集成安全性 的英文怎麼說

中文拼音 [chéngānquánxìng]
集成安全性 英文
integrated security
  • : gatherassemblecollect
  • : Ⅰ動詞1 (完成; 成功) accomplish; succeed 2 (成為; 變為) become; turn into 3 (成全) help comp...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 集成 : integration集成晶體管 integrated transistor; 集成元件 integrated component
  1. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息平臺中電子文檔存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬對象來存儲,以數據庫方式對企業電子文檔進行的、統一的管理,提出一種訪問控制的增強型設計原則,基於此原則建立了管理授權和推薦式授權的訪問機制,用以提高系統的訪問,並大大減少授權管理維護量;研究了特殊屬對象的數據庫存儲機理,從而構造一種快速存儲、訪問和檢索電子文檔的方法,使得企業信息平臺的電子文檔獲得、可靠、快速的訪問。
  2. In order to integrate safety analysis techniques and to provide theory for the development of safety cad, the procedure of safety design and analysis fit all life cycle stages of military equipment is put forward

    論文明確提出了適合型號研製各階段的設計分析工作流程,解決了各工作項目期間分析技術的綜合運用問題,為cad軟體的研製提供了技術基礎。
  3. For the background of our ten - five main scientific project, based upon the structure and compositions of expert system and their field characteristics and software development mode, the ideas and methods of expert system of concrete sulfate resistance project are discussed in this article, and a prototype of system integration is given

    本文結合國家「十五「重點攻關項目(混凝土專家系統)中的子系統?抗硫酸鹽侵蝕專家系統,根據專家系統的組結構和領域特點,結合知識結構的一種新的組織和表示模式,研究了專家系統開發的實現技術,並對其進行了最後的
  4. For example to connect to an instance,

    例如,若要使用集成安全性連接到sql server
  5. This paper gives the general design of the administration system in the broadband man. it also explains the detail implementation, such as the modules of the traffic accounting and radius ( remote authentication dial in user service ) programs, the control of the layer 2 switch ports, the distribution of ip address, and so on. during the building of the system, we greatly unproved the efficiency of snmp ( simple networks manage protocol ) trap and achieved the access control hi the broadband man

    對以太網方式接入的用戶,利用802 . 1q 、 pvlan (私有虛擬局域網)等新技術實現了用戶數據隔離和保證,並對用戶埠資源進行了統一管理和遠程自動控制,採用snmp (簡單網路管理協議)採埠流量的方式實現了以太網用戶的按流量計費,詳細設計了具體的流量採程序模塊組和各部分的功能。
  6. Microsoft sql server 2005 reporting services is a server - based solution for building enterprise reports that draw content from a variety of relational and multidimensional data sources, publishing reports that can be viewed in various formats, and centrally managing security and subscriptions

    Microsoft sql server 2005 reporting services是一種基於服務器的解決方案,用於生從多種關系數據源和多維數據源提取內容的企業報表,發布能以各種格式查看的報表,以及中管理和訂閱。
  7. This system makes people fell convenient in looking for data, try my best to our environment protection. the following problems and related solutions are given in this paper : data structure suitable for web computing multi - user access and concurrent control mechanism in webgis network protocol and intelligent information agent of spatial information spatial information security in web computing environment web integration strategy of spatial information based on metadata architecture of webgis at last, the development trend of webgis is discussed

    通過論文工作提出了以下幾個問題並給出了相應的解決方案適合web計算的數據模型webgis中的多用戶訪問與並發控制機制空間信息的網路計算策略與實施方案及關鍵演算法空間信息的網路傳輸協議與智能空間信息代理web計算環境下的空間信息問題基於metadata的空間信息web方案與智能空間搜索引擎webgis體系結構最後,論文對webgis發展趨勢進行了探討。
  8. The report points out that the increase of integrated security equipment market is mainly because the clients especially the small and mid - sized enterprises need the convenient and easy software for various defense software. in addition, owing to their strong management ability and some extra functions, these equipments attract lots of isp and mssrs

    報告指出,設備市場之所以會出現增長,主要是因為面對各種防護軟體,客戶們需要復雜程度低,使用方便的套件,對於一些中小型公司更是如此。
  9. Connecting to sql server using integrated security

    使用集成安全性連接sql server
  10. Clr integration security and application domains

    Clr集成安全性和應用程序域
  11. To configure sql server for integrated security

    集成安全性配置sql server
  12. Pool fragmentation due to integrated security

    因為集成安全性產生的池碎片
  13. Using service accounts and integrated security

    使用服務帳戶和集成安全性
  14. Integrated security and elevated permissions

    >集成安全性和提升權限
  15. To use windows integrated security in a connection string

    在連接字元串中使用windows集成安全性
  16. Clr integration security and impersonation

    Clr集成安全性和模擬
  17. Integrated security for sql authorization

    Sql授權的集成安全性
  18. Explains security threats and mitigation strategies when using integrated security

    介紹使用集成安全性時的威脅和應對策略。
  19. Objects. the topic also discusses how to obtain schema information from a database

    在使用集成安全性時, asp . net開發人員必須考慮asp . net進程模型設置的配置問題。
  20. The use of integrated security to access external data sources poses a special concern for report users who may not know that their security token is being passed to an external data source users are not warned in advance of running a report that the report is configured to use integrated security

    對于那些可能不知道其令牌將傳遞到外部數據源的用戶,使用集成安全性訪問外部數據源會為其帶來一個特殊問題(在運行報表之前不會事先通知用戶報表配置為使用集成安全性) 。
分享友人