security protection system 中文意思是什麼

security protection system 解釋
保安系統
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • protection : n 1 保護,保衛,防禦,掩護,包庇,照顧 (from; against)。2 保護者,防護物 (against); 〈美俚〉...
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. Therefore, in order to enhance the regulation of the offeror and the management of target company, to protect the benefits of the shareholders of target company, and to maintain the standard of the security exchange system, not only should the legislative establish the two basic principles of information transparency and equal trea tment of target company ' s shareholders, but also establish the supplementary principles of the protection of middle and small shareholders " benefits, of the forbiddance of underground transaction, of caution offer, and of anti - offer abuse

    因此,除充分披露和目標公司股東平等待遇兩項基本原則外,筆者認為,要約收購還應受保護中小股東利益、要約謹慎、禁止內幕交易及阻撓不得濫用原則的規制,以加強對收購者和目標公司管理部門的規范,保護目標公司股東的利益,維護證券市場的正常秩序。英美兩國在要約收購規制方面的規范較為完善,也做得比較成功,並具有一定的代表性。
  2. The second part estimated this system from two angles, i. e. the function of the security protection of general dealing and the function of perspicuity of code structure system, meanwhile, reviewed the methodology of high abstract and technology of the system. the third part compared the non - reason of real right action theory with goodwill obtaining and the system of improper benefiting in civil law. it compared leitmotif, scope of application and functional mechanism between the non - reason of real right action theory and the system of improper benefiting

    指出物權行為無因性與善意取得制度是兩種獨立的制度,並從兩者的主旨、適用范圍、與作用機理方面進行比較,指出兩種理論保護交易安全的主旨相同,物權行為無因性理論在適用范圍上較善意取得制度更廣泛些,善意取得制度的適用范圍較物權物因性理論則更具有彈性。
  3. Single packet filter technology, with its flaws, cannot provide perfect security protection ; intrusion detection, as an active defense system, is a crucial supplementary to the packet technology and work as a second line of defense ; content filter supplies the gap of the information content protection that two former technologies leave and form the last barrier for security protection

    單純的包過濾技術由於其自身的缺陷而不能提供完全的安全保護。入侵檢測作為一種主動防禦技術,是包過濾的重要補充,起到了第二道防線的作用。內容過濾彌補了前兩種技術在信息內容防範方面的不足,形成了安全防護的最後一道屏障。
  4. Study on the critical technology of information security protection for electric power system

    電力系統信息安全防護關鍵技術的研究
  5. This research mainly utilizes such means as historical analysis, comparative analysis, value analysis and specs analysis etc. started with the origin and development of the protection system of trust, the research launches into a detailed explanation on the value system and specification system two aspects, and such lawmaking will as value orientation, good faith in transaction and trades security infiltrated into the protecting system of trust, which makes it constitute a whole system under the basic principle, then made a systematic, normative research and design of the fulfillment of the protection system of trust

    本文採用了歷史、比較、價值和規范分析等法學方法,從信賴保護制度的歷史沿革入手,在信賴保護制度中滲入社會本位、交易誠信和交易安全的立法意志,對其價值體系和規范體系兩個層次展開論述,使其在基本理念的統攝下構成了民法的一項重要制度體系。除了引言和結語外,正文部分共分為四章:第一章以歷史和比較的法學方法介紹了兩大法系信賴保護制度的演變。
  6. Coded label additional security and protection system

    編碼標號輔加
  7. For bus system installation, the focus is put on cable selection principle, installation process and antinoise measure ; for security protection equipment installation, the intrinsic safety concept, installation method equipment selection and installation under two electric power supply modes ( entity concept and fisco model ) and the bus system protection against surge voltage are illustrated ; for network component installation, the selecting, installing and integrating methods of general purpose terminators, repeaters, link equipment, bus power supply and impedance module are described

    在總線電纜的安裝方面,著重討論了電纜的選型原則、安裝方法和抗噪防擾措施;在安全保護設備安裝方面,介紹了總線系統中本質安全的概念、安裝方法、兩種供電方式(實體概念和fisco模型)下設備的選擇與安裝以及總線系統浪涌電壓的保護和設備安裝方法;在網路元件的安裝方面,主要列舉了通用終端器、中繼器、鏈路設備、總線電源及其阻抗模塊等的選擇、安裝和集成方法,為總線系統的安裝提供了可以借鑒的實用經驗。
  8. The security protection system of shanxi economic information network

