非防火的 的英文怎麼說
中文拼音 [fēifánghuǒde]
非防火的
英文
non-fireproof-
Of all kinds village does an enterprise to should be mixed in civilian curtilage in the center ; ( should stay between 2 ) building have appropriate fire prevention span and fire prevention channel ; ( 3 ) abuts type farming curtilage every between due firewall ; ( when 4 ) builds bridal chamber house, should raise architectural fireproof grade, use the blame combustion housing materials such as ferroconcrete, brick, tile ; when decorating, reduce use bamboo, wood to wait as far as possible can burn material
各類村辦企業應混在民宅當中; ( 2 )房屋之間應留有合適的防火間距和防火通道; ( 3 )毗連式農宅每戶之間應有防火墻; ( 4 )建造新房屋時,應提高建築的耐火等級,採用鋼筋混凝土、磚、瓦等非燃燒建築材料;裝修時,盡量減少使用竹、木等可燃材料。Why is internet so frangible ? after analyzing many events of network attacks and invalid intrusions, we found that the frangibility of internet is due to lack of the firewall to protect the network security
造成internet網路不安全局面的原因很多,網路攻擊和非法入侵的手段也很多,但是究其根本原因,是缺乏一個能保證網路高度安全的防火墻。The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。Connection box : made of abs contained material which can prevent burning. it is installed outward apperance and connecting wire and packing is very convenient
接線盒:採用加有阻燃成分的abs材料製成,防火性能較好。安裝在整機外表面,接線、拆裝非常方便。The fire design for a large building of saling books is always a very important research subject. because of the large scale, high space, high hazard of fire and particular construction of these buildings, their fire - protection designs, including fire compartmentation, safety evacuation, smoke control, construction protection and positive fire - protection device and etc., put forward a challenge to the traditional ‘ prescriptive ’ fire - protection design codes
大型公共建築物的防火設計一直是非常重要的研究課題,由於這類建築規模大、空間高、結構特殊、火災危險程度高,其消防設計在防火分區、安全疏散、煙氣控制、建築結構防火保護、主動消防設施設置等方面對傳統的「處方式」防火設計規范提出了挑戰。Furthermore, this paper introduces three different network architectures which are single system, bastion firewall screening subnet and the net work with dmz ( demilitarized zone ) defending network, elaboratess theories of nat ( network address translation ) and dmz ( demilitarized zone ), with the practical examples based on dns ( domain name service )
文中針對單系統、堡壘防火墻屏蔽子網、帶dmz (非軍事化區)防禦帶三種不同網路拓撲結構加以說明,闡述nat (網路地址轉換)的原理和dmz工作原理以及它們的相應網路拓撲結構。同時給出基於dns服務的相關腳本。Three phase dry type power transformer, which make it with those features : safety, reliability, and energy saving, fireproof, flameproof, simple maintenance etc., the design is advanced ; the structure of products is reasonable and the outline is fine, the main performances of the products are much better than the national standards, for example, partial discharge level no - load loss, on - load loss, noise level, it is adaptable for application on heavy humidity and severely pollute places which are near to lake, sea and rive, as well as, high demand - fireproof, heavy load capacity place, such as : high building, airport, station, port, underground, hospital, electrical power station, metallurgy, shopping center, residential area and petroleum chemical industry, nuclear power station, nuclear - powered submarine
非包封線圈三相干式變壓器,具有安全可靠節能防火防爆維護簡單等優點。其設計先進結構合理外形美觀。主要性能指標均優于國內標準,如局放水平空載損耗負載損耗噪聲以及能適應高溫度環境使用等,可安裝在靠近湖海河邊污穢潮濕的環境及防火要求高負荷較大的地區,適用於高層建築機場車站碼頭地鐵醫院電廠冶金行業購物中心居民密集區以及石油化工核電站核潛艇等場所。This scheme of dividing area makes the network and borders between systems clear, and will help to install the security devices. in dispatch center, security devices such as firewall, physical partition device are installed, and between dispatch centers, encrypting devices will be installed
