非防火的 的英文怎麼說

中文拼音 [fēifánghuǒde]
非防火的 英文
non-fireproof
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : fire
  • : 4次方是 The fourth power of 2 is direction
  • 防火 : fire prevention; fire safety; fireproof
  1. Of all kinds village does an enterprise to should be mixed in civilian curtilage in the center ; ( should stay between 2 ) building have appropriate fire prevention span and fire prevention channel ; ( 3 ) abuts type farming curtilage every between due firewall ; ( when 4 ) builds bridal chamber house, should raise architectural fireproof grade, use the blame combustion housing materials such as ferroconcrete, brick, tile ; when decorating, reduce use bamboo, wood to wait as far as possible can burn material

    各類村辦企業應混在民宅當中; ( 2 )房屋之間應留有合適間距和通道; ( 3 )毗連式農宅每戶之間應有墻; ( 4 )建造新房屋時,應提高建築等級,採用鋼筋混凝土、磚、瓦等燃燒建築材料;裝修時,盡量減少使用竹、木等可燃材料。
  2. Why is internet so frangible ? after analyzing many events of network attacks and invalid intrusions, we found that the frangibility of internet is due to lack of the firewall to protect the network security

    造成internet網路不安全局面原因很多,網路攻擊和法入侵手段也很多,但是究其根本原因,是缺乏一個能保證網路高度安全墻。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到威脅,包括授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應控制策略:確定用戶權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性安全護措施:存取控制、標識和認證、完整性控制、密碼技術、墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全範工作給出一個整體解決方案,為其在配置、管理和應用方面提供了基本框架。
  4. Connection box : made of abs contained material which can prevent burning. it is installed outward apperance and connecting wire and packing is very convenient

    接線盒:採用加有阻燃成分abs材料製成,性能較好。安裝在整機外表面,接線、拆裝常方便。
  5. The fire design for a large building of saling books is always a very important research subject. because of the large scale, high space, high hazard of fire and particular construction of these buildings, their fire - protection designs, including fire compartmentation, safety evacuation, smoke control, construction protection and positive fire - protection device and etc., put forward a challenge to the traditional ‘ prescriptive ’ fire - protection design codes

    大型公共建築物設計一直是常重要研究課題,由於這類建築規模大、空間高、結構特殊、災危險程度高,其消設計在分區、安全疏散、煙氣控制、建築結構保護、主動消設施設置等方面對傳統「處方式」設計規范提出了挑戰。
  6. Furthermore, this paper introduces three different network architectures which are single system, bastion firewall screening subnet and the net work with dmz ( demilitarized zone ) defending network, elaboratess theories of nat ( network address translation ) and dmz ( demilitarized zone ), with the practical examples based on dns ( domain name service )

    文中針對單系統、堡壘墻屏蔽子網、帶dmz (軍事化區)禦帶三種不同網路拓撲結構加以說明,闡述nat (網路地址轉換)原理和dmz工作原理以及它們相應網路拓撲結構。同時給出基於dns服務相關腳本。
  7. Three phase dry type power transformer, which make it with those features : safety, reliability, and energy saving, fireproof, flameproof, simple maintenance etc., the design is advanced ; the structure of products is reasonable and the outline is fine, the main performances of the products are much better than the national standards, for example, partial discharge level no - load loss, on - load loss, noise level, it is adaptable for application on heavy humidity and severely pollute places which are near to lake, sea and rive, as well as, high demand - fireproof, heavy load capacity place, such as : high building, airport, station, port, underground, hospital, electrical power station, metallurgy, shopping center, residential area and petroleum chemical industry, nuclear power station, nuclear - powered submarine

    包封線圈三相干式變壓器,具有安全可靠節能爆維護簡單等優點。其設計先進結構合理外形美觀。主要性能指標均優于國內標準,如局放水平空載損耗負載損耗噪聲以及能適應高溫度環境使用等,可安裝在靠近湖海河邊污穢潮濕環境及要求高負荷較大地區,適用於高層建築機場車站碼頭地鐵醫院電廠冶金行業購物中心居民密集區以及石油化工核電站核潛艇等場所。
  8. This scheme of dividing area makes the network and borders between systems clear, and will help to install the security devices. in dispatch center, security devices such as firewall, physical partition device are installed, and between dispatch centers, encrypting devices will be installed

    具體地說,在同一地點不同安全區之間採用墻、隔離裝置等邊界護設備進行橫向隔離以抵禦法訪問、拒絕服務等類型攻擊,不同地點同一安全區之間採用加密認證等手段,以抵禦數據在野外傳輸時可能遭遇竊聽、偽造、篡改等類型攻擊。
  9. We use a firewall to protect our hard drives from unauthorised access

