fire wall 中文意思是什麼

fire wall 解釋
防火墻,隔火墻;(電腦內聯網設置的)防侵入「防火墻」。

  • fire : n 1 火,火焰;火災;燃燒;爐火,烽火。2 射擊;火力。3 火花,閃光;光輝。4 熱情,熱烈,熱心;生氣...
  • wall : n 1 墻壁;(石、磚等的)圍墻;城墻。2 (形狀、用途)像墻壁的東西,障壁;土堤,堤防。3 (礦井、容...
  1. Solving plan of a practical network application fire wall

    一種網路應用層防火墻解決方案
  2. Design and construct a fire wall with graphical interface for users in linux os

    操作系統防火墻圖形化用戶界面的設計與實現
  3. The fifth part designs in detail the log document construction of the personal fire wall

    第五部分詳細設計了個人防火墻的日誌文件結構。
  4. The second part discusses the definition of network security and the concept of the personal fire wall

    第二部分討論了網路安全的定義和個人防火墻的概念。
  5. Predominating how to use mainstream fire wall and vpn install technique under the complete network environment of actual application

    掌握主流防火墻和vpn服務安裝技術及在完整網路環境下的實際應用。
  6. Hardware network information filtering system is a way out by combining the functions of fire wall and content filtering

    硬體網路信息過濾系統具有防火墻和內容過濾的雙重功效,是解決此類問題的必然選擇。
  7. Finally, the function of the realized personal fire wall is tested, the result is analyzed and some proposals are put forward for further research

    最後對實現的個人防火墻進行功能和性能的測試,並分析了結果,並對進一步的研究提了建議。
  8. The outer ring has four storeys - kitchens on the first floor, granaries on the second, and bedrooms on the third and the fourth. between each " diagram " is a fire wall

    外環四層,一層為廚房,二層為谷倉,三四層為臥室卦與卦之間設防火墻。
  9. Now, there are many safety precautions on the internet, such as fire wall etc. but these are safety measure based on system or net site

    現在,國際網際網路上的各站點,幾乎都有各種各樣的安全措施,例如防火墻( firewall ) 、網路加密、加密狗等。
  10. Install a personal " fire wall " software and be careful while accepting file transfer from unknown senders via email, icq or netmeeting

    安裝個人防火墻( firewall )軟體,以避免因透過電郵、 icq及netmeeting接收或開啟不明來歷的檔案而導緻密碼被盜用。
  11. The first part discusses the security problem that personal computer users may encounter and the bad message on internet that nonage may face, concluding the necessity of the personal fire wall design

    論文第一部分討論了現在計算機用戶所面臨的安全問題和未成年人在網際網路上面臨的有害信息的問題,得出了個人防火墻的必要性。
  12. Historians often describe the discovery of nuclear power as a kind of threshold in human history ? a fire wall through which our culture has passed and cannot return

    歷史學家們常常形容原子能的發現像是人類歷史的一扇門,通過了這堵火墻後人類的文明將成為歷史並一去不復返。
  13. On the base of these, this article introduces the functional supervision, builds the umbrella supervision pattern to realize the rigorous and efficient supervision over the financial holding company in our country. in these chapters, the article discusses the supervision system construction of the financial holding company in china by analyzing the supervisions over the corporate governance structure, capital adequacy, internal trade, and illicit competition. the forth chapter introduces such precaution and rescue measures against risks as market a dmittance, establishment of the " fire wall ", duties that the mother company bears to the son company, and deposit insurance system, puts forward some advises for improvement

    在此基礎上提出引入功能性監管理念,構建傘狀監管模式來實現對我國金融控股公司的全面、有效監管,並通過分析對金融控股公司中法人治理結構的監管、資本充足性的監管、內部交易的監管、不正當競爭行為的監管來分析我國金融控股公司監管體制的制度建設;第四章從市場準入、 「防火墻」設置、存款保險制度、控股公司對被控股子公司的責任等方面探析了金融控股公司監管體制下的風險防範與救濟,提出了一些完善的建議。
  14. The tradition safety technique such as authenticate, accredit, encrypt, fire - wall and the control of accessing can not protect the information of network well. the safety of network faces great challenge and imperil

    傳統的安全保護技術如認證、授權、訪問控制、防火墻和加密等外圍防衛機制已力不從心,計算機網路信息安全正面臨著極大的威脅和挑戰。
  15. Probing into distributed fire - wall technique

    分散式防火墻技術的探討
  16. The products includes : beim intrusion detection system, beim fire wall, scanner, vulnerability database system, beim clusterdirector 560, beim office automated & knowledge management system, etc

