computer system security 中文意思是什麼

computer system security 解釋
計算機系統安全性 計算機軟體和硬體對偶然的或故意的訪問、使用、修改或破壞的一種保護機制。

  • computer : n. 1. 計算者。2. (電子)計算機;計量器。-ism 電子計算機主義〈認為電子計算機萬能等〉。-erite, -nik 計算機專家;計算機工作者。
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. Koal software, which is approved by the state secrets bureau, is one of the first qualification corporations on computer information system integration related to national secrets. koal software, a pilot unit of computer network security services authentication by the computer network and information security administrtion office, has an experienced team for information system integrated security construction and services management and implementation. to users, it is a reliable long - time system security provider

    格爾軟體是國家保密局批準的首批「涉及國家秘密的計算機信息系統集成」資質單位,是國信安辦認定的首批計算機網路安全服務試點單位,擁有一支經驗豐富的信息系統整體安全建設與安全服務的項目管理與實施隊伍,是用戶信息系統能夠得到長久安全保障的可信賴的信息安全服務商。
  2. Registration a process by which an owner of stock or security has the ownership officially recorