私相授受 的英文怎麼說

中文拼音 [xiāngshòushòu]
私相授受 英文
have underhand secret dealings; give undercover payments; give and accept [receive] secretly; illegally pass things between individuals; illegal transfer of public [private] property; make an illicit transfer; make an underhand transaction; offer and acceptance of bribes in secret; privately give and privately accept
  • : Ⅰ形容詞1 (個人的) personal; private 2 (自私) selfish 3 (暗地裡; 私下) secret; private 4 (...
  • : 相Ⅰ名詞1 (相貌; 外貌) looks; appearance 2 (坐、立等的姿態) bearing; posture 3 [物理學] (相位...
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能到的威脅,包括非權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Though bribery was a common practice those days, there were government officers who declined the payments

    雖然當年私相授受金錢在地盤司空見慣,但亦有政府人員堅決對這些利益說不。
  3. Some may think that it is better for business matters to be handled by familiar acquaintances. however, if a secret exchange of private interests is involved, this will constitute a breach of trust, and also violation of the principle of fair play

    有些人認為由熟人幫忙辦事會更好,但假若出現私相授受的情況,便是破壞誠信的行為,亦損害了公平競爭的原則。
  4. As far as the stock option is concerned, a company should comply with the securities act of 1933 and the securities exchange act of 1934. the former prescribes the issue of the stock while the latter supervises the exchange of the stock

    股票期權的予規模對于上市公司而言是一個敏感話題,因此到股東大會和監管機構的嚴格監督,而人控股公司運用股票期權計劃的力度與廣度則要對靈活。
分享友人