security standards 中文意思是什麼

security standards 解釋
安全標準
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • standards : 標準,規程
  1. In the meantime, foster and others at the argonne national laboratory and the globus alliance continue to forge ahead with the creation of additional grid computing standards, particularly those involving information sharing and security - a particular hot button for many companies interested in grid computing but concerned about the loss of sensitive data

    同時, foster和在argonne national laboratory和globus alliance的其他人繼續制定附加的網格計算標準,特別是關于信息共享和安全的標準對于許多對網格計算感興趣,但又擔心丟失敏感數據的公司來說是特別好的標準。
  2. Worldwide association of is professionals dedicated to the audit, control, and security of information systems. offer cisa qualification and cobit standards

    -一家以信息安全理論為主的研究單位,並提供信息安全產品設計和開發,安全解決方案,咨詢評估服務。
  3. What are some tried and tested ways of implementing security, ensuring performance, compliance with standards for interoperability, designing for change

    什麼是可靠和經過測試的方式來實現安全,確保性能,遵從互操作性標準,設計來作改變?
  4. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算機信息系統安全體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態防禦以及協同通信平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算機信息系統安全體系建設的動態縱深防禦安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全防護層次的概念,提出了信息類別、威脅級別和安全保障級別的定義,闡述了進行計算機信息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技術的分級要求,從而便於進行計算機信息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於保障上述安全體系動態協同能力的協同通信平臺。
  5. Then according to the efficient - market hypothesis ( emh ), investment theory, information economics, the author systematically study the problems of the normative accounting in the security market, such as, accounting standards normalization, the relationship between the emh and accounting information, the disclosure of accounting information, and the auditing supervisions by cpas. in the end, a normative system for the accounting normalization to play a role in the composite harness of the security market set up

    本文首先針對證券市場中亟待規范的問題提出證券市場會計規范的涵義和必要性,再以有效市場假說理論、投資學理論、信息經濟學為指導,分別對會計準則規范、有效市場假說與會計信息的關系、會計信息披露制度規范和審計監督在會計規范中的重要作用做了深入的研究。
  6. Article 27 urban people ' s governments shall, in accordance with the standards on fire control station construction, set up public security fire brigade, full time fire brigade to undertake fire fighting and rescue work

    第二十七條城市人民政府應當按照國家規定的消防站建設標準建立公安消防隊、專職消防隊、承擔火災撲救工作。
  7. Our social security law now implements the above principles. it does not just implement the principles of universality, rights, fairness, developing its social security standards and state security. this is because of our national conditions and its properties

    我國的國情及社會保障自身的特點決定了我國目前的社會保障法還只能貫徹這五個基本原則,而不是僅貫徹普遍性原則、權利性原則、公平原則、提高社會保障水平原則、國家保障原則。
  8. Finger security standards ip20 screw terminals

    標準手指安全保護ip20螺絲端子
  9. The modules include the bsp design, the drivers of the periphery hardware ( gpio , iic , flash , tuner etc. ), the mac end drivers ( ethernet, usb, cable ), the message queue control, the bpi +. in addition, because the pieces of safe protocol for data transmission is blank in the cable network data transmission standard that our country will put out, the author gives a security project for the data transmission on the cable networks that is accord with the security standards of china and uses the chinaese ca certificate and security arithmetics and realizes it in the capinfo cable modem

    另外,我國將要推出的線纜網數據傳輸規范中關于數據傳輸安全部分是個空白,本文在分析docsis1 . 1中的數據傳輸安全協議bpi +的實現技術的基礎上,給出了一種可以滿足中國國家相關安全規定的cable網數據傳輸安全解決方案(應用中國設計的數字證書和安全演算法) ,並介紹了在我們研發的cablemodem中對此方案的實現。
  10. The globus grid security infrastructure provides guidelines at the grid level, but you must also be aware of any local security standards and policies that were in use before a particular group of machines became part of a particular grid

    Globus中的網格安全基礎設施( globus grid security infrastructure , gsi )為我們提供了網格級別的指導,但是您還必須知道所有使用的本地安全標準及策略,然後才能將特定的一組機器變成某個網格的組成部分。
  11. How can i have an impact on the security standards of my foreign service providers and affiliated foreign manufacturers

    問:我怎樣才能對我的國外服務提供商和有關聯的國外製造商在安全標準方面施加影響?
  12. Q : how can i have an impact on the security standards of my foreign service providers and affiliated foreign manufacturers

    問:我怎樣才能對我的國外服務提供商和有關聯的國外製造商在安全標準方面施加影響?
  13. Cryptographic service provider ( csp ) is the base of microsoft ' s security applications frame and services, which has asn. l, the series of pkcs security standards as reference and provides the basic security services such as encryption, decryption, digital signature and verifying signature

    Csp ( cryptographicserviceprovider )是微軟公司提出的安全服務基本框架之一,它參照了asn 1 、 pkcs等一系列的國際安全標準,能夠提供給用戶加解密、驗證信息的完整性等基本安全服務,具有簡明、易於使用的優點。
  14. Information security standards kit

    信息安全標準叢書
  15. Support for web services standards including ws - security standards

    支持web服務標準,包括web服務安全性標準。
  16. She helps to ensure security standards within ibm as well as with external customers

    她幫助確保ibm內以及外部客戶的安全性標準。
  17. Is a vendor - neutral source for information relating to web services security standards work

    是一個有關web服務安全性標準工作信息的vendor - neutual的來源。
  18. Familiar with state laws and procedure & policies of environment, health and security standards as well

    熟悉國家頒布以及其它相關的環境、健康、安全標準、程序及政策。
  19. An intuitive performance evaluation result is given through qualitative analysis and quantitative comparison. implementation analysis is done from various aspects, including timeliness, scalability, security, standards - based, complexity of realization

    通過定性分析和定量比較給出了直觀的性能分析結果,並從不同角度(及時性、可擴展性、安全性、標準兼容性和實現復雜性)進行了可實施性研究。
  20. In february 2002, teco established an independent company gdteco, the worlds leading smart card manufacturer. the smart card plant is built and operated with the highest security standards of such of bank note printing plants. the plant is visa and mastercard certified for card manufacture, chip embedding, chip personalization, and lettershop

    東元因承攬健保ic卡專案,于桃園觀音建置了一個亞洲最大規模之ic卡制卡廠,從晶片的承製程式的置入到卡體的印刷合成皆一貫作業,並與德商g d合資成立東元捷德股份有限公司,提供醫療交通金融等應用ic卡領域的完整解決方案。
分享友人