計算機保護 的英文怎麼說

中文拼音 [suànbǎo]
計算機保護 英文
cyber protection
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : machineengine
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. Physical equipment as opposed to programs, procedures, rules, and associated documentation ; chip level solutions that hook onto back plane of computer to protect it

    與程序、過程、規則和相關文件相對的物理設備;固定於背板上的晶元裝置。
  2. According to trusted compeer seeffiity evaluation standard ( tgskt ), tfae security level of ^ armostall dbms is c2, and it is not eueuglrto safeguarded ^ it is necessary and pressing to afford a credible system to protect infomation resource

    按照可信評估標準tcsec看,當前多數dbms系統只具備c2級安全性,這種安全性對數據的是不夠的。提供一個可靠的mlsdbms系統來系統信息資源是必要的,迫切的。
  3. It is still possible with windows 98 and its ilk to protect a computer against a network

    使用windows 98及其同類產品來免受網路攻擊還是有可能的。
  4. At the same time, the starter has diversified functions of motor protecting, and realizes the intercommunication with central master computer

    同時,還具備了各種電動功能,並實現與主控的雙向通信。
  5. With the development of electronics and microcomputer, microprocessor - based protection has advanced. but much of than are just the republication of the electromechanical and electronic protection. many advantages of the computer, such as nunerical evaluation data storage and logical decision, is n ' t used

    異步電動的研究由來已久,隨著電子和微技術的發展,異步電動也得到了大力的發展,但很多僅是電式和電子式的翻版,沒有真正利用微所具有強大的數值能力、數據存儲能力和邏輯判斷能力,使更加的精確、可靠和智能化。
  6. With the development of electronics and microcomputer, microprocessor - based protection has advanced. but some of them are just the republication of the electromechanical and electronic proteciton. they can not fully utilize the computing capability and logic judgement that the computer has and most of the microprocessor - based protection is running isolated

    異步電動的研究由來已久,隨著電子和微技術的發展,異步電動也得到了快速的發展,但很多僅是電式和電子式的翻版,沒有充分利用微所具有的強大的能力和邏輯判斷能力,而且目前的異步電動裝置大都是單臺運行,與外界進行數據交換很少。
  7. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    系統資源,需要建立不同於防火墻和防病毒軟體的主動防禦制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或系統的動態行為特徵並據此判斷是否有入侵的主動防禦措施。
  8. Be familiar with hv, mv and lv power distribution systems and power factor correction study & harmonic analysis, ups and dc power systems, power fiscal metering, and all necessary calculations to one project including short circuit calculation and protective device coordination study, lightning protection calculation, generator power calculation etc

    熟悉項目中的高、中、低壓配電系統和功率因素補償研究及諧波分析, ups和直流電氣系統,功率量,相關(包括短路裝置協調分析,照明,發電功率等) 。
  9. The new utility model referrs to a kind of cleaning guard board for computer keyboard and keyboard cover

    本實用新型是一種用於鍵盤鍵帽的板。
  10. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對信息系統安全體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態防禦以及協同通信平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導信息系統安全體系建設的動態縱深防禦安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全防層次的概念,提出了信息類別、威脅級別和安全障級別的定義,闡述了進行信息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技術的分級要求,從而便於進行信息系統的安全設以及產品的選型; 4 )設並基本實現了用於障上述安全體系動態協同能力的協同通信平臺。
  11. The algorithms of microprocessor distance protection emulated and calculated in this paper are used to realize the inverse time characteristic of microprocessor distance protection

    本課題模擬法用於實現高壓線路微距離的反時限。微距離是高壓線路的重要之一。
  12. For gamma knife treatment, first let the patient lie on his or her back on the surgical bed, and then fix the head of the patient and make some necessary measures to protect his or her sensitive parts and finically start up the control system

    治療開始,病人進入治療室並仰臥于治療床上,固定好病人頭部並做好敏感部位的后,啟動控制系統。控制臺按照接受到的治療方案在自動控制下對病人進行治療。
  13. Setup functions enable user - defined adaptation of a wide variety of options such as display contrast, record printout, saving data on the computer, general code, temperature calibration, acoustic signal, date and time, id, data transfer, update fix programs, language, screen saver, c f changeover, check programme, battery change, diagnosis data, printing programs, seal test, service functions for maintenance

    設置功能允許使用人員對多種選項進行定義和調節,例如顯示屏幕對比度列印記錄把數據記錄到上總碼溫度校正音響信號日期和時間識別傳輸數據固定程序升級語言屏幕攝氏和華氏溫度轉換檢查程序更換電池診斷數據列印程序測試密封養用服務功能
  14. The factory has possessed advanced production equipments and wire cable check equipment at domestic. first class technology will provide you wire cable with fluorin polymer used in in aviation spaceflight, electric cables, control cables, computer cables, compensatory wire cables, fire - proof cables with high temperature, general plastic cables that classified into sixteen species and over one thousand specifications. cables for " hongyuan " brand are widely used in the fields of spaceflight, national defence, electric petroleum chemistry, steel, public establishments, environmental perfection and architecture. temperature - proof cables with " hongyuan " brand were awarded with famous products in 2001 which are widely sold all through the world and have been won customers trust

    一流科技力量為您提供航天用含氟電線電纜電力電纜耐熱防腐硅橡膠電纜耐高溫電纜控制電纜網路電纜補償用電線電纜船用電纜橡套電纜阻燃防火電纜等十六大類,一千多種規格產品,並可根據擁特殊要求,自行設生產,以滿足顧客要求,多年來「宏源」牌電線電纜廣泛用於航空航天國防軍工電子原件電力石化鋼鐵冶金公共設施環建築等領域,深受廣大用戶高度評價和信賴。
  15. Its support for granular access control, inheritance, and delegation of administrative task gives you the flexibility to secure resources without compromising your network ' s purpose

    它支持管理任務的粒狀通路控制、繼承和授權,使用戶能靈活資源而不會泄露網路目的。
  16. This topic provides recommendations to help you protect your visual studio tools for office solutions against possible threats, and contains information about programming outlook add - ins to run on computers that have the outlook object model guard enabled

    本主題提供幫助您visual studio tools for office解決方案以抵禦可能威脅的建議,並包含有關編寫在啟用outlook對象模型上運行的outlook外接程序的信息。
  17. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演法魯棒
  18. In order to avoid impersonation attacks, you should ban duplicate names and secure computer names by creator

    為了避免偽裝攻擊,應禁止重復的名稱,創建者應名稱的安全。
  19. In computer security, automatic termination and protection of programs and / or processing systems when a hardware or software failure is detected in an automated information system

    安技術中,自動化信息系統發現硬、軟體故障或錯誤時,為使系統不致於癱瘓而自動終止程序或處理系統的運行,以便它們。
  20. After you install this item, you may have to restart your computer. other critical security updates are available

    為了幫助您盡早將計算機保護起來,我們及時提供了本更新程序。
分享友人