attribute security 中文意思是什麼

attribute security 解釋
特性安全性
  • attribute : vt. 1. 把(某事)歸因於…。2. 認為…系某人所為。n. 1. 屬性,特質。2. (人物、官職等的)標志,表徵。3. 【語法】屬性形容詞。
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. Jit compile - time code access security attribute

    Jit編譯時代碼訪問安全屬性。
  2. Specifies the base attribute class for code access security

    為代碼訪問安全性指定基屬性類。
  3. Specifies the base attribute class for declarative security from which

    派生自的聲明安全性指定基屬性類。
  4. This subject is a national fund project in science : an attribute theory and method for thinking construction and memory style ( 60075016 ), and a branch fund project in development of education, science and technology of shanghai ( 01g04 ) : intelligence modeling. it is also another one of shanghai zhenhua limited liability corporation : status detection and security estimation for derrick

    本課題是國家自然科學基金項目:思維建構與記憶模式的屬性論方法( 60075016 )和上海市高教科技發展基金項目:思維建構與智能模擬的屬性論方法( 01g04 )的子課題,同時也是上海振華有限公司的項目:橋吊狀態監測與安全評估系統。
  5. Your problem is to attribute public security problem, ought to solve by local police station. police station ought to be received alarm hind the circumstance processing according to law case

    您的問題是屬于治安問題,應當由當地派出所解決.派出所應當接警后根據案子的情況處理
  6. In some projects charged by our lab such as national 863 project - " crop planting management components based on weather analyse ", anhui provincial 95 key project - " agricultural meteorology disaster evaluation system base on gis in anhui province " and the project " small coal mine security management and decision system based on gis in anhui province ", this paper combines the theory and arithmetic of rough set with gis and data mining in idss, investiges the application of rough set theory to precision analysis of attribute data and logical operation in gis, analyzes the logical operation based on rough set ( logical union, logical intersection, logical complement, mixed logical operation etc. ), so that it can give a method y to research the gis attribute data and the uncertainty of attribute data after superposition operator, so as to express the roughness and illegibility of attribute data more accurately

    在完成試驗室所承擔的國家863項目「基於氣象分析的農作物種植管理軟構件」 、省95攻關項目「基於gis的安徽省重大農業氣象災害測評系統」和「基於gis的安徽省小煤礦安全管理決策系統」等項目中,將粗糙集理論和演算法與gis 、智能決策系統中的知識發現等相結合,對粗糙集理論在gis屬性數據和邏輯運算精度分析中的應用情況進行了研究,分析了基於粗集的gis邏輯運算(邏輯並、邏輯交、邏輯補、混合邏輯等) ,從而為研究gis屬性數據及其疊加運算后屬性數據的不確定性提供了一種方法,能比較準確地表達屬性數據的模糊性和粗糙性。
  7. We use control chart to characterize states of security environment and data mining to construct intrusion detection strategies. the latter includes pattern mining, pattern consolidation arid pattern comparing. in succession to it, we construct attribute set and training set for classification of net data

    其次討論了自適應空間的構成,使用控制圖來構建條件空間,用數據挖掘技術來構建策略空間,重點討論了怎樣把數據挖掘技術應用到策略空間的構造中,包括模式的挖掘、合併、比較以及在此基礎上構建分類器所需要的屬性集與學習集。
  8. A policy server creates security policy for every client in the system, and distributes it using a new kind of x. 509 attribute certificates with policy rule set item in it

    設計由策略服務器集中制定這些用戶安全策略,並傳輸攜帶策略規則集合的x . 509v4的屬性證書完成策略的安全分發。
  9. The purpose of this attribute is to enforce host - specific programming model guidelines, not security behavior

    此屬性的目的在於強制實施特定宿主的編程模型準則,而非安全行為。
  10. Therefore if you enable security trimming, the site - map node will not be visible unless you set the roles attribute to ", which enables all clients to view the site - map node without first testing access to the url

    因此,如果您啟用了安全控制,除非將角色屬性設置為「 * 」 ,否則將不會看到站點地圖,設置該屬性可使所有客戶端無需首先測試對url的訪問就能查看站點地圖節點。
  11. Therefore, if you enable security trimming, the site - map node will not be visible unless you set the roles attribute to an asterisk, which enables all clients to view the site - map node without first testing access to the url

    因此,如果啟用安全性調整,站點地圖節點將不可見。但有一種情況除外,當您將角色屬性設置為星號( * )時,可使所有訪問者均能查看站點地圖節點,而asp . net不會先測試對url的訪問。
  12. Security attribute classes must implement the

    安全屬性類必須實現
  13. A security action associated with a custom security attribute

    與自定義安全屬性相關的安全操作。
  14. Associates a security action with a custom security attribute

    將某安全操作與自定義安全屬性相關聯。
  15. Is a code - access security attribute

    是代碼訪問安全屬性。
  16. This is not a declarative security attribute, but a regular attribute it derives from

    這不是聲明性安全屬性,而是常規屬性(它派生自
  17. Firstly, the interrelated knowledge about network security vulnerability is introduced in this thesis, include definition, cause of formation, character and attribute, sort and detecting method. different kinds of skills and characteristics of port - scan technique are analyzed and compared in this thesis. then, the virtues and defects of three kinds of fingerprint technique of os - detect are also analyzed and compared

    本論文首先介紹了網路安全漏洞的相關知識,包括漏洞的定義、成因、特徵和屬性、分類及檢測方法,對各種埠掃描技術及其特點進行了分析和比較,介紹了三種探測操作系統的指紋技術,並分析了它們的優缺點。
  18. Rfsos was the first secure operating system that used the secure operating system architecture of generalized framework for access control in mainland china. in rfsos, security attribute database, secision enforcement module and security decision module are separate from each other. this architecture flexibly supports multiple access control mechanisms

    紅旗安全操作系統在國內首次採用基於通用訪問控制框架的安全操作系統體系結構,將安全屬性數據、安全決策和決策實施三者分離,可以靈活地支持多種訪問控制機制。
  19. This attribute can be applied to methods that want to call into native code without incurring the performance loss of a run - time security check when doing so

    此屬性可應用於要調入本機代碼的方法,這樣做時不會招致運行時安全檢查的性能損失。
  20. During the process, the labor legislation gradually improves, the ideas of the labor law continue updating, and the labor law has changed from a private law to a law composed of private attribute and public attribute. the labor law becomes possessing the attributes of the social security law and a part of it. the thesis is divided into three parts in order to probe the proposition that the labor law is a part of the social security

    從古今中外各國勞動法立法的完善、勞動法屬性的演進和勞動法理念的更新過程中,可以發現:勞動法的立法宗旨最終定位為尋求個人利益和社會利益的協調發展;勞動法律關系的主體、客體和內容兼具「公」 、 「私」屬性;勞動合同體現出國家意志和當事人意思自治的完美結合;勞動爭議解決的手段也是「公」 、 「私」並用;勞動保障監察更是以保護勞動者利益為目標。
分享友人