配置服務程序 的英文怎麼說
中文拼音 [pèizhìbìwùchéngxù]
配置服務程序
英文
configuration service program- 配 : Ⅰ動詞1 (兩性結合) join in marriage 2 (使動物交配) mate (animals) 3 (按適當的標準或比例加以...
- 置 : 動詞1. (擱; 放) place; put; lay 2. (設立; 布置) set up; establish; arrange; fix up 3. (購置) buy; purchase
- 服 : 服量詞(用於中藥; 劑) dose
- 務 : Ⅰ名詞1 (事情) affair; business 2 (姓氏) a surname Ⅱ動詞1 (從事; 致力) be engaged in; devote...
- 程 : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
- 配置 : dispose (troops, etc. ); deploy; allocation; collocation; configuration; positioning; allotment
- 服務 : give service to; be in the service of; serve
- 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
-
Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated
首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。This sort of configuration management can be done for all acquirable components in the application architecture, from ejb components to jms queues and topics to simple configuration strings or other objects, lowering maintenance costs as services change over time, and easing deployment and integration efforts
可以對應用程序架構中所得到的所有組件進行這類配置管理,從ejb組件到jms隊列和主題,再到簡單配置字元串或其他對象,這可以降低隨時間的推移服務變更所產生的維護成本,同時還可以簡化部署,減少集成工作。It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed
本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,網路及其安全服務的實現(包括嵌入式協議棧usnet的選取、底層驅動程序的設計和安全協議ipsec的分析與實施) 。If the report server is running when you introduce the error, the report server ignores the invalid configuration file until the report server restarts or the application domain is recycled
如果當引入錯誤時報表服務器正在運行,則報表服務器忽略無效的配置文件,直到報表服務器重新啟動或回收了應用程序域為止。Typically, five days of classroom training is enough to arm seasoned application server administrators with the information they need to install, configure and maintain websphere application server
一般情況下, 5天的課堂培訓就足以使經驗豐富的應用程序服務器管理員了解安裝、配置和維護websphere application server所需的信息。As an enterprise solution, ibm workplace client technology gives you built - in security features, such as a local encrypted data store that synchronizes with the server environment to support both connected and disconnected operations, and the ability to help ensure that all applications are provisioned and digitally signed by a trusted source
作為企業解決方案, ibm workplace client technology提供了內置安全性功能,如與服務器環境同步(以支持連線和離線操作)的本地加密數據存儲,以及幫助確保所有應用程序都進行了自動配置且由信任的源進行了數字簽名的能力。Many former systems like this is purely according to c / s mode, but this system is base on the combine of c / s and b / s, and the same time, the high speed network technique of today is used, therefore the function of this system is more perfect ; the constructions of each departments of this system about database are discussed ( include mold construction, the table construction of database etc. ), the key techniques of database ( stored process, trigger and the safety technique ), the safety design of database, the safety design of program etc., and the establishing of data warehouse of customer is introduced, and a technique about graph of customer data warehouse ( realized with powerbuilder ) ; the design of network construction is briefly discussed ; the choice of servers is introduced in detail ( include the database server and the the web server )
以往的此類系統大多單純基於c / s模式設計,而本系統是兩種模式的結合,充分利用當今高速發展的網路技術,所以功能更加完善和強大;數據庫技術方面詳細介紹了各分系統的功能模塊設計(包括模塊結構、數據庫表結構設計等) 、后臺數據庫的關鍵技術(存儲過程、觸發器和數據庫的安全技術) 、數據庫安全性設計(採用雙機容錯解決方案) 、程序安全性設計和權限配置等,同時介紹了客戶數據倉庫的建立方案和客戶數據倉庫的一種可視化技術(用pb和sybase的工具來實現) ;簡要介紹了系統的網路結構設計過程;詳細介紹了服務器的選擇和選擇結果(包括數據庫服務器和web服務器) 。Via the research of opc data access standard, this thesis brings forward a kind of designing method of client supervisory and control programs based on opc server on network, using the automation interface and api technology, realizes the configuration component of opc server on network and simple client programmer based on opc
通過對opc數據訪問規范的深入研究,提出了基於opc網路服務器的客戶端監控軟體的設計方法,採用自動化介面和api技術,實現了網路opc服務器配置組件和簡單的opc客戶應用程序。Another control mode is the local control mode, i. e. the pc in home receives the message from gateway and saves that into database, then the jsp web server on pc acquires the household appliance ' s message by accessing the database through jdbc - odbc bridge to response the request of browser on remote terminal
本地集中控制採用家庭pc機和網關相結合, pc上的應用程序提供統一的操作界面完成網關端數據信息的接收並將信息存到數據庫中。此外,家庭pc被配置成一臺jspweb服務器,該服務器通過jdbc - odbc橋訪問數據庫獲取設備的信息完成遠程控制終端瀏覽器的訪問請求的響應。A user of an active network can not only transfer data as in conventional networks, but also inject customized programs into the nodes of the network, then the programs are executed at each router they traverse, so new services can be deployed and applied quickly
利用主動網,用戶不但可以完成傳統網路的數據傳送功能,而且可以傳送程序代碼以供中間節點或遠程主機在本地執行,面向用戶實現服務定製和新應用的快速配置。In a managed environment, the jndi lookup name is used but the eis connection information is not used ; you would use the jndi lookup name to look up the j2c connection factory configured in the web application server
在非受管環境中,使用jndi查找名稱,而不使用eis連接信息;您將使用jndi查找名稱來查找在web應用程序服務器中配置的j2c連接工廠。You can configure the application batch server domains and process scheduler
您可以配置應用程序/批處理服務器域以及進程調度器。After you install the cluster service, add / remove windows components displays the configure cluster service program
在安裝完群集服務之後, 「添加/刪除windows組件」會顯示「配置群集服務」程序。Ohlson wrote a server as well, but the fellow writing the code for the hardware device we d be configuring chose the apache xml - rpc server
Ohlson也編寫了一個服務程序實現,但是為我們將配置的硬體設備編寫代碼的同事選擇了apache xml - rpc服務程序。To achive this, you need to configure the application servers clone1 and clone2 to use this service
為此,您需要配置應用程序服務器clone1和clone2去使用這一服務。To configure the application to use a specific smtp server
配置應用程序以使用特定smtp服務器The technologies and techniques employed to mitigate the threat might include prescriptions for using the configuration utilities for the software or servers, safe storage of connection information, and safe methods of retrieving connection information at run time
緩解該威脅所採用的技術和方法可能包括對軟體或服務器使用的配置實用程序、連接信息的安全存儲以及在運行時檢索連接信息的安全方法做出規定。Administrators can control the firewall by the client on windows hosts, not on firewalls. it can exempt firewalls of risks
而對應的服務器端配置管理程序位於需配置的防火墻上,避免管理員直接在防火墻上操作帶來的不安全性。Also included is a technology preview of an administrative console application to help you easily manage and configure the server components
此外,還包括管理控制臺應用程序的技術預覽,從而可以幫助您方便地管理和配置服務器組件。Setup concludes with the configure your server screen, which you can use to adjust the configuration for your specific needs
出現配置服務器屏幕表明安裝程序結束,可以使用此屏幕調整設置以便符合特定的需求。分享友人