操作日誌管理 的英文怎麼說

中文拼音 [cāozuòzhìguǎn]
操作日誌管理 英文
operation log management
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • : Ⅰ名詞1 (太陽) sun 2 (白天) daytime; day 3 (一晝夜; 天) day 4 (泛指某一段時間) time 5 (日...
  • : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  • 日誌 : daily record; journal
  • 管理 : manage; run; administer; supervise; rule; administration; management; regulation
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代為一種先進易用的防火墻技術的原,闡述了linux系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工流程。接著敘述了本透明代服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代服務實現、 gui配置程序以及過濾功能(如url過濾、命令過濾和審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  2. Use the qms, the email system administrators can effective manage the qmail, for example, send email, incept email, check maillog, etc. in a word, the qms not only reduces the email system administrators " labor intensity, but also promotes their work efficiency, and then promotes the enterprise ' s economic benefit

    應用qms使得大容量郵件系統的更加有效,郵件系統員無需深刻了解qmail的運行機制即可靈活qmail ,方便地發送郵件、接收郵件,查看郵件服務器,完成用戶id的維護等工
  3. 7 ) in fsca, all operations of managers are recorded in system log, and digital watermark technology is used to ensure authoritativeness, accountability, integrity of the log

    7 )採用數字水印技術。 fsca系統嚴格記錄員的,並且採用數字水印技術保證其權威性、不可否認性和完整性。
  4. Commands can be typed in to control the operation of sessions, reload configuration, control logging levels and so on

    可輸入命令行用以對話重載配置級別控制等等。
  5. It put out the system requirements from the whole structure, function structure, developing mode, user management, the design of software and database, safety design, system running efficiency, developing plan, etc. it put out the basic graphics operation, the module building and editing of the electrical network, the devices records and function management the devices operating management, the function producing the electrical subject chart, the outside interface function, the in - out function and webgis, etc. it discusses some advanced functions including the theory loss and practical loss computing of the distribution line, the reliability basic data producing and conversing tools, power cut management, the load supplying from other ways, the repairing management on user fault reports, th e new load installing assistant function, the management of hanging the cards and simulating operation, the monitonng and analyzing management of the running information, load monitoring and load density analyzing function and so on

    從系統總體結構,功能結構,開發模式,用戶,軟體和數據庫設計,安全性設計,系統運行效率,開發計劃等方面滿足了系統的總體要求;系統實現了基本圖形,電網建模與編輯,設備臺帳及運行,設備運行,電力專題圖生成,外部介面,輸入輸出, web - gis等基本功能;系統還具有配電線路論線損計算及實際線損計算,可靠性基礎數據生成和數據轉換工具,停電,負荷轉供功能,用戶報修,用戶報裝輔助,掛牌和模擬,運行信息分析監控,負荷監控及負荷密度分析等高級功能:並能從運行方式,用戶權限,運行三個方面闡述本系統的方式。系統總體結構合,功能及介面齊全,配置擴展方便,可性強。
  6. The article elaborates on medical treatment insurance integrated services network mis at last, especially details the issues in actualizing it : the strategy of network security, the technique of popedom management, the technique of multilayer - distributing bases on groupware, encrpytion checkout, the mode of popedom management bases on roles, audit and control of operation - log, and theory of closed loop safety control

    文章最後結合醫保綜合業務網路信息系統實例加以詳細說明,尤其在實施過程中採用了網路安全策略,權限技術,基於組件的多層分散式技術,加密校驗,基於角色的權限方式,審計監控,閉環安全控制論等問題進行了詳細的探討。
  7. By doing so, the jbd is given the appropriate opportunities to manage the journal on behalf of the ext3 filesystem driver

    通過執行這些,給予了jbd代表ext3文件系統驅動程序的適當機會。
  8. Displays server explorer, which allows you to view and manipulate database servers, event logs, message queues, web services, and many other operating system services

    顯示「服務器資源器」窗口,該窗口允許查看並數據庫服務器、事件、消息隊列、 web服務和許多其他的系統服務。
  9. By the study of system security, during implement the mis, the paper shows a way of system management, including two key techniques in user popedom and system log, and shows some discusses in familiar problem of system management

    在開發信息系統的過程中,通過對系統安全性方面的研究,提出了利用權限口令和碼2種關鍵技術來完成系統權限的方法,並就系統中幾個常見的問題做了一定的探討和分析。
  10. Abstract : by the study of system security, during implement the mis, the paper shows a way of system management, including two key techniques in user popedom and system log, and shows some discusses in familiar problem of system management

    文摘:在開發信息系統的過程中,通過對系統安全性方面的研究,提出了利用權限口令和碼2種關鍵技術來完成系統權限的方法,並就系統中幾個常見的問題做了一定的探討和分析。
  11. The information security administration code of internet service business site - part 8 : code of operation of system operation log

    網際網路上網服務營業場所信息安全代碼.第8部分:系統行為代碼
  12. Current operator s identity can be confirmed by system according to different entry cards so that the certain operations the operator can do will be confirmed. and perfect daily management function can provide convenient management and check for system

    系統可根據不同的登錄卡片確定當前員的身份,從而確定該員能進行的;具有完善的功能,便於對系統進行和稽查。
分享友人