程序安全性 的英文怎麼說
中文拼音 [chéngxùānquánxìng]
程序安全性
英文
program security- 程 : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
- 全 : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
- 性 : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
- 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
-
The experimental results showed that in the condition of this experiment four algaecides all had strong removing rate on algae, and their removing rate increased with dose increasing, and decreased with algae density increasing. according to the removing rate on algae and cost value or so, the sequence of four algaecides from good to bad were potassium permanganate, copper sulfate, hydrogen peroxide and sodium hypochlorite. in the condition of this experiment, the suitable dose of potassium permanganate was 0. 8mg / l, the algal removing rate was beyond 90 % and the cost of this algaecide was only 0. 0068 / m3. the efficiency of algae removal by four algaecides for huanghe river water was studied. the results showed that the majority of huanghe river water was bacillaroiphyta, and the dominant genera was melosira, which reached 78 % ~ 94 %
結果表明,在實驗條件下,四種殺藻劑均具有一定的殺藻效果,藻類去除率均隨藥劑投量的增加而提高;原水藻類數量影響殺藻劑殺藻效果,四種殺藻劑的藻類去除率均隨原水藻類數量的增加而降低;通過殺藻效果、經濟性以及安全性等方面的綜合比較,對于以有毒藍藻為優勢藻屬的引灤水,四種殺藻劑的優劣程度從優到劣排序為:高錳酸鉀硫酸銅過氧化氫次氯酸鈉;在實驗條件下,高錳酸鉀適宜投加量為0 . 8mg l ,藻類去除率高於90 ,所需的藥劑費用僅為0 . 0068元m ~ 3 。Secure java apps on linux using md5 crypt
使用md5加密來增強linux上java應用程序的安全性Software, including openoffice, security applications, and gimp, covers a wide range of common needs
軟體包括openoffice 、安全性應用程序和gimp ,涵蓋了各種常見需求。The main way rogue programs get into a system is by exploiting security holes in the operating system
惡意的程序進入系統的主要方法是利用操作系統的安全性漏洞。Code access security for clickonce applications
> clickonce應用程序的代碼訪問安全性A graded series of sample applications which provide examples of how web services and web service clients are coded, starting with the basics and moving on to more sophisticated aspects such as security
一系列劃分了等級的樣本應用程序,這些應用程序從最基本的開始,逐步深入到更加復雜的方面如安全性,提供了有關如何編寫web服務和web服務客戶端的示例。This article takes a look at a little shell application that uses an innovative approach to increasing open unix security
本文要看一下使用一種新方法提高開放式unix安全性的小外殼( shell )應用程序。Application security through support for servlet filters
通過支持servlet過慮器實現應用程序安全性。Although this process may create more security roles than are necessary for your environment, this one - to - one mapping of method groups to application security roles lets users execute the same methods they could execute before migration
盡管這個過程也許會創建比您的環境所必須的更多的安全性角色,這個從方法組到應用程序安全性角色的一對一映射使得用戶可以執行那些與他們遷移前所能執行的方法相同的方法。These runtime program safety features also contribute to the java language s ease of development
這些運行時程序安全特性還提供了用java語言開發的便利性。Office 97 odbc driver vulnerability security update
Office 97 odbc驅動程序安全性缺陷安全更新Office 2000 odbc driver vulnerability security update
Office 2000 odbc驅動程序安全性缺陷安全更新Describes the effects of event log interactions on application security
描述事件日誌交互對應用程序安全性的影響。Download details : office 97 odbc driver vulnerability security update
下載詳細信息: office 97 odbc驅動程序安全性缺陷安全更新Add - in security
>外接程序安全性Download details : office 2000 odbc driver vulnerability security update
下載詳細信息: office 2000 odbc驅動程序安全性缺陷安全更新The runtime features of the java virtual machine environment enforce program safety in several ways
Java虛擬機( java virtual machine , jvm )環境的運行時特性以幾種方式來加強程序安全性。User name, password : these can be any values needed to pass db2 universal driver security, mentioned earlier
用戶名、口令:這些是任意值(如前面提到的,需要通過db2通用驅動程序安全性) 。Even if you have limited experience with and knowledge of application security, there are basic measures that you should take to help protect your web applications
即使您對應用程序安全性的體驗和了解非常有限,也應採取一些基本措施來保護您的web應用程序。Many former systems like this is purely according to c / s mode, but this system is base on the combine of c / s and b / s, and the same time, the high speed network technique of today is used, therefore the function of this system is more perfect ; the constructions of each departments of this system about database are discussed ( include mold construction, the table construction of database etc. ), the key techniques of database ( stored process, trigger and the safety technique ), the safety design of database, the safety design of program etc., and the establishing of data warehouse of customer is introduced, and a technique about graph of customer data warehouse ( realized with powerbuilder ) ; the design of network construction is briefly discussed ; the choice of servers is introduced in detail ( include the database server and the the web server )
以往的此類系統大多單純基於c / s模式設計,而本系統是兩種模式的結合,充分利用當今高速發展的網路技術,所以功能更加完善和強大;數據庫技術方面詳細介紹了各分系統的功能模塊設計(包括模塊結構、數據庫表結構設計等) 、后臺數據庫的關鍵技術(存儲過程、觸發器和數據庫的安全技術) 、數據庫安全性設計(採用雙機容錯解決方案) 、程序安全性設計和權限配置等,同時介紹了客戶數據倉庫的建立方案和客戶數據倉庫的一種可視化技術(用pb和sybase的工具來實現) ;簡要介紹了系統的網路結構設計過程;詳細介紹了服務器的選擇和選擇結果(包括數據庫服務器和web服務器) 。分享友人