠的ic卡加機制先進的硬的容錯處理性能安全可靠,具有精度高自身功耗低積小壽命長便於安裝等特點。能準確實現用水計量及實現預付費功能。
  12. The aim of this research project is to supply the technical preparation for the nuclear power station domestalization and autonomous design, to improve the design quality and level, to ensure the reliability of the sealing system in the advanced pressurized water reactor vessel, to ensure the nuclear safety, and to raise the design software level of the nuclear vessel sealing system to the advanced world class

    本課題研究的目的是為核電站國產化及自主設計提供技術準備,提高設計質量和設計水平,確先進壓水堆核容器封系統設計的可靠性,確核安全,使核容器封設計達到世界先進水平。
  13. Moreover, this algorithm can be implemented very easily in software, and has a good prospect in the fields of secret communication and information security

    此外,本演算法還特別易於實現,在通信和信息安全領域具有良好的實際應用前景。
  14. This paper used complex encrypting algorithm, and used the method of software encryption at the mobile terminal to certificate the security of data delivering, at the same time, by setting the rule of data delivering between the wap gateway and the server, it solved the problem efficiently

    摘要使用混合加演算法,同時在移動終端使用方法來證數據傳輸的安全性,並且在wap網關和服務器間設置數據傳輸規則,從而有效地解決了此問題。
  15. It not only owns the highest encryption, but makes the purchase flow of the protected products more reasonable control. it is an intelligent softdog with built - in microprocessor, 200 bytes nonvolatile memory is provided. it has the function of both shell encryption and built - in encryption

    它提供200位元組的掉電持記憶,擁有外殼與內嵌式雙重加,允許多隻加狗級聯,是目前被廣泛應用的單機護方案。
  16. The following four conditions are allowed us to publish your information : in order to observe the relevant laws and regulations, obey the legal service procedures of jinjiang sansheng shoes material co., ltd in order to preserve the trademark property of jinjiang sansheng shoes material co., ltd in order to preserve user and social masses privacy security on our behalf in urgent case in order to conform to other relevant requirements members population analyse consultation rights are reserved by jinjiang sansheng shoes material co., ltd6

    D用戶同意遵守中華人民共和國守國家秘法中華人民共和國計算機信息系統安全護條例計算機護條例等有關計算機及網際網路規定的法律和法規實施辦法。在任何情況下,百絲達服裝材料有限公司合理地認為用戶的行為可能違反上述法律法規,金勵工藝網可以在任何時候,不經事先通知終止向該用戶提供服務。用戶應了解國際網際網路的無國界性,應特別注意遵守當地所有有關的法律和法規。
  17. By the strict request of the security and secrecy of software, it ' s a pity that this thesis does n ' t discuss the detail designing process and the implementation of source code

    由於受到軟體保密協議以及著作權的嚴格要求,本文沒有列出的詳細設計過程、源代碼實現,特表示歉意。
  18. This paper is of exploring a kind of dongle which designed to protect autocontrol system software on a ship

    這就促使技術蓬勃發展,出現了各種各樣的護技術。
  19. These information properties include a company s financial data, human resource data, customer information, product sales data etc. because the confidentiality of information properties is getting more and more valuable, software development companies could use the complex designs of software protection lock to enable encode and decode data files, therefore software protection locks have an additional function

    這些信息資產包括公司的財務數據人事數據客戶數據銷售數據等。信息資產的性愈來愈受重視,而開發公司可利用護鎖的復雜設計來達到將數據文件做編碼與譯碼的功能,所以護鎖便又多了一項可利用的價值。
  20. This paper mainly studied some issues as followed : 一 、 we put forward some new ideas about software protect : relate the users information related with the software that they used. if we found pirated software, we can found the software ' s owner

    本論文主要研究了以下幾個方面的問題:一、我們提出了一些護的新思路:使用戶信息與結合起來。從盜版可以追蹤到用戶的信息,使法律嚴懲盜版使用者,也要有的放矢。
分享友人