security protection 中文意思是什麼

security protection 解釋
安全保護
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • protection : n 1 保護,保衛,防禦,掩護,包庇,照顧 (from; against)。2 保護者,防護物 (against); 〈美俚〉...
  1. The second part estimated this system from two angles, i. e. the function of the security protection of general dealing and the function of perspicuity of code structure system, meanwhile, reviewed the methodology of high abstract and technology of the system. the third part compared the non - reason of real right action theory with goodwill obtaining and the system of improper benefiting in civil law. it compared leitmotif, scope of application and functional mechanism between the non - reason of real right action theory and the system of improper benefiting

    指出物權行為無因性與善意取得制度是兩種獨立的制度,並從兩者的主旨、適用范圍、與作用機理方面進行比較,指出兩種理論保護交易安全的主旨相同,物權行為無因性理論在適用范圍上較善意取得制度更廣泛些,善意取得制度的適用范圍較物權物因性理論則更具有彈性。
  2. Single packet filter technology, with its flaws, cannot provide perfect security protection ; intrusion detection, as an active defense system, is a crucial supplementary to the packet technology and work as a second line of defense ; content filter supplies the gap of the information content protection that two former technologies leave and form the last barrier for security protection

    單純的包過濾技術由於其自身的缺陷而不能提供完全的安全保護。入侵檢測作為一種主動防禦技術,是包過濾的重要補充,起到了第二道防線的作用。內容過濾彌補了前兩種技術在信息內容防範方面的不足,形成了安全防護的最後一道屏障。
  3. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算機信息系統安全體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態防禦以及協同通信平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算機信息系統安全體系建設的動態縱深防禦安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全防護層次的概念,提出了信息類別、威脅級別和安全保障級別的定義,闡述了進行計算機信息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技術的分級要求,從而便於進行計算機信息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於保障上述安全體系動態協同能力的協同通信平臺。
  4. Study on the critical technology of information security protection for electric power system

    電力系統信息安全防護關鍵技術的研究
  5. Correct measures are essential to carry out the peoples equality and development policy and pertinent religion policy in the multi - nation - state ; to form a correct concept of people and to publicize correct ethos by combining nationalism with patriotism ; to prevent and expose the western countries " factionalism on the peoples issues to the multi - nation - state ; to set down the active and effective measures aimed at the terrorist character of the peoples separatist forces. due to the pervading existence of the peoples separatist forces in the world, different countries need to reach the common conclusion to strike the peoples separatist forces ; to cut the capital resources of the peoples separatist forces and terrorist activities, to root out the basement of them, with the lead of un, strike the international support to them ; besides, different countries should strengthen nation security protection, form a new concept of national security, get international and organizing cooperation and get rid of every form of hegemony and power politics

    在民族國家內部應正確實施民族平等團結、各民族共同發展的民族政策及相關的宗教政策;樹立正確的民族觀,把民族主義與愛國主義相結合,進行正確的民族主義思想理論宣傳;防止和揭露西方國家對其他多民族國家實行的民族分裂政策;針對民族分離主義恐怖主義活動的特點,制定出積極、有效的防範措施。由於民族分離主義勢力在世界范圍內具有普遍性,因此,各國應求同存異,尋求打擊民族分離主義及恐怖主義活動的國際共識;切斷民族分離主義分子進行民族分離活動和恐怖活動的資金來源,鏟除國際民族分離主義活動的基地,並充分發揮聯合國主導作用,打擊國際不法組織和個別國家對恐怖活動的支持;此外,各國還應共同加強國家安全工作,樹立新的國家安全觀,進行有組織的國際安全合作,戒除一切形式的霸權主義、強權政治。
  6. For bus system installation, the focus is put on cable selection principle, installation process and antinoise measure ; for security protection equipment installation, the intrinsic safety concept, installation method equipment selection and installation under two electric power supply modes ( entity concept and fisco model ) and the bus system protection against surge voltage are illustrated ; for network component installation, the selecting, installing and integrating methods of general purpose terminators, repeaters, link equipment, bus power supply and impedance module are described

    在總線電纜的安裝方面,著重討論了電纜的選型原則、安裝方法和抗噪防擾措施;在安全保護設備安裝方面,介紹了總線系統中本質安全的概念、安裝方法、兩種供電方式(實體概念和fisco模型)下設備的選擇與安裝以及總線系統浪涌電壓的保護和設備安裝方法;在網路元件的安裝方面,主要列舉了通用終端器、中繼器、鏈路設備、總線電源及其阻抗模塊等的選擇、安裝和集成方法,為總線系統的安裝提供了可以借鑒的實用經驗。
  7. The security protection system of shanxi economic information network

