security policy 中文意思是什麼

security policy 解釋
安全策略
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • policy : n 1 政策,政綱;方針,方向;方法。2 策略;權謀;智慧;精明的行為。3 【軍事】政治,行政。4 〈蘇格...
  1. Enables you to view and configure security policy

    使您能夠查看和配置安全策略。
  2. To configure security policy to suit your needs

    來配置安全策略以滿足您的要求。
  3. Invalidated evidence can fool security policy

    失效的證據可以欺騙安全策略。
  4. Review russian history of western security maintenance, we can conclude that there are four action modes, including ( occupying strategic anportant places, scrambling for seaport, building up safety belt, and avoiding two - side campaign. we also can analyse the base of four ideologies including : " moscow - the third rome, " messianic, legitimism and conservation, pan - slavism, and orthodox churh united completcd, which influence russia western security policy nato ( north atlanhc treaty organization ) is the most dripoopt part of russia western security environment

    回顧俄羅斯維護西部安全的歷史,可以總結出俄羅斯維護西部安全的四種行為模式,即搶占戰略要地、爭奪出海口、構造安全帶和避免兩線作戰,分析影響西部安全政策的四種意識形態基礎: 「莫斯科? ?第三羅馬」和救世主說、正統主義和保守主義、泛斯拉夫主義以及全東正教統一思想。
  5. The security policy is abstractly redefined, and made a new interpretation in noninterference theory

    給出了抽象安全策略的新定義,並用無干擾理論重新進行了解釋。
  6. On the qualities of the public security policy makers

    試論公安決策者應具備的素質
  7. The introduction of angeiipro spm ' s security policy management system

    安全策略管理系統介紹
  8. Cannot run, although you can set security policy to allow the execution of trusted but unverifiable code

    則不能運行,盡管可以設置安全策略以使受信任但無法驗證的代碼得以執行。
  9. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  10. You as the authorized administrator need the configuration client to define a security policy and define network objects and log on to the firewall

    ) ,用戶作為授權管理員,需要配置客戶來定義安全策略(和定義網路對象以及登錄防火墻) 。
  11. In december a government - backed report was still calling for “ community relations to be at the heart of security policy

    12月一項由政府支持的報告呼籲團結一致是安全政策的重中之重。
  12. Guarantee integrity, you can base code access security policy on these two forms of assembly evidence. strong naming and signing using the

    進行簽名確保了完整性,因此您可以將代碼訪問安全策略建立在這兩種形式的程序集證據的基礎上。
  13. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  14. If custom code access security policy is set for the

    設置自定義代碼訪問安全策略,以及使用
  15. Upon the implementation of tx - defendingl. o, the author puts forward an idea of expressing network security policy in a formal logic language. the language discussed here is role - based standard deontic logic. this language can not only detect policy consistency, but also resolve policy conflicts

    最後,本文對用於主動防火墻各安全成員之間交互信息的安全策略進行了討論,在理論上提出了一種可以自動檢測策略一致性以及自動解決策略沖突的網路安全策略語言一基於角色的sdl 。
  16. Nato new strategy amp; amp; eu common foreign security policy

    北約新戰略與歐盟共同外交與安全政策
  17. O reilly associates ; 1996, by garfinkel and spafford, is an excellent reference on all aspects of system security from user management to drafting a security policy

    ( o reilly & associates , 1996 ) ,是一個關于系統安全的所有方面(從用戶管理到起草安全策略)的很好參考。
  18. O reilly associates, by garfinkel spafford is an excellent reference to all aspects of system security from user management to drafting a security policy

    ( o reilly & associates )是由garfinkel和spafford撰寫的一份極佳的參考資料,涉及了系統安全性的所有方面,從用戶管理到草擬安全策略。
  19. Due to the security policy, the itci services of singapore airlines for flights flying to united states will be suspended temporarily. united airlines, continental airline, northwest airline and gulf air will close all their itci services temporarily until further notice

    聯合航空因保安理由,新加坡航空飛往美國的航班和聯合航空、美國大陸航空、美國西北航空及海灣航空的所有航班暫停市區預辨登機服務,直至另行通告為止。
  20. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,網路及其安全服務的實現(包括嵌入式協議棧usnet的選取、底層驅動程序的設計和安全協議ipsec的分析與實施) 。
分享友人