logical access control 中文意思是什麼

logical access control 解釋
邏輯訪問控制
  • logical : adj. 1. 邏輯的,邏輯上的;邏輯學上的。2. 合乎邏輯的。3. 邏輯上必然的。adv. -ly ,-ness n.
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  1. Ethernet maps the two lowest layers of osi model ( seven - layer module ) : data link layer and physical layer and divides them to some function sublayers including pcs ( physical coding sublayer ), pma ( physical medium attachment ) and pmd ( physical medium depend ) in physical layer. in these sublayers, logical link control ( llc ) is implemented through operation system, nic driver software and medium access control ( mac ) and the physical layer below it are implemented by the nic

    以太網對應了osi開放系統模型( 7層網路模型)的最下兩層:數據鏈路層和物理層,並將其細分為一些功能子層,包括數據鏈路層的llc (邏輯鏈路控制)子層和mac (介質訪問控制)子層,物理層的pcs (物理編碼子層) 、 pma (物理介質附加子層)和pmd廈門大學碩士學位論文摘要(物理介質相關于層) 。
  2. In this paper we analyzed the structure, function and characteristics of the private office network, discussed the primary threats to the office network security and common attack methods, based on the p2dr model, we distributed the office network security policy across three layers : network layer, system layer and application layer. the security principle, implement solution and the relationship among these three layers were illustrated in this paper, including physical access control, logical access control, vpn, data encryption, authentication, authorization, audit, ids ( intrusion detection systems ), system leak test and anti - virus protection

    本文中將辦公網路的安全策略由下至上劃分為網路層、系統層和應用層三個層次,分別敘述了各個層次上的安全原則和實現方式,以及各層之間的相互關系,詳細介紹了物理控制、邏輯控制、 vpn與數據加密、用戶認證和授權、審計與入侵檢測、漏洞掃描及病毒防護等方面的策略和實現方式。
  3. With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence

    隨著網路技術的迅速發展,網路日益成為人們生活的重要部分,與此同時,黑客頻頻入侵網路,網路安全問題成為人們關注的焦點,傳統安全方法是採用盡可能多的禁止策略來進行防禦。目前採用的手段有防火墻、加密、身份認證、訪問控制、安全操作系統等,這些對系統非法入侵都起到一定的作用。然而從系統安全管理角度來說,僅有防禦是不夠的,還應採取主動策略。
  4. Msil includes instructions for loading, storing, initializing, and calling methods on objects, as well as instructions for arithmetic and logical operations, control flow, direct memory access, exception handling, and other operations

    Msil包括用於加載、存儲和初始化對象以及對對象調用方法的指令,還包括用於算術和邏輯運算、控制流、直接內存訪問、異常處理和其他操作的指令。
  5. Dsrc. dsrc : road transport and traffic telematics - dedicated short range communication - dsrc data link layer : medium access and logical link control

    道路運輸和交通遠程信息處理技術.專用短程通信
  6. Dsrc. dsrc. road transport and traffic telematics - dedicated short range communication - dsrc data link layer - medium access and logical link control

    道路運輸和交通遠程信息處理技術.專用短程通信
  7. The thesis use role based access control model, design a set of logical data model and propose the basic algorithm for access database

    在數據訪問控制方面採用了基於角色的安全策略,設計了數據訪問控制的邏輯模型和基本方法。
  8. A functional unit that connects two local area networks ( lans ) that use the same logical link control ( llc ) procedure but may use different medium access control ( mac ) procedure

    連接兩個局部區域網( lan )的一種功能單元,這兩個局部網使用相同的邏輯鏈路控制( llc )程序,但可能使用不同的介質存取控制( mac )程序。
分享友人