security mode 中文意思是什麼

security mode 解釋
安全模式
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • mode : n 1 法,樣,方法,方式。2 模,型;樣式,體裁,款式;習慣。3 風尚;〈the mode〉流行,時髦。4 【語...
  1. Besides, the legislation of criminal scout behavior is amphiboles, also with the improper setting mode of governor organization and the procedural deficiency in criminal scout. only one kinds of criterion of distinguishing the public security organ ’ s double behaviors is not enough to answer the question and to solve the problem that these two kinds of behaviors making confusion with each other. so it is necessary to define its theoretical base further and erect some correlative mechanism to make easy for the body to distinguish double behaviors automatically and consequently to guarantee each of these double behaviors goes to its own legal orbit

    至於如何真正將公安雙重行為分辨清楚,切實有效解決公安雙重行為相互混淆的問題,僅提出一個分辨標準是遠遠不夠的,這只可能解決了能辨的問題;因此,還需進一步明晰其理論基礎並完善和構建相關機制,使之易辨,並促使行為主體主動去辨,從而保證公安雙重行為在各自法定的軌道上正常運行。
  2. Police legal education reform and practical education mode on the application of clinique teaching in public security legal education

    論診所式教學法在公安法學教學中的運用
  3. On the base of the insufficiency development of our real estate market and distempered social security system, the article considers that introducing the mode of retire to enjoy life with the building into china is just a horary problem

    基於我國房地產市場發展不充分和社會養老保障體系不健全的現實狀況,文章認為我國引入「以房養老」模式只是時間的問題。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  5. The development of fieldbus technology made lonworks field bus outstanding in all kinds of fieldbus. this paper simply introduces some kinds of common using fieldbus and the important position and influence of lonworks fieldbus in all kinds of fieldbus, carefully describes the technology core of lonworks technology, puts great emphasis on the introduction of the development and design of public security node of intelligent district which adopts computer, communication and control technology, carefully designs the interfaces of hardware circuits. the public security node of intelligent adopts 8031 single chip as its main processor to complete the application program of user, which mainly collects, process and control all kinds of field signal, and neuron chip 3150 as its slave processor to communicate with other nodes on field network, which works under parrel slave a mode

    現場總線技術的發展使得lonworks技術脫穎而出,本文簡要介紹了常用的幾種現場總線的概況以及lonworks技術在現場總線技術中的地位和影響,對lonworks技術的技術核心:神經元晶元、 lontalk協議、 lonworks收發器、 lonbuilder及nodebuilder進行詳盡的描述;重點介紹了集先進的計算機技術、通信技術、控制技術為一體的智能小區安防節點的開發與研製,對節點硬體電路的各種介面進行了詳盡的設計。本文設計的智能小區安防節點採用單片機8031作為主處理器來完成用戶的應用程序,主要負責對各種現場信號進行採集、處理及控制,工作在并行從a方式下的神經元晶元mc3150作為從處理器,主要完成與現場網路上的各節點及中心控制室之間的通信工作。
  6. With the appearance of component object mode, it is possible to realize the multi - tier application system, which can easily handle the problems appeared in the 2 - tier architecture, such as poor maintainability and security, high cost, weak retractility and so on

    組件對象模型的出現使多層的分散式應用系統成為了可能,從而較好地解決了兩層客戶端/服務器結構中存在的維護性差、安全性差、運行成本高和不可伸縮等問題。
  7. By far, microsoft ’ s teredo is the only tunnel mechanism that supports nat users in a certain extent, but meanwhile has many limits such as not supporting symmetric nat, not being able to provide bidirectional ipv6 connections, having poor security, etc. silkroad exploits the client - server tunnel mode and makes use of the stateful characteristic of tunnel servers to resolve the teredo ’ s problems

    目前已有的隧道機制中,只有微軟公司提出的teredo協議在一定程度上支持nat 。然而, teredo實際上不能為nat用戶提供雙向的端到端ipv6連接,不支持對稱類型的nat ,並且存在安全隱患。 silkroad採用客戶端-服務器模式的系統結構,利用隧道服務器的有狀態特性,解決了teredo存在的問題。
  8. Reconsideration about the triune mode in social security system for the land - losing farmers

