code security 中文意思是什麼

code security 解釋
安全性檢測
  • code : n 1 法典;法規。2 規則,準則;(社會、階級等的)慣例,習俗,制度。3 (電)碼,代碼,密碼,暗碼;...
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. Its cipher code is basically the golden standard of internet security, and it doesn ' t sell subscriber lists

    (它的密碼在網路安全上可稱得上是金牌標準,而且它不出售用戶名單。 )
  2. T : its cipher code is basically the golden standard of internet security, and it doesn ' t sell subscriber lists

    (它的密碼在網路安全上可稱得上是金牌標準,而且它不出售用戶名單。 )
  3. In data security, a method of sending secret messages. each word or phrase is substituted by a corresponding group of symbols derived from a secret code book

    在數據安全學中,傳送保密信息的一種方法,一個字或一個短語由密碼本中得出的對應的字元群代替。
  4. For security purposes this new monster was assigned the code name mouse.

    為了迷惑間諜,給這一新的龐然大物起一個代號為「鼠」。
  5. The management information code of public security accouterments - part 9 : code of constabulary rank

    公安被裝管理信息代碼.第9部分:警銜代碼
  6. The first kind of algorithm is based on s - box controlled by key, the algorithm distinguishes most of other block ciphers, its visible quality is that its s - box is not regular and fixative, but controlled by block cipher ' s key. the second kind of algorithm is based on smn ( d ) array code, it makes full use of the visible quality of smn ( d ) array code possessing big code distance ( d ). the thesis discusses the two algorithms " reversibility, security and their qualities, the

    第一種是基於「 s -盒由密鑰控制」的變結構分組密碼,該演算法區別于其它大部分分組密碼最大的特點是它的s -盒不是固定不變的而是由密鑰控制產生;第二種是基於smn ( d )陣列編碼的變結構分組密碼,該演算法充分利用了smn ( d )陣列編碼具有碼距大的特點;文中對這兩個演算法的可逆性、安全性及其性能等進行了探討和分析,分析結果認為這兩個變結構演算法正確、有效且安全。
  7. With regard to the lack of corresponding entity right backing for " execute the third party " according to the procedure law in current chinese creditor ' s subrogation system ; the inconsistence between the ent ity law and the procedure law for the conditions to exercise creditor ' s subrogation ; the obscure effect of the exercising of the creditor ' s subrogation ; the indefiniteness of right and status of the parties in the subrogation proceeding and so on, it is suggested that amend the civil code, confine the creditor ' s subrogation system, coordinate the rules in entity law and procedure law related to the debtees " to exercise their subrogation, define the creditor ' s subrogation, the right and obligation of related parties in the procedure, perfect the rules in procedure law in order to provide proceeding procedure security for the realization of the creditor ' s subrogation

    並針對我國現行債權人代位權制度在程序法中「執行第三人」缺乏相應實體權利依據、實體法與程序法有關債權人代位權行使條件規定不一致、債權人行使代位權效力不清、當事人在代位權訴訟中的地位和權利不明確等諸多缺欠,提出了制定民法典確定債權人代位權制度、協調實體法和程序法中關于債權人行使代位權的規定、明確債權人代位權訴訟相關當事人的權利義務、完善程序法規定為債權人代位權實現提供訴訟程序保障的意見。
  8. Indicted for high security code infiltration,

    因竊取絕密安全代碼和別人的id
  9. Indicted for high - security code infiltration

    因竊取絕密安全代碼而被指控
  10. Jit compile - time code access security attribute

    Jit編譯時代碼訪問安全屬性。
  11. The second part estimated this system from two angles, i. e. the function of the security protection of general dealing and the function of perspicuity of code structure system, meanwhile, reviewed the methodology of high abstract and technology of the system. the third part compared the non - reason of real right action theory with goodwill obtaining and the system of improper benefiting in civil law. it compared leitmotif, scope of application and functional mechanism between the non - reason of real right action theory and the system of improper benefiting

    指出物權行為無因性與善意取得制度是兩種獨立的制度,並從兩者的主旨、適用范圍、與作用機理方面進行比較,指出兩種理論保護交易安全的主旨相同,物權行為無因性理論在適用范圍上較善意取得制度更廣泛些,善意取得制度的適用范圍較物權物因性理論則更具有彈性。
  12. The solutions automatically analyze the source code to ensure that the security polices have been followed

    我們的解決方案自動地分析源代碼,以確保安全策略受到了遵循。
  13. This article elaborated the code technology in the correspondence application, discussed in the discrete signal code process function, as well as code technology security use and error correction function

    摘要本文論述了編碼技術在通信中的應用,討論了離散信號的編碼過程中的作用,以及編碼技術的保密用途和糾錯功能。
  14. Cannot run, although you can set security policy to allow the execution of trusted but unverifiable code

    則不能運行,盡管可以設置安全策略以使受信任但無法驗證的代碼得以執行。
  15. Specifies the base attribute class for code access security

    為代碼訪問安全性指定基屬性類。
  16. Guarantee integrity, you can base code access security policy on these two forms of assembly evidence. strong naming and signing using the

    進行簽名確保了完整性,因此您可以將代碼訪問安全策略建立在這兩種形式的程序集證據的基礎上。
  17. Future versions of the. net compact framework will offer a subset of the policy - driven, evidence - based code access security of the full. net framework

    在. net compact framework的未來版本中,將提供策略驅動的、基於證據的代碼訪問安全模型的子集,該模型已在
  18. For details about code access security, see

    有關代碼訪問安全性的詳細信息,請參見
  19. Contains a table of code security permissions

    包含代碼安全權限表。
  20. We ll explain why mobile code security is important and what to expect in future systems

    我們將解釋為什麼行動程式安全性十分重要以及未來的系統中會有些什麼。
分享友人