具體地說,在同一地點的不同安全區之間採用防火墻、隔離裝置等邊界防護設備進行橫向隔離以抵禦非法訪問、拒絕服務等類型的攻擊,不同地點同一安全區之間採用加密認證等手段,以抵禦數據在野外傳輸時可能遭遇的竊聽、偽造、篡改等類型的攻擊。We use a firewall to protect our hard drives from unauthorised access
我們使用防火墻保護我們的硬盤驅動器免遭非法侵入。Nibco ' s ductile iron multi - turn valves are ideal for a wide variety of services : hydrocarbons, chemical, marine, fire protection services, pulp and paper applications where cast iron and / or cast steel valves could be installed
美國尼伯科多轉閥門非常適用於許多應用領域:烴類,化學製品,船舶,消防防火,紙漿和造紙等行業中可以安裝鑄鐵或鑄鋼閥門的地方。At this point, the only applications that should be developed for a wireless environment are those that are not mission - critical or that are protected with firewalls, token devices for authentication, encryption, and intrusion detection systems
目前,針對無線環境應該開發的唯一應用程序是那些非任務關鍵型的應用程序,或者是受防火墻、用於認證的令牌設備、加密以及入侵檢測系統( intrusion detection systems )保護的應用程序。He keeps his postage stamps - he has some very rare ones - in a fire - proof safe
(他把他的郵票他有一些非常珍貴的郵票放在防火的保險箱里。 )For most of us, it is probably better to work with the defaults provides by the firewall developer unless there is a specific reason to change it
對我們大多數人來說,除非有特殊的理由要改變它,否則最好在防火墻開發商提供的默認條件下工作。Lv and mv polymeric insulated cables for use by distribution and generation utilities - specification for 0. 6 1 kv and 1. 9 3. 3 kv power cables with special fire performance for use in power stations - cables with thermosetting insulation and non - halogenated sheath
配電和發電設施用低壓和中等電壓聚合物絕緣電纜.電站用具有特別防火性能的0 . 6 1kv和1 . 9 3 . 3kv電力電纜規范.熱固絕緣和非鹵化護套電纜As the deployment of web services increases and becomes used with greater frequency both inside and outside the firewall, the traditional non - web service ways of exposing these applications and processed could lead to problems of maintenance and reliability
隨著web服務部署的增加以及更頻繁地在防火墻內部和外部被使用,公開這些應用程序以及流程的傳統的非web服務方法可能會導致維護和可靠性問題。With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence
隨著網路技術的迅速發展,網路日益成為人們生活的重要部分,與此同時,黑客頻頻入侵網路,網路安全問題成為人們關注的焦點,傳統安全方法是採用盡可能多的禁止策略來進行防禦。目前採用的手段有防火墻、加密、身份認證、訪問控制、安全操作系統等,這些對系統非法入侵都起到一定的作用。然而從系統安全管理角度來說,僅有防禦是不夠的,還應採取主動策略。Fire performance of external cladding systems - test method for non - loadbearing external cladding systems fixed to and supported by a structural steel frame
外部鑲面系統的防火性能.結構鋼架支撐並適用的非承重外部鑲面系統的試驗方法The firewall and proxy, parts of the software of the system, based on the ip chians, is a packet filtering firewall. first, it provides transparent - proxy to the user on the user ' s lan via ip forwarding and ip masquerading in which all the hosts share on ip address to access the internet. and then the firewall provides protection to the host behind it via ip filtering preventing invalid access such as ip spoofing. after that, the firewall can let the hosts behind it to provide internet services to the outside hosts via ip port forwarding, for example www and smtp
左巴八碩士學住論文v銳示》 a引工r 」 snie引s該解決方案的軟體部分? ?網關的防火墻和代理功能,由linux提供的ipchans建立的包過慮防火墻實現,它首先通過ip轉發和ip偽裝實現透明代理,讓用戶內部網的所有主機共享一個ip地址對internet進行訪問,同時,通過阻止ip欺騙等非法訪問,為用戶的內部網提供一定的安全保障。These two years transparent firewall products appear. there are two methods to realize transparent model firewall that are bridge model and arp transparent agency together with forward tactics. both have some drawbacks
傳統防火墻均是非透明的,近兩年國內才陸續出現一些實現透明模式的防火墻產品,其實現基本是兩種方案,網橋模式或arp透明代理結合轉發策略,兩者都有一定弊端。Taking into consideration, the hardening of material nonlinear, generic nonlinear, unprotected second beams as well as pin for beams and column, this paper makes finite element analysis of thermo - mechanical couple behavior for steel structure resistance fire
摘要對鋼結構火災下的熱機耦合響應進行了非線性有限元分析,考慮了幾何非線性和材料非線性,對次梁採用了不做防火保護以及梁和柱的節點用鉸接的方法來進行計算。分享友人