    城市化進程中失地農民就業問題研究
  9. Connect a webcam and you have a way to monitor your home using the security mode

    只要將該路由器連接網路視頻頭,使用安全模式,你就能監視家中的情況。
  10. The refined explaining mode will focus on the subsequent points : firstly, it will emphasize the vital effects of the changing international structure, especially america ' s unipolar hegemonic status, on endurance and transformation of the atlantic alliance. secondly, the pursuit of security and relative power motivates nato " s member states to endure and reform the alliance. thirdly, western europe states " recognition of the security function of nato influences the endurance and transformation of nato

    從現實主義的角度出發,論文通過對北約組織在其成員、力量支柱和使命等幾個重要方面的調整(分別表現為北約的擴大、北約歐洲支柱的發展和北約新使命的提出)進行詳細分析,利用體系層次和單元層次相結合的分析方法,對該聯盟持續存在和發展的原因進行了現實主義途徑的讓釋。
  11. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  12. From the perspective of china, shanghai cooperation organization is of great significance for the amelioration of its neighboring security, its modernization and the realization of the goal of making its people comparatively well off ( both materially and culturally ). this is also the manifestation of china ' s endeavor and insistence on casting off the " cold war mentality ", establishing a new security mode and the establishment of a just and rational new international order

    同時,從中國的角度而言,上海合作組織對中國周邊安全環境的改善,對中國現代化建設以及實現小康社會的目標具有特別重要意義,也是中國在國際社會提倡拋棄冷戰思維,樹立新型安全觀,努力建立公正合理的國際新秩序所做出的重要努力。
  13. It is proved by the practice that this control system enhances the using rate of equipments, and increases the reliability of the ash removing system ; the distributed structure of the system disperses the danger in production process ; the long - distance control mode ensures the security of operators. therefore the dcs of plc is worth generalizing and applying in power plants

    實踐證明,這套系統提高了設備的利用率,增加了除灰系統的可靠性;集散的系統構成方式,使生產過程中的危險分散化;遠離現場的自動控制方式也保證了操作人員的人身安全,值得大力推廣和應用。
  14. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,網路及其安全服務的實現(包括嵌入式協議棧usnet的選取、底層驅動程序的設計和安全協議ipsec的分析與實施) 。
  15. This new mode of cooperation insists on principles like equality between different countries, common agreement, the primacy of security and cooperation basing mutual benefit while the areas of cooperation is comprehensive, involving areas such as politics, economy, culture etc. the establishment and development of sco is in the interest of safeguarding the security, stability and the economic development of its member countries

    這種新型區域合作模式堅持大小國家一律平等、共同倡導、安全先行和互利協作的原則,合作內容廣泛,涉及政治、經濟、文化、安全等各個方面。上海合作組織的產生和發展符合成員國維護地區安全和穩定的需要,促進了經濟發展,順應了當今世界和平與發展的歷史潮流,因而具有廣闊的發展前景。
  16. Legal capital system mode is the first corporate capital system mode to be adopted by continent legal system countries, which is headed by france and germany. its major objective is to protect interest of corporate creditor and security of social exchange

    法定資本制度模式是以法國、德國為首的大陸法系國家率先採用的公司資本制度模式,其目的主要在於保護公司債權人的利益和杜會交易的安全。
  17. Login security mode

    登錄安全模式
  18. Experience on whole course service security mode for army in army hospital

    軍隊醫院建立為部隊全程服務保障模式的研究與實踐
  19. This dissertation has studied some key technologies in the field of dpcs on av. first, this dissertation gives a summarize about the development status of the alteration and upgrade in the tv broadcasting system, in which a serious of key technologies of dpcs, including digital compression codec technology, large capacity storage and fault - tolerance technology, network connection technology, and systems security mode, are stressed

    論文首先對視頻廣播行業數字化改造的現狀與趨勢進行綜述,重點討論了數字播控所涉及的若干關鍵技術的概況,包括數字壓縮編解碼技術、海量存儲與容錯技術、網路互連技術和系統安全備份播出技術等,並對電視節目的制、編、播一體化網路進行展望。
  20. Peasants ' options for social security mode who have lost their land in the course of urbanization and the establishment

    城市化進程中失地農民社會保障模式的選擇和建構
分享友人