程序安全性 的英文怎麼說

中文拼音 [chéngānquánxìng]
程序安全性 英文
program security
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
  1. The experimental results showed that in the condition of this experiment four algaecides all had strong removing rate on algae, and their removing rate increased with dose increasing, and decreased with algae density increasing. according to the removing rate on algae and cost value or so, the sequence of four algaecides from good to bad were potassium permanganate, copper sulfate, hydrogen peroxide and sodium hypochlorite. in the condition of this experiment, the suitable dose of potassium permanganate was 0. 8mg / l, the algal removing rate was beyond 90 % and the cost of this algaecide was only 0. 0068 / m3. the efficiency of algae removal by four algaecides for huanghe river water was studied. the results showed that the majority of huanghe river water was bacillaroiphyta, and the dominant genera was melosira, which reached 78 % ~ 94 %

    結果表明,在實驗條件下,四種殺藻劑均具有一定的殺藻效果,藻類去除率均隨藥劑投量的增加而提高;原水藻類數量影響殺藻劑殺藻效果,四種殺藻劑的藻類去除率均隨原水藻類數量的增加而降低;通過殺藻效果、經濟以及等方面的綜合比較,對于以有毒藍藻為優勢藻屬的引灤水,四種殺藻劑的優劣度從優到劣排為:高錳酸鉀硫酸銅過氧化氫次氯酸鈉;在實驗條件下,高錳酸鉀適宜投加量為0 . 8mg l ,藻類去除率高於90 ,所需的藥劑費用僅為0 . 0068元m ~ 3 。
  2. Secure java apps on linux using md5 crypt

    使用md5加密來增強linux上java應用
  3. Software, including openoffice, security applications, and gimp, covers a wide range of common needs

    軟體包括openoffice 、應用和gimp ,涵蓋了各種常見需求。
  4. The main way rogue programs get into a system is by exploiting security holes in the operating system

    惡意的進入系統的主要方法是利用操作系統的漏洞。
  5. Code access security for clickonce applications

    > clickonce應用的代碼訪問
  6. A graded series of sample applications which provide examples of how web services and web service clients are coded, starting with the basics and moving on to more sophisticated aspects such as security

    一系列劃分了等級的樣本應用,這些應用從最基本的開始,逐步深入到更加復雜的方面如,提供了有關如何編寫web服務和web服務客戶端的示例。
  7. This article takes a look at a little shell application that uses an innovative approach to increasing open unix security

    本文要看一下使用一種新方法提高開放式unix的小外殼( shell )應用
  8. Application security through support for servlet filters

    通過支持servlet過慮器實現應用程序安全性
  9. Although this process may create more security roles than are necessary for your environment, this one - to - one mapping of method groups to application security roles lets users execute the same methods they could execute before migration

    盡管這個過也許會創建比您的環境所必須的更多的角色,這個從方法組到應用程序安全性角色的一對一映射使得用戶可以執行那些與他們遷移前所能執行的方法相同的方法。
  10. These runtime program safety features also contribute to the java language s ease of development

    這些運行時還提供了用java語言開發的便利
  11. Office 97 odbc driver vulnerability security update

    Office 97 odbc驅動程序安全性缺陷更新
  12. Office 2000 odbc driver vulnerability security update

    Office 2000 odbc驅動程序安全性缺陷更新
  13. Describes the effects of event log interactions on application security

    描述事件日誌交互對應用程序安全性的影響。
  14. Download details : office 97 odbc driver vulnerability security update

    下載詳細信息: office 97 odbc驅動程序安全性缺陷更新
  15. Add - in security

    >外接程序安全性
  16. Download details : office 2000 odbc driver vulnerability security update

    下載詳細信息: office 2000 odbc驅動程序安全性缺陷更新
  17. The runtime features of the java virtual machine environment enforce program safety in several ways

    Java虛擬機( java virtual machine , jvm )環境的運行時特以幾種方式來加強程序安全性
  18. User name, password : these can be any values needed to pass db2 universal driver security, mentioned earlier

    用戶名、口令:這些是任意值(如前面提到的,需要通過db2通用驅動程序安全性) 。
  19. Even if you have limited experience with and knowledge of application security, there are basic measures that you should take to help protect your web applications

    即使您對應用程序安全性的體驗和了解非常有限,也應採取一些基本措施來保護您的web應用
  20. Many former systems like this is purely according to c / s mode, but this system is base on the combine of c / s and b / s, and the same time, the high speed network technique of today is used, therefore the function of this system is more perfect ; the constructions of each departments of this system about database are discussed ( include mold construction, the table construction of database etc. ), the key techniques of database ( stored process, trigger and the safety technique ), the safety design of database, the safety design of program etc., and the establishing of data warehouse of customer is introduced, and a technique about graph of customer data warehouse ( realized with powerbuilder ) ; the design of network construction is briefly discussed ; the choice of servers is introduced in detail ( include the database server and the the web server )

    以往的此類系統大多單純基於c / s模式設計,而本系統是兩種模式的結合,充分利用當今高速發展的網路技術,所以功能更加完善和強大;數據庫技術方面詳細介紹了各分系統的功能模塊設計(包括模塊結構、數據庫表結構設計等) 、后臺數據庫的關鍵技術(存儲過、觸發器和數據庫的技術) 、數據庫設計(採用雙機容錯解決方案) 、程序安全性設計和權限配置等,同時介紹了客戶數據倉庫的建立方案和客戶數據倉庫的一種可視化技術(用pb和sybase的工具來實現) ;簡要介紹了系統的網路結構設計過;詳細介紹了服務器的選擇和選擇結果(包括數據庫服務器和web服務器) 。
分享友人