防護墻 的英文怎麼說

中文拼音 [fáng]
防護墻 英文
biological shield
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • : 名詞(磚、石等築成的屏障或外圍) wall
  • 防護 : protect; shelter; shield; guard; shielding; protection; proofing
  1. The comprehensive treatment project of lin jia ya slide el consists of whittling slope, anti - slide pile with anchoring cable, retaining wall, building ground drainages, level ing off and calking slope, vegetation protection etc. after managing, under the action of earthquake load and watery the stability coefficient of slide is up to 1

    林家崖號滑坡的綜合治理方案是由削方、錨索抗滑樁、坡擋、地表排水、整坡填縫、生物等多種工程措施優化組合而成。治理后,在飽水有地震荷載狀態下滑坡的安全儲備系數為1 . 10 。
  2. Network security techniques include router filter, firewalls, intrusion detection, audit, counteroffensive and etc. in these techniques, router filter and firewalls are static security techniques, and others are dynamic security techniques

    目前網路安全技術包括路由器、、漏洞堵、入侵檢測、審計和反攻擊等,其中路由器過濾、、漏洞堵屬于靜態安全技術,而入侵檢測、審計和反攻擊等屬于動態
  3. In - stat recent report shows the integrated security equipment market is on the point of fast development and will reach 3. 3 billion us dollars. the integrated security equipment is a small box with several secure function including firewall, vpn, defense to inbreak and kill computer virus

    In - stat近期報告,集成安全設備市場即將出來大幅增長,到2009年將達到33億美元,集成安全設備是一種具有各種安全功能的小盒。這些功能包括與vpn 、入侵以及殺毒抗毒功能,一些產品可能還帶有內容過濾、反垃圾郵件以及木馬功能。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全措施:存取控制、標識和認證、完整性控制、密碼技術、系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  5. Those data, which are stored in plain text and are even protected by passwords and firewalls and intrusion detection systems, are easily filched, peculated and destroyed

    以明文形式存放的數據,即使置於口令、和入侵檢測系統的保之下,也很容易被竊取、盜用和破壞。
  6. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保系統資源,需要建立不同於病毒軟體的主動禦機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算機系統的動態行為特徵並據此判斷是否有入侵的主動禦措施。
  7. ( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system

    特別是,論文作者在網路安全系統建設的過程中,獨立承擔了中心子網、網路入侵檢測系統、病毒體系的安裝及管理工作,在詳細了解了ddn鏈路加密、 pki ca體系的建設和使用原理的基礎上,參與了網路基礎設施的安裝調試以及各類服務器的配置管理,擬定了《計算機信息系統安全管理規定》 、 《網路ip地址規范》 ,為本單位網路安全建設規劃提出了意見和建議。
  8. This can be accomplished by using toe boards, screens or brick guards ; guard rails systems, nets, catch platforms, or canopy structure methods

    可以通過使用隔板、網或防護墻、扶手系統、摔網、保平臺或天棚結構等方式來提供落物保
  9. Multiple electric fences,

    多層電子防護墻
  10. The filter firewall researched on this paper has many advantages, such as simple structure, strong focalization and lower expense and so on. it can provides theoretical basis and reference on constructing and maintaining a small - scale network

    本論文設計的包過濾體系兼結構簡單、針對性強、投入費用少等特點,同時為中小型企業構建和維提供了相關的理論依據和參考。
  11. Just like a ground - plan for successive moats that in concentric circles bind their center and serve to protect the ramparts of the castle

    如同那種地面的形狀所呈現出的一樣,為了要,重重的壕溝環繞著一座城堡。
  12. Using together with dash - proof hand - guards and dash - proof wall - protecting boards, beautiful and harmony

    撞扶手、板一起使用,美觀協調。
  13. The purpose of this subject is to implement a transparent proxy server based on linux os which can provide intranet host network security

    本課題目標是完成一套基於linux操作系統的透明代理型軟體,為在內部網的主機提供安全保
  14. This paper is beneficial for the study of the intranet network security and the applications of the intranet host firewalls

    不僅在理論上對企業級的計算機網路安全的研究和發展有較大的意義,而且對實際的企業級主機的設計應用也有一定的指導意義。
  15. Because of obstructing by impermeable wall, groundwater drainaged long time brings about immersion, whether or not this will result in a series of water surroundings problems, such as farmland salinization, marsh, lowering of ground temperature and so on, which are all focused on by government, resident, experts in engineering, hydrogeology, agriculture and surroundings

    而是否會因為的阻隔,地下水長時間得不到排泄而產生浸沒,造成農田鹽堿化、沼澤化和地溫降低等一系列水環境問題,均系堤建設區各級政府、沿江居民和國內外部分工程及水文地質專家、農業與環境保專家共同關心的話題。
  16. Static defense relies mainly on firewall and intrusion detection system, so it is hard to meet the users ’ requirement for security

    靜態保系統和入侵檢測系統為主要安全組件,能提供對攻擊的識別和數據包的過濾等保功能。
  17. The dissertation draws a conclusion from the above analysis that sovereignty is undergoing challenges does n ' t mean the end of sovereignty, which remains the footstone of a nation and a defending wall of china

    論文通過分析得出,主權經受挑戰並非意味著主權的終結,主權依然是國家的基石,是我國的一道防護墻
  18. Stripped down, people s walls and guards are down

    衣服脫掉后,人們的防護墻和保衛都撤掉了。
  19. As we build up the speed during the weekend, we will be getting closer and closer to the kerbs and the barriers, as we push to go flat out for qualifying

    當我們在周末中提高速度的時候,我們會越來越靠近路肩和防護墻,我們在排位賽中會盡量發揮最快的速度。
  20. Truly, if we let her, master always looks after us and takes away our karma, extending her love and compassion even to those we care for. her love creates a wall of grace and security

    只要我們誠心跟隨師父修行,把自己交給師父,師父不但會照顧我們化解我們的因果,甚至那些跟我們有關系的人也都會受到師父慈悲愛力的照顧,師父的愛為我們築起了一道防護墻
分享友人