配置評審 的英文怎麼說

中文拼音 [pèizhìpíngshěn]
配置評審 英文
configuration review
  • : Ⅰ動詞1 (兩性結合) join in marriage 2 (使動物交配) mate (animals) 3 (按適當的標準或比例加以...
  • : 動詞1. (擱; 放) place; put; lay 2. (設立; 布置) set up; establish; arrange; fix up 3. (購置) buy; purchase
  • : Ⅰ動詞1. (評論; 批評) comment; criticize; review 2. (評判) judge; appraise Ⅱ名詞(姓氏) a surname
  • : Ⅰ形容詞(詳細; 周密) careful Ⅱ動詞1 (審查) examine; go over 2 (審訊) interrogate; try 3 [書...
  • 配置 : dispose (troops, etc. ); deploy; allocation; collocation; configuration; positioning; allotment
  • 評審 : grade
  1. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統的行為、計系統和漏洞、估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、計、估自己的系統。
  2. The screening experiment of material combination was carried out for kudingcha drink, and the best material combination was chosen mainly according to sensory evaluation and the determination of chemical composition and physical properties. the results show that, when kudingcha gynostemma pentaphyllum makino wulong tea = 10 10 80 and the ratio of tea water is 1 120, it is more beneficial to the improvement of organoleptic quality and keeping - fresh during the process and storage of kudingcha drink

    為開發苦丁茶飲料提供依據,通過設不同的原料組合,採用以感官為主,結合測定茶湯化學成分和物理性狀的方法,對加工苦丁茶飲料的原料伍進行了篩選.結果表明,採用苦丁茶、絞股藍、烏龍茶的質量比10 10 80製,以1 120的茶水比進行浸提,有利於改善苦丁茶的感官品質及其飲料加工、貯藏中的保鮮性能
  3. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的是否缺乏估手段;不可避免的內部非法訪問;缺乏必要的攻擊計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  4. On the operating design of raas, the paper focused on the change of task _ struct, the design of kernel process kaasd, the timing of raas, the configuration and initialization of raas in the end, the paper evaluate the raas from the aim of system design, the integration with the other secure components of secure os, provide some problems unsolved, such as the expanding to network monitor, the new technology of ids

    對于實時計分析系統的整體運行設計,從操作系統原有數據結構task _ struct的改變,內核進程kaasd的設計, raas的定時和系統的和初始化這幾個方面逐個進行敘述。在本文的最後,從raas的達到的目的,與原有安全功能的有效合成等方面對該系統作了一個價,同時提出幾個需要進一步思考的問題,如對網路的擴展,對入侵檢測新技術的引入等
  5. Research on the human resource distribution of the modern library

    2004年浙江省圖書資料職稱委員會初委推薦中級職稱參人員分析看圖書館人才
  6. Configuration item acceptance review

    項驗收
  7. Internal auditing is a behavior led by major principals or authorities, undertaken by an independent auditing agency and professional auditors, under related regulations and system, adopted by certain methods and procedures to supervise and evaluate the authenticity, validity and benefit of fiscal, financing and economic activities of an enterprise and its affiliated organizations

    內部計是在本單位主要負責人或者權力機構的領導下,由單位內部設的獨立計機構和備的專職計人員,根據有關法規、制度,採用一定的程序和方法,獨立監督和價本單位及所屬單位財政收支、財務收支、經濟活動的真實、合法和效益的行為。
  8. First, the paper describes the seven kpa of cmm which are the base of sqcf : requirements management, software project planning, software project tracing & oversight, software quality assurance, software configuration management, software product engineering, peer reviews

    首先,本文論述了構建sqcf的cmm中的7個關鍵過程域:需求管理、軟體項目策劃、軟體項目跟蹤和監督、軟體質量保證、軟體管理、軟體產品工程和同行
分享友人