防護術 的英文怎麼說

中文拼音 [fángshù]
防護術 英文
shield
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • 防護 : protect; shelter; shield; guard; shielding; protection; proofing
  1. Technique of afforesting artificial protection forest by making ground into wide platform

    臺式整地營造人工林技
  2. The strength of this conjuration is such that the balor is bound to your will, and no protection from evil or similar protective spell needs to be cast

    這法的強大在於所召喚出來的巴洛一定會遵從你的意願,而無需施放邪惡之類的保
  3. According to the analysis and comparison for existing wireless data traffics, a wireless bonding mode is adopted to realize mobile ticketing. the thesis also researches the safety issue on railway wireless ticketing system and put forwards the corresponsive solution. a series of safety techniques, for example data encryption, are adopted to ensure the safety of transaction between the wireless ticketing terminal and railway ticketing system

    本論文圍繞無線接入技展開討論,通過對現有無線數據業務的分析比較,確定無線接入方式,實現移動方式的鐵路售票系統;研究鐵路無線售票系統所面臨的安全問題並提出相應的解決方案,在軟硬體結構設計中採用了一系列安全技,並輔以科學的管理方法,使無線售票系統具備一定的安全能力。
  4. Network security techniques include router filter, firewalls, intrusion detection, audit, counteroffensive and etc. in these techniques, router filter and firewalls are static security techniques, and others are dynamic security techniques

    目前網路安全技包括路由器、火墻、漏洞堵、入侵檢測、審計和反攻擊等,其中路由器過濾、火墻、漏洞堵屬于靜態安全技,而入侵檢測、審計和反攻擊等屬于動態
  5. The paper reports concisely the technology development of pretreatment and subsequence treatment of acidic water stripping installation now, the technology of pretreatment of acidic water include : remove waste gas, waste oil, suspending solid, effluvium and safety measure taken, the technology of subsequence treatment of acidic water include : the technology of return use of srripped water and the technology of sbr and the technology of ion exchange of denitrification, especially the proprietary technology of fripp in the field

    摘要簡述了目前煉油廠酸性水汽提裝置的上下游處理技及其研究進展,上游技主要包括:酸性水降壓脫氣、除油、脫懸浮物、惡臭氣體脫臭和應採取的安全措施;下游技主要包括:汽提凈化水的回用、 sbr法、離子交換法除氨等工藝,並簡要介紹了撫順石油化工研究院在本領域上的專有技
  6. Technical requirements for protective face mask for medical use

    醫用口罩技要求
  7. Co2 corrosion and protection technology in oil and gas field

    2腐蝕及
  8. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全措施:存取控制、標識和認證、完整性控制、密碼技火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  9. Thread milling machines. safeguarding specification

    螺紋銑床.安全條件
  10. In this paper, research is emphasized on the situation of slope protection in shaanxi areas, analyses the engineering and economic effect of all kinds of slope protection, compare the traditional protection with the new, puts forward the protection principle that should be followed in shaanxi areas, study the destruction mechanism and stability analysis of high slope in ocher area, and puts forward effected and economic new protection methods

    本文對陜西地區的邊坡狀況進行了研究,分析各種型式的效果及其經濟效益,並結合國內外的新技,對傳統型式和新型型式進行了對比分析,提出陜西地區在以後的工程中應該遵循的原則,並研究了黃土高邊坡的破壞機理和穩定性判斷的方法,提出巖土邊坡有效、經濟的新型措施及其施工工藝。
  11. Standard terminology relating to protective clothing

    服有關的標準
  12. Protective clothing for emergency medical operations

    急救醫療手
  13. Studies on the establishment technology of pastureland shelterbelt

    草牧場林營造技的研究
  14. Surgery gown, protection clothes, medical dressing, hospital bed cover, shoes bag, table cover, shopping bag, sanitary product, stretchy and waterproof non - woven cloth, breathe freely and waterproof non - woven cloth

    衣手敷料醫療床罩鞋套桌巾手提袋醫療衛生用品暖暖包止滑鞋套彈性水不織布透氣水不織布
  15. Shielding schemes of computer vdu are suggested through transient electromagnetic scattering analysis. method of time - domain integral equations is used here. a new soft - tempest method is found to strengthen protection capability of electromagnetic information leakage

    用時域積分方程法,通過瞬態電磁場分析推薦了計算機顯示器的屏蔽方案,提出soft - tempest技的新措施以加強信息電磁泄漏; 4
  16. Single packet filter technology, with its flaws, cannot provide perfect security protection ; intrusion detection, as an active defense system, is a crucial supplementary to the packet technology and work as a second line of defense ; content filter supplies the gap of the information content protection that two former technologies leave and form the last barrier for security protection

    單純的包過濾技由於其自身的缺陷而不能提供完全的安全保。入侵檢測作為一種主動禦技,是包過濾的重要補充,起到了第二道線的作用。內容過濾彌補了前兩種技在信息內容範方面的不足,形成了安全的最後一道屏障。
  17. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算機信息系統安全體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態禦以及協同通信平臺等關鍵技開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算機信息系統安全體系建設的動態縱深禦安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全層次的概念,提出了信息類別、威脅級別和安全保障級別的定義,闡述了進行計算機信息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技的分級要求,從而便於進行計算機信息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於保障上述安全體系動態協同能力的協同通信平臺。
  18. Study on the critical technology of information security protection for electric power system

    電力系統信息安全關鍵技的研究
  19. Terminology for corrosion and protection for ship and marine engineering

    船舶及海洋工程腐蝕與防護術
  20. Terms for lightning protection of information system

    信息系統雷電防護術
分享友人