data security communication 中文意思是什麼

data security communication 解釋
數據保密通信
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • communication : n. 1. 通訊,通知;交換;信息;書信,口信,通報。2. 傳達,傳授;傳播;傳染。3. 交通,交通機關;聯系,連絡(設備)。4. 【宗教】接受聖餐。
  1. Stressing the need for everyone to act responsibly to ensure not just their own information security, mr wong said the highly interconnected nature of the information world meant we were dependent to a large extent on each other to assure the security of our data and systems. " for instance, while e - mail is becoming a common and efficient way of communication, it also poses potential threats to all it touches. and a likely tangible consequence to any laxity in our information security could be a costly negative impact on the conduct of our e - business.

    王錫泉強調,每個人都有責任去保護自己及其他人的資訊安全,現今的資訊世界高度互連,意味我們彼此之間互相倚賴以保障我們的數據和系統的安全。他說:例如,電郵雖已逐漸成為普及和有效率的通訊方法,但它同時會對所到之處構成潛在威脅。假如我們對資訊保安馬虎了事,便有可能對我們的電子業務運作造成代價不菲的負面影響。
  2. Compared with traditional communication networks, a data communication network has the advantages of digitalized data, broad bandwidth, intelligent systems, networking structures, integrated services, strong anti - interference and high security. it can provide various communication services with uniform platforms, which are what the telecommunication owners have built up or / and are building

    數據通信網與傳統通信網相比具有數字化、寬帶化、智能化、網路化、綜合化、抗干擾能力強、保密性強等特點,而且能夠為各種通信業務提供統一的平臺,這也是各個電信運營商目前在建或建設完成的網路平臺。
  3. Afterwards, the paper investigates some key technologies including time delay, system security and data communication in system implementing and suggests that time delay problem could be solved through reducing the amount of data flow in the internet by using activex to encapsulate the client program by realizing communication between browser and client controlling program.

    然後,論文對系統實施過程中的時延性、安全性和數據通信等關鍵性技術進行了研究,提出了採用activex技術來封裝客戶端程序,在瀏覽器中實現與控制服務程序的通信以減少網路數據量的方法來解決時間延遲的問題;以及採用安全套接字層協議ssl來解決安全性問題等的相應策略。
  4. As a result, the following subroutines are programmed : keyboard scanning, a / d sample, lcd displaying, data computing and dealing, serial communication, diagram printing and control modules. these designs not only simplified the program structure, but also improved real - time performance, security, and precision of the system. moreover, the time of debug the system ' s software is saved

    並在此基礎上,採用模塊化程序設計方法,設計出了a d采樣子程序、鍵盤掃描子程序、印表機驅動子程序、液晶顯示子程序、大容量靜態存儲器的驅動子程序以及整個程序的主控製程序等,不僅使程序結構清晰,而且也提高了系統的實時性、可靠性和精度,同時節省了系統軟體調試時間。
  5. Based on the quick development of computer network, this thesis deals with how to apply network technology to civil and architectural engineering. the finished research contains as follows : the research on reraote - network - monitor - system, the realization of the data collection of ddc ( direct digital controller, multi - loop data circuit monitor ), the communication, the real time control of remote network. moreover, the remote - network - monitor - system is applied in the engineering practice in which monitoring the security of high framed girder and plank

    其中包括:研究了遠程網路檢測系統基本結構,實現了下位機(多路數據巡迴檢測儀)現場數據採集、下位機與上位機通信、遠程網路實時控制採集過程等;成功編制了下位機與上位機通信軟體和用於動態更新、存儲數據的數據庫系統;將遠程網路檢測系統應用於工程實例,完成了高層建築框支梁安全性監測、不抽芯板專利技術檢測。
  6. Analysis of the secured data algorithm in security of computer network communication

    計算機網路通信安全的數據加密演算法分析
  7. Power system control and associated communications - data and communication security

    動力系統控制和相關通信.數據和通信安全
  8. In the system design, this article has considered and utilized various security technologies, and has formed an integrated multi - level security control strategy that covers application level, communication level, network level, systematic level security technologies. this system has adopted the netbank application development platform based on j2ee technology, and implemened the transaction interfaces to the intermediary business platform system ( ibps ), to perform data exchange between the multi - systems

    在系統設計中,重點考慮和綜合運用了多方面的安全技術,形成了一套從應用層、通訊層、網路層、系統層的多層次控制的安全技術方案;系統採用netbank開發平臺和j2ee技術進行開發,用中間業務平臺交易通訊的介面技術,實現了多系統間的數據交換。
  9. The precision and security of data have been taken full account of during my designing the communication with the banks

    我在與銀行通訊設計中充分考慮了數據的準確性及安全性。
  10. In the third chapter, a new wireless data communication subsystem is designed, and it achieves higher speed than other ones. in the fourth chapter, the writer designed a new kind of remote measuring subsystem that consumes much lower power. in the fifth chapter, the engineering design of remote control subsystem is finished, and the reliability and security of the system is settled