    山西省經濟信息網的安全保障體系
  8. Finally, it analyzes the current security malpractices and universal security protection measures that ec faced. it put forward a security e - mail way that based on smart card, especially in improving on set protocol. and it also discusses the security capability of desktop operation system, gives the security user login management of windows 98 that based on smart card

    本文的最後部分分析了當前電子商務領域所面臨的安全隱患和通用的安全防護措施,提出了基於智能卡的安全電子郵件的解決方案,並重點改進了set協議,分析了安全桌面操作系統的安全性,實現了基於智能卡的windows98的安全用戶登錄管理。
  9. End user improvements include a streamlined interface, tabbed browsing, printing advances, improved search functionality, instant feeds, dynamic security protection, and more

    使用者改良包含簡化的介面索引標簽式瀏覽進階列印改良的搜尋功能立即摘要rss動態安全防護以及其他功能。
  10. Many security protection techniques, which have been gradually transited from static security protection techniques to dynamic one, have been studied and explored to assure network information system

    為了保護網路信息系統的安全,人們研究和探索了多種安全防護技術,從一開始的靜態安全防護逐漸過渡到了動態安全防護。
  11. With import and export rights, the international exhibition, investment and financing, and other qualifications, mainly in the following areas : petroleum, chemical engineering ; paints, rubber and plastics. surface treatment ; energy, metallurgy, iron and steel ; wood ; medical, maintenance, pharmaceutical, medical ; textile and leather ; electronic components instrumentation ; communications, radio and television equipment, media programs ; hvac refrigeration, building materials, engineering and construction ; security, protection, fire ; hardware, tools ; iec electrical, lighting ; lamps and accessories, supplies and maintenance ; environmental protection, water treatment ; machinery and equipment industry ; paper, printing and packaging ; logistics ; secondary transfers ; gifts, toys, jewelry ; food, beverage, forestry, animal husbandry and fisheries ; household goods, hotels, beauty care ; it equipment, digital products, software ; office of books, educational equipment ; sports, leisure, sports goods ; wearing apparel, shoes, and hats, bags ; household appliances, audio - visual equipment, professional lighting ; international exhibitions ; transnational agent ; business services, advertising and other areas of international trade, international investment and financing

    具有進出口權、國際會展權、投融資等資質,目前主要從事的領域有:石油、化工;塗料、橡塑、表面處理;能源、冶金、鋼鐵;木材;醫藥、保養、制藥、醫療;紡織、皮革;電子元器件儀器儀表;通信、廣電設備、傳媒節目;暖通製冷、建材、工程建築;安防、防護、消防;五金、工具;電工電氣、照明;汽摩及配件、用品、維修;環保、水處理;機械及行業設備;紙業、印刷、包裝;物流;二手轉讓;禮品、玩具、珠寶首飾;食品、飲料、農林牧副漁;家居用品、酒店、美容護理; it設備、數碼產品、軟體;辦公圖書、教育裝備;運動、休閑、體育用品;服裝服飾、鞋帽箱包;家電、影音設備、專業燈光;國際性展覽會;跨國代理;商務服務、廣告等領域的國際貿易、國際投融資。
  12. Since the 1996, the security protection system of america and japan was strengthened progressively, and the alliance of america and japan was strengthened

    1996年以來,美日安保體制逐步強化,美日同盟關系加強。
  13. Now provides security protection for vulnerable pointer parameters

    現在可對容易受到攻擊的指針參數提供安全保護。現在,
  14. Efc. efc road transport and traffic telematics - electronic fee collection - guidelines for efc security protection profiles

    道路運輸和交通遠程信息管理.電子收費
  15. The compiler does not provide security protection for vulnerable parameters in the following situations

    在以下情況中,編譯器不會對易受攻擊的參數提供安全保護:
  16. Lifting and dropping of the mechanical arm are realized through ball screw driven by gear motor with belt brake, meanwhile, double security protection is applied, namely, at normal operation limit, the proximity switch is adopted and at upper or lower limit, the stroke switch is available

    上下動作採用帶剎車減速電機帶動滾珠絲桿實現,並採用二級安全保護,即正常工作限位採用接近開關,上下限限位採用行程開關。
  17. Compiling method of budget for security protection engineering expense

    安全防範工程費用預算編制辦法
  18. It is a login that bypasses all security protection on your system

    。系統中的所有安全防護措施對以超級使用者身份登陸者都是無效的。
  19. Put forward a control model which meet the demand of the security protection for spatial database and implement the mandatory access control

    提出了適合於空間數據安全保護需求的控制模型,實現對空間數據的強制安全保護。
  20. The information security platform based on network security protection concept which is put forward here could be used for the information interchange under many operation modes

    提出的網路安全防護理念的信息安全平臺,能適用於多種業務模式下的信息交換。
分享友人