軟體安全性 的英文怎麼說
中文拼音 [ruǎntǐānquánxìng]
軟體安全性
英文
software security- 軟 : Ⅰ形容詞1 (質地不硬) soft; flexible; supple; pliable 2 (柔和) soft; mild; gentle 3 (軟弱) we...
- 體 : 體構詞成分。
- 全 : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
- 性 : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
- 軟體 : [計算機] software軟體包 (程序包) software package; 軟體程序 software program; 軟體跟蹤方式 soft...
-
Operating system is the only basic software anear the hardware. its security is the base of other software. if there is no the security base, the security of application system or security system building on operating system, such as pki, encryption techniques, is not ensured
操作系統是唯一緊靠硬體的基本軟體,其安全職能是其他軟體安全職能的根基,缺乏這個安全的根基,構築在其上的應用系統以及安全系統,如pki 、加密解密技術的安全性是得不到根本保障的。2. the characteristics of this software are security, catholicity, adaptability and practicability, and it " s easy to master. 3
根據本軟體的特點在開發過程中要充分把握可靠性、安全性、容錯性、適應性、開放性、實用性、先進性和易用性等原則。In this paper, the application of centum cs1000 of yokogawa in the benzene chloride production is discussed. the system struct, software and hardware of the engineering workstation and human interface station, system configuration, safety property and grounding are also studied
本文以實際工程為背景,論述了橫河的centumcs1000在氯化苯生產過程中的應用,對系統選型、工程師站和操作員站軟硬體配置、現場控制站配置、系統組態、安全性、接地等問題進行了一定的探討。The serious issue of computer software security will be explored in this programme. the programme goes on to discuss three forms of software attacks the virus, the trojan horse and the worm and demonstrates how the use of a firewall installed into a computer network can provide a good measure of protection
電腦網路究竟有多安全?本節目會探討電腦軟體安全的嚴重性,以及電腦病毒木馬程式和蠕蟲攻擊軟體的方式。另外,亦會介紹如何利用防火墻保護電腦網路。So let s take a look at the tech specification with an eye towards understanding where things may need to be changed as services evolve
既然有那麼多的軟體安全性缺點,那麼對計算機的直接攻擊通常是攻擊者的最好辦法。Software security principles : part 4
軟體安全性原則:第四部分Formal fault tree analysis modeling and software safety testing
形式化故障樹分析建模和軟體安全性測試Software safety assessment criterions with the nelson software reliability model
模型的軟體安全性評估準則Standard for software safety plans
軟體安全性方案標準Reliable software technologies
軟體安全性原則Software security principles
軟體安全性原則John has authored more than 50 technical publications, primarily in the area of software security
John已經撰寫了50多篇出版物,主要關于軟體安全性領域。No matter how many resources microsoft pours into making its software secure, some flaws are inevitable
無論微軟為軟體安全性投入多少錢,瑕疵總是無法避免的。Railway fixed equipment and rolling stock. data processing. software dependability. adapted methods for softwares safety analysis
鐵路固定設備和機車車輛.數據處理.軟體的可信性.用於軟體安全分析的方法Compare dbs aes with permutation code, we found use encryption and decryption technology based on permutation code, can ensure the encrypted software ca n ' t be pirated
對比des 、 aes ,說明使用排列碼加密演算法,是可以保證被加密的軟體安全性的。It is characteristic of real - time processing, which realizes high safe reliability, good and expandability and friendly man - machine interface
該軟體安全可靠,具有實時性好、擴展性強以及人機介面友好等特點。During his more than 20 year career in computing, bill has been involved with embedded software for networking systems, security system products, and computational science and engineering
在電腦業有超過20年工作經驗的bill ,曾做過網路系統之嵌入軟體安全性系統產品及計算科學與工程等相關工作。This thesis bases on the actual need that ensures high - efficient operation of military political work information system and advances the informatization construction of military political work. being directed against the characteristics of the military political work information system and current situation of the development, the article carried on the discussion from four respects of the safe protection : database, network, application software and physics. on the basis of having analyzed on security questions and threats in detail, the article has proposed a series of safeguard procedures separately
本論文立足於保障我軍政治工作信息系統的高效運轉、推進我軍政治工作信息化建設的現實需要,針對我軍政治工作信息系統的特點和現狀,從政治工作信息系統的數據庫安全防護、網路安全防護、應用軟體安全防護以及物理安全防護四個方面進行探討,在詳細分析了各自存在的安全問題和面臨的安全威脅的基礎上,有針對性地提出了一系列安全防護措施。John viega is a senior research associate, software security group co - founder, and senior consultant at
進階副研究員、軟體安全性小組共同創始人以及進階顧問。We know from our last installment of this column that random numbers often have security - critical ramifications. the problem is that deterministic machines don t have an easy time being random
我們的第一篇專欄文章向您介紹安全思想,並解釋我們為什麼把精力專門放在開發者所面臨的軟體安全性問題上。分享友人