    第三章論述了有關無線通信子系統設計的各個方面,突出解決了無線數據傳輸的速度問題;在第四章里設計了遙測終端子系統的軟硬體,較好地解決了降低功耗的問題;第五章從通用性的角度上,完成了遙控終端工程設計的主要任務以及控制軟體的設計,重點解決了系統的可靠性及安全性問題。
  11. The paper put forward the structure of file storage design no - default file structure and default file structure particularly which can satisfy demand next generation avionics " demand in allusion to complex data and timely data transmission. real time and security of communication between air system and ground system is key technology

    針對飛機數據復雜多樣、需要保證數據存儲和傳輸有效性的需求,本文提出以文件的方式進行數據的存儲,並詳細設計了滿足新一代飛機數據管理記錄系統要求的非預設文件的結構和預設文件的結構。
  12. This paper described the design and realization of a command and communication system database in the environment of vfp. it briefly introduced the mostly function, the system frame, the constitute & the information flow ; it introduced the key techniques used in the database design, such as user interface designing technique, application system toolbar designing technique, multi - media technique, data exchange technique, security and maintaining secrecy technique, etc. moreover it do more analysis, research & prospect for these technique & the developing way of the system

    本篇描述了vfp環境下某指揮通信系統數據庫的設計和實現;簡要介紹了該數據庫系統的主要功能、體系結構、組成和信息流程;介紹了數據庫設計中的用戶界面設計技術、應用系統工具欄設計技術、多媒體技術、數據交換技術、安全保密措施等技術,並對這些技術以及系統的發展方向進行了進一步的分析、研究和展望。
  13. Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties

    傳輸層安全協議( tls )和安全套接字層協議( ssl )基於對稱密碼技術、非對稱密碼技術、消息認證碼技術、公鑰證書和公開密鑰基礎設施技術提供了保證網路通信數據的機密性、完整性和對通信各方進行認證的機制。
  14. E - government construction especially stresses standardization and interchange. the electronic document interchange becomes the most important medium in the contact and communication among governmental offices due to its important role in the governmental office. in the early stage of edi, the expensive special network must be adopted and the specific hardware and software must be purchased while considering the data security and its transmission

    早期的電子資料交換作業在考慮到資料的安全性與傳送速度因素下,需採用成本高昂的專用網路,並購置特殊的軟硬體設備,才能構建一個完整的電子資料交換系統,這樣的電子資料交換機制實現和使用成本非常昂貴,而且用來進行交換的資料格式相當復雜不具彈性。
  15. Advanced information technology and it solutions in six major pavilions were displayed including networking and communication, internetintranet solutions, data output, security and system maintenance, multimedia, applications, mobile computing, electronic commerce, scanning and bar - code equipment, telecommunications, software packageshardwaresperipherals. gross exhibition space was 8, 917 sq m

    六大主要專題展區展示最新資訊科技,包括網路系統、國際電腦網路及線上資訊、數據輸出及保安、多媒體應用、流動電腦科技、電子商務、掃描及條碼設備、通訊設備及服務,與及電腦軟體及硬體等,整個展覽面積佔地8 , 917平
  16. Model of data remote transmittal based on ca authentication is compound by ca authentication and sensitive data security. on one hand, ca authentication is developed on the basis of openssl function libraries, which provide secure and reliable channel for sensitive data between two communication terminals ; on the other hand, sensitive data in server database is encoded by fields, which keep invisibility for non - correlation persons

    基於ca認證的數據遠程存取模型是我們利用基於openssl函數庫開發的ca認證過程來為通信兩端提供安全可靠的通信通道,具有信息保密、信息完整性、身份認證等功能,同時,對企業重要數據欄位進行加密,來保證數據庫端的數據安全。
  17. In an addition, this thesis also analyzes and demonstrates some relative technologies of the system, such as database design, data security protecting strategies and communication mechanism. and the key and creative technologies, e. g. genetic algorithm to solve course - arranging problem, assistant descision - making support and data lifecycle technique, are emphasized and explained

    隨后,本文還對本系統中的數據庫設計、數據安全保護策略、通信機制等相關技術作了詳細地分析,並且重點說明和闡述本系統中使用的遺傳演算法解決排課問題、輔助決策支持以及數據生命周期等關鍵和創新技術。
  18. Because of development of intelligent, data remote administration and transmittal in some enterprises, it is necessary for us to research and develop data security products for them to meet the demands of communication security in networks

    又由於企業的智能化、遠程數據管理、傳輸越來越普及,所以很有必要開發企業數據安全產品,以滿足數據遠程通信安全的需要。
  19. Several xml security protocols have been proposed to support communication data security in xml applications

    已提出了幾個xml安全性協議以在xml應用程序中支持通信數據安全性。
  20. Based on the present theory, the paper presented a security ; inexpensive and complete control system for the power supply of cp, which is the heart of pipeline cp system. all the work, such as data collection, communication, display and alarm, can be realized by remote control

    在現有的理論基礎上,本文為埋地管線陰極保護系統設計防腐電源,並為防腐電源設計了安全可靠、價格低、功能完備的監控系統,一切諸如採集、通訊、顯示、報警等工作都是通過遠程監控的方式來實現。
分享友人