    我們使用墻保護我們硬盤驅動器免遭法侵入。
  10. Nibco ' s ductile iron multi - turn valves are ideal for a wide variety of services : hydrocarbons, chemical, marine, fire protection services, pulp and paper applications where cast iron and / or cast steel valves could be installed

    美國尼伯科多轉閥門常適用於許多應用領域:烴類,化學製品,船舶,消,紙漿和造紙等行業中可以安裝鑄鐵或鑄鋼閥門地方。
  11. At this point, the only applications that should be developed for a wireless environment are those that are not mission - critical or that are protected with firewalls, token devices for authentication, encryption, and intrusion detection systems

    目前,針對無線環境應該開發唯一應用程序是那些任務關鍵型應用程序,或者是受墻、用於認證令牌設備、加密以及入侵檢測系統( intrusion detection systems )保護應用程序。
  12. He keeps his postage stamps - he has some very rare ones - in a fire - proof safe

    (他把他郵票他有一些常珍貴郵票放在保險箱里。 )
  13. For most of us, it is probably better to work with the defaults provides by the firewall developer unless there is a specific reason to change it

    對我們大多數人來說,除有特殊理由要改變它,否則最好在墻開發商提供默認條件下工作。
  14. Lv and mv polymeric insulated cables for use by distribution and generation utilities - specification for 0. 6 1 kv and 1. 9 3. 3 kv power cables with special fire performance for use in power stations - cables with thermosetting insulation and non - halogenated sheath

    配電和發電設施用低壓和中等電壓聚合物絕緣電纜.電站用具有特別性能0 . 6 1kv和1 . 9 3 . 3kv電力電纜規范.熱固絕緣和鹵化護套電纜
  15. As the deployment of web services increases and becomes used with greater frequency both inside and outside the firewall, the traditional non - web service ways of exposing these applications and processed could lead to problems of maintenance and reliability

    隨著web服務部署增加以及更頻繁地在墻內部和外部被使用,公開這些應用程序以及流程傳統web服務方法可能會導致維護和可靠性問題。
  16. With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence

    隨著網路技術迅速發展,網路日益成為人們生活重要部分,與此同時,黑客頻頻入侵網路,網路安全問題成為人們關注焦點,傳統安全方法是採用盡可能多禁止策略來進行禦。目前採用手段有墻、加密、身份認證、訪問控制、安全操作系統等,這些對系統法入侵都起到一定作用。然而從系統安全管理角度來說,僅有禦是不夠,還應採取主動策略。
  17. Fire performance of external cladding systems - test method for non - loadbearing external cladding systems fixed to and supported by a structural steel frame

    外部鑲面系統性能.結構鋼架支撐並適用承重外部鑲面系統試驗方法
  18. The firewall and proxy, parts of the software of the system, based on the ip chians, is a packet filtering firewall. first, it provides transparent - proxy to the user on the user ' s lan via ip forwarding and ip masquerading in which all the hosts share on ip address to access the internet. and then the firewall provides protection to the host behind it via ip filtering preventing invalid access such as ip spoofing. after that, the firewall can let the hosts behind it to provide internet services to the outside hosts via ip port forwarding, for example www and smtp

    左巴八碩士學住論文v銳示》 a引工r 」 snie引s該解決方案軟體部分? ?網關墻和代理功能,由linux提供ipchans建立包過慮墻實現,它首先通過ip轉發和ip偽裝實現透明代理,讓用戶內部網所有主機共享一個ip地址對internet進行訪問,同時,通過阻止ip欺騙等法訪問,為用戶內部網提供一定安全保障。
  19. These two years transparent firewall products appear. there are two methods to realize transparent model firewall that are bridge model and arp transparent agency together with forward tactics. both have some drawbacks

    傳統墻均是透明,近兩年國內才陸續出現一些實現透明模式墻產品,其實現基本是兩種方案,網橋模式或arp透明代理結合轉發策略,兩者都有一定弊端。
  20. Taking into consideration, the hardening of material nonlinear, generic nonlinear, unprotected second beams as well as pin for beams and column, this paper makes finite element analysis of thermo - mechanical couple behavior for steel structure resistance fire

    摘要對鋼結構災下熱機耦合響應進行了線性有限元分析,考慮了幾何線性和材料線性,對次梁採用了不做保護以及梁和柱節點用鉸接方法來進行計算。
分享友人