軟體安全性 的英文怎麼說

中文拼音 [ruǎnānquánxìng]
軟體安全性 英文
software security
  • : Ⅰ形容詞1 (質地不硬) soft; flexible; supple; pliable 2 (柔和) soft; mild; gentle 3 (軟弱) we...
  • : 體構詞成分。
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 軟體 : [計算機] software軟體包 (程序包) software package; 軟體程序 software program; 軟體跟蹤方式 soft...
  1. Operating system is the only basic software anear the hardware. its security is the base of other software. if there is no the security base, the security of application system or security system building on operating system, such as pki, encryption techniques, is not ensured

    操作系統是唯一緊靠硬的基本,其職能是其他職能的根基,缺乏這個的根基,構築在其上的應用系統以及系統,如pki 、加密解密技術的是得不到根本保障的。
  2. 2. the characteristics of this software are security, catholicity, adaptability and practicability, and it " s easy to master. 3

    根據本的特點在開發過程中要充分把握可靠、容錯、適應、開放、實用、先進和易用等原則。
  3. In this paper, the application of centum cs1000 of yokogawa in the benzene chloride production is discussed. the system struct, software and hardware of the engineering workstation and human interface station, system configuration, safety property and grounding are also studied

    本文以實際工程為背景,論述了橫河的centumcs1000在氯化苯生產過程中的應用,對系統選型、工程師站和操作員站配置、現場控制站配置、系統組態、、接地等問題進行了一定的探討。
  4. The serious issue of computer software security will be explored in this programme. the programme goes on to discuss three forms of software attacks the virus, the trojan horse and the worm and demonstrates how the use of a firewall installed into a computer network can provide a good measure of protection

    電腦網路究竟有多?本節目會探討電腦的嚴重,以及電腦病毒木馬程式和蠕蟲攻擊的方式。另外,亦會介紹如何利用防火墻保護電腦網路。
  5. So let s take a look at the tech specification with an eye towards understanding where things may need to be changed as services evolve

    既然有那麼多的軟體安全性缺點,那麼對計算機的直接攻擊通常是攻擊者的最好辦法。
  6. Software security principles : part 4

    軟體安全性原則:第四部分
  7. Formal fault tree analysis modeling and software safety testing

    形式化故障樹分析建模和軟體安全性測試
  8. Software safety assessment criterions with the nelson software reliability model

    模型的軟體安全性評估準則
  9. Standard for software safety plans

    軟體安全性方案標準
  10. Reliable software technologies

    軟體安全性原則
  11. Software security principles

    軟體安全性原則
  12. John has authored more than 50 technical publications, primarily in the area of software security

    John已經撰寫了50多篇出版物,主要關于軟體安全性領域。
  13. No matter how many resources microsoft pours into making its software secure, some flaws are inevitable

    無論微軟體安全性投入多少錢,瑕疵總是無法避免的。
  14. Railway fixed equipment and rolling stock. data processing. software dependability. adapted methods for softwares safety analysis

    鐵路固定設備和機車車輛.數據處理.的可信.用於分析的方法
  15. Compare dbs aes with permutation code, we found use encryption and decryption technology based on permutation code, can ensure the encrypted software ca n ' t be pirated

    對比des 、 aes ,說明使用排列碼加密演算法,是可以保證被加密的軟體安全性的。
  16. It is characteristic of real - time processing, which realizes high safe reliability, good and expandability and friendly man - machine interface

    可靠,具有實時好、擴展強以及人機介面友好等特點。
  17. During his more than 20 year career in computing, bill has been involved with embedded software for networking systems, security system products, and computational science and engineering

    在電腦業有超過20年工作經驗的bill ,曾做過網路系統之嵌入軟體安全性系統產品及計算科學與工程等相關工作。
  18. This thesis bases on the actual need that ensures high - efficient operation of military political work information system and advances the informatization construction of military political work. being directed against the characteristics of the military political work information system and current situation of the development, the article carried on the discussion from four respects of the safe protection : database, network, application software and physics. on the basis of having analyzed on security questions and threats in detail, the article has proposed a series of safeguard procedures separately

    本論文立足於保障我軍政治工作信息系統的高效運轉、推進我軍政治工作信息化建設的現實需要,針對我軍政治工作信息系統的特點和現狀,從政治工作信息系統的數據庫防護、網路防護、應用防護以及物理防護四個方面進行探討,在詳細分析了各自存在的問題和面臨的威脅的基礎上,有針對地提出了一系列防護措施。
  19. John viega is a senior research associate, software security group co - founder, and senior consultant at

    進階副研究員、軟體安全性小組共同創始人以及進階顧問。
  20. We know from our last installment of this column that random numbers often have security - critical ramifications. the problem is that deterministic machines don t have an easy time being random

    我們的第一篇專欄文章向您介紹思想,並解釋我們為什麼把精力專門放在開發者所面臨的軟體安全性問題上。
分享友人