    山西省經濟信息網的安全保障體系
  9. Finally, it analyzes the current security malpractices and universal security protection measures that ec faced. it put forward a security e - mail way that based on smart card, especially in improving on set protocol. and it also discusses the security capability of desktop operation system, gives the security user login management of windows 98 that based on smart card

    本文的最後部分分析了當前電子商務領域所面臨的安全隱患和通用的安全防護措施,提出了基於智能卡的安全電子郵件的解決方案,並重點改進了set協議,分析了安全桌面操作系統的安全性,實現了基於智能卡的windows98的安全用戶登錄管理。
  10. The protection system of trust makes trades security have the priority of protection, which is the justified amend and supplementary on autonomy of private law

    彰顯社會本位的信賴保護制度是對交易安全的優位保護和對民法私法自治的合理修正和補充。
  11. In probabilistic dynamic security assessment, probabilistic transient stability " is mainly discussed. detailed models of transmission line, protection system and emergency control measures are added to step - by - step transient stability programs

    首先建立動態模擬中輸電線路和保護系統的詳細模型,建立了基於時域模擬的暫態穩定模型,以及各種緊急控制措施模型。
  12. The present main product includes : has the wirelesshome use commercial security alarm system 、 has the wireless invasioninfrared microwave detector 、 the infrared correlation and theelectronic stockade border protection product 、 the smog fuel gasdetector 、 the security fitting ( gate magnetism 、 switch, button 、 warning light and so on ) 、 the infrared camera, a body camera 、 thenetwork camera 、 the network video frequency server 、 the hard diskvideorecorder and so on peacefully guards against the product

    目前的主要產品有:有無線家用商用防盜報警系統、有無線入侵紅外微波探測器、紅外對射及電子柵欄周界防護產品、煙霧燃氣探測器、防盜配件(門磁、開關、按鈕、警燈等) 、紅外攝像機、一體攝像機、網路攝像機、網路視頻服務器、硬盤錄像機等安防產品。
  13. Many security protection techniques, which have been gradually transited from static security protection techniques to dynamic one, have been studied and explored to assure network information system

    為了保護網路信息系統的安全,人們研究和探索了多種安全防護技術,從一開始的靜態安全防護逐漸過渡到了動態安全防護。
  14. Since the 1996, the security protection system of america and japan was strengthened progressively, and the alliance of america and japan was strengthened

    1996年以來,美日安保體制逐步強化,美日同盟關系加強。
  15. Study of model - based integrated network security protection system

    淺談信息安全學科建設與人才培養
  16. The practice and research of construction of social security protection system

    社會治安防控體系建設的實踐與思考
  17. Analysis and construction of security protection system for computer network of power plant

    發電廠計算機網路安全防護體系的探討
  18. Based on the facts above, how to constructure a dynamic and comprehensive security protection system, becomes hot in the area of network security

    在此基礎上,如何構建一個動態的、全方位的安全防護體系,成為網路安全中研究的熱點。
  19. So through these two technologies, we may build a distributed cooperative detection and security protection system in large - scale network, which is competent for distributed detection, cooperative work and dynamic protection

    將這兩種技術相結合應用於網路安全保障系統中,能夠滿足分散式監測、協同工作和動態防護等現代大型網路監測和安全保障系統的特殊要求。
  20. Based on analysis of network security and network applications, the paper emphatically discuss necessity and feasibility on applying corba technology and cooperative technology to safeguard network. the distributed cooperative detection and security protection system model in large - scale network, dcds, is proposed. several key issues in dcds, for example, object interaction, group communication, cooperative data analysis and cooperative response are discussed in detail

    本文在分析目前網路安全及其應用發展趨勢及存在問題的基礎上,重點分析、論證了將corba技術和協同技術引入到網路安全領域的必要性和可行性,提出了一個分佈、協同的大型網路監測與安全保障系統( dcds )模型及其實現方案,深入研究了系統實現中對象交互、群組通信、協同分析和協同響應等關鍵技術問題及解決方法。
分享友人