    目前的產品有:北冥巡邏兵入侵檢測系統系列產品、防火墻、安全掃描系統、漏洞庫系統、服務器集群調度系統、辦公自動化知識管理系統等。
  17. According to " ipv6 hardware fire wall based on network processor technology " project that author participated, detailed introduction about ixa ( intel internet exchange ) and protocol characteristics of ipv6 are given by this thesis. combining the requirement of development trend of firewall and the outstanding characteristics of network processor, a scheme developing a high performance firewall is put forward and key technique of this firewall is introduced in detail by this thesis

    本文以作者參與的「基於網路處理器技術的ipv6硬體防火墻」項目作為論文編寫的依據,較為詳細介紹了ixa ( intelinternetexchange )架構和ipv6協議特點,結合防火墻技術發展趨勢要求和網路處理器的突出特點,著重提出開發兼容ipv4 / ipv6雙協議的高性能防火墻的方案並詳細介紹了其關鍵技術。
  18. Main content of " hef ( high efficient firewall ) firewall realize mode study " have : ( 1 ) emulation experiment and ipv6 / tunnelbroker model set up through transproxy, explain transproxy method, improved structure of rfc3053 emphatically, act for technology about solution of efficiency, make their suitable for different need of isp of scale ; ( 2 ) on the basis of analysing ipsec agreement security question, to isakmpsa varying load attacks and improves in consulting, carry on form analyses, proved, design vpn high - efficient safe model based on ip / ipsec concept finally ; ( 3 ) on the basis of ids dynamic characteristic of system, for remedy firewall static deficiency of defence, design one method that the two combine, offer a good foundation for high - efficient online security system ; ( 4 ) through theory design and emulation experiment, the above - mentioned three part can make and imbed fire wall of the system for module, offer certain theoretical foundation to domestic fire wall design of product

    《 hef ( highefficientfirewall )防火墻實現模式研究》的主要內容有: ( 1 )通過transproxy模擬實驗及ipv6 / tunnelbroker模型建立,著重闡述transproxy方法、改進的rfc3053的結構,以及代理技術中有關效率的解決方案,使之適用於不同規模的isp的需要; ( 2 )在分析ipsec協議安全性問題基礎上,針對isakmpsa協商中的變換載荷攻擊做出改進,並進行形式化分析、論證,最終設計出基於ip / ipsec概念的vpn高效安全模型: ( 3 )基於ids系統的動態特性,為彌補防火墻靜態防禦的不足,設計出兩者聯動的方法,探索了高效網路安全體系模式研究的新方向; ( 4 ) hef防火墻實現模式的理論研究及模擬實驗,所得三部分研究結論均可設計出module ,內嵌入防火墻系統中,為國內防火墻產品的設計提供了一定的理論基礎。
  19. Part two specially discusses how spv develops the important function of the " fire wall ", and then guarantees the safety of securitization trade

    第二部分專門介紹了特設目的機構( spv )如何發揮破產「防火墻」的重要作用,以保障證券化交易的安全。
  20. In this thesis, the database of gps vehicle monitor information management system is designed, the design of the man - machine conversation interface and the software of the database server, also the software of the mid - ware are accomplished. an improved and logical three layer structure framework is used to utilize the resource of the system efficiently, balance the load, and improve the expansibility of the system ; powerful oracle database is used as background database to provide high performance service to the system which has numerous users and large - scale ; encrpytion arithmetic of communication data is designed to ensure the safty of gps vehicle monitor information management system communication ; the usage of fire wall, system privilege management and data backup improved the safty of the information management system database ; high usability design is realized by oracle data guard ; optimization of the information management system made the whole gps vehicle monitor system persistent, stable and high quality

    本文針對原有gps車輛監控系統響應速度慢、穩定性和安全性不高的不足,提出了一種以改進的三層結構體系為系統架構,以oracle數據庫為后臺的gps車輛監控信息管理系統設計方案,設計了gps車輛監控信息管理系統數據庫,完成了gps車輛監控信息管理系統人機界面、中間件及數據庫端的軟體設計。系統架構採用改進的三層結構體系,其邏輯結構清晰,有利於系統資源的有效利用,均衡負載,提高系統的可擴展性;后臺數據庫採用功能強大的oracle數據庫,可以提供大規模、多用戶的高性能服務;通信數據的加密演算法有利於確保gps車輛監控信息管理系統的通信安全;防火墻的使用、系統權限管理以及數據的備份和恢復等有利於提高gps車輛監控信息管理系統數據庫的安全性, oracledataguard的使用有利於提高系統的可用性;系統的優化,為系統持續、穩定、高質量運行創造了有利條件。
分享友人