internal access 中文意思是什麼

internal access 解釋
從內部接近
  • internal : adj 1 內的,內部的 (opp external)。2 國內的,內政的。3 體內的,內服的。4 內在的,本質上的,固有...
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Starting from 2000, documents like government gazette notices and internal proforma have been uploaded to the government office automation network for common viewing and access through the network to reduce printed copies

    由二零零零年開始,憲報公告及部門使用的表格已上載政府辦公室自動化網路,讓員工透過該網路瀏覽和取用有關文件,以減少復印副本。
  3. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  4. Access control lists acls are used to ensure that internal users and customers see appropriate content

    用訪問控制清單( acl )保證內部用戶和客戶看到的是不同的內容。
  5. Service of all internal components shall be through a single access cover secured with stainless steel bolts

    通過不銹鋼螺栓固定的單個檢修蓋應該能夠維修所有內部部件。
  6. Service of all internal check valve components shall be through top mounted access covers threaded to the main valve body

    所有止回閥內部部件的維修應該能夠通過頂部安裝的檢修蓋進入進行,這種檢修蓋應該通過螺紋固定在主閥門閥體上。
  7. The friend assemblies feature allows you to access internal members ; private types and private members will remain inaccessible

    友元程序集功能用於訪問內部成員;私有類型和私有成員仍然不可訪問。
  8. A forward proxy is typically used when you have internal users of your network trying to access external sites

    通常在網路內部用戶試圖訪問外部站點的情況下使用轉發代理。
  9. It is responsible for deciphering class files and uploading into java virtual machine ; class verifier is used to the correct internal structure ; security manager is used to customize the access strategy and permission ; and ssl guarantees the data security during transmission. though modeling and testing a prototype system, experiment proved the correctness and efficiency of above design

    類裝載器是java安全體系的第一道防線,它負責將類解密后裝入java虛擬機; class文件檢驗器保證裝載的class文件有正確的內部結構;安全管理器主要用於定製用戶對系統的訪問策略和訪問權限;安全套接字用來保證web傳輸安全。
  10. This paper employs the theories of relative advantage and swot analysis to carry out the research of the company ' s strategy of dalian petro - chemical company. it takes the access from the circumstance analysis, combines with the concrete situation of the company ' s production and management after the regroup, and analyzes the adversaries, internal resources, production capability and market. therefore, it brings out the developing, managing and function strategies by and by

    本課題的研究是應用企業發展戰略的理論,根據本人對企業發展戰略的認識,運用比較優勢及swot分析原理,針對一個國有特大型企業? ?中國石油大連石油化工公司在企業重組后所遇到的具體問題進行的企業戰略研究,本文從環境分析入手,結合由於重組后的中國石油大連石油化工公司生產經營的具體情況,討論、分析、研究企業的外部競爭對手,內部資源、能力及市場,分層次地提出了公司的發展戰略、經營戰略和職能戰略。
  11. This software could implement real - time peer - to - peer voice communication by applying the technologies above synthetically. we can solve the problem of pc access in the internal lan as well

    該軟體綜合運用以上技術,實現了實時的點對點語音通信,解決了對局域網內部pc的訪問問題。
  12. Based on traditional derivative theories of commercial banks to operate internationally, retrospect of international development of overseas banks ’ international operation, combined with international operation history and current situation of our country ’ s state - owned banks, this paper puts forward strategies for international operation, that is, conducting a perfect market access study of targeted country, advancing ladder likely in term of territory, following the prescribed order in terms of organizing means, improving in proper sequence in terms of product strategy, this paper puts forward to construct internal risk control system and strengthen home country ’ s regulation on overseas institutions, advance process of commercial banks ’ international operation

    隨著我國加入wto 「后過渡期」的日益臨近,佔有我國金融絕對比重的國有商業銀行必然要面對與國際金融市場融合的新形勢,實施國際化經營。本文在闡述商業銀行跨國經營的傳統成因理論的基礎上,回顧海外銀行業國際化發展的歷史,結合我國國有商業銀行當前現狀,提出了國際化經營策略,即做好東道國市場準入研究,在地域上梯次推進,組織方式上按部就班,產品策略上循序漸進,以期解決在哪裡經
  13. These internal users would typically access the site using the same browser and a high - speed lan connection

    這些內部用戶通常會使用相同的瀏覽器和高速lan連接訪問該站點。
  14. To review the effectiveness of internal control on access to the direct access services provided by the land registry

    2檢討使用土地注冊處直接查冊服務的內部監管成效。
  15. Delegates have internal access by default

    委託默認具有內部訪問級別。
  16. Unlike classes, interfaces default to internal access

    與類不同,介面默認具有內部訪問級別。
  17. It is an error to reference a type or a member with internal access outside the assembly within which it was defined

    從定義具有內部訪問能力的類型或成員的程序集外部引用該類型或成員是錯誤的。
  18. For example, a framework for building graphical user interfaces could provide control and form classes that cooperate using members with internal access

    例如,用於生成圖形用戶界面的框架可以提供「控制項」類和「窗體」類,這些類通過使用具有內部訪問能力的成員進行合作。
  19. An employee may have a grudge against the company, and while employees have tremendous levels of internal access and system knowledge, they probably have limited resources and hacking skill

    雇員可能對公司有攻擊動機,雖然雇員有非常高的內部訪問和系統知識級別,但他們的資源和黑客技能可能很有限。
  20. A common use of internal access is in component - based development because it enables a group of components to cooperate in a private manner without being exposed to the rest of the application code

    內部訪問通常用於基於組件的開發,因為它使一組組件能夠以私有方式進行合作,而不必向應用程序代碼的其餘部分公開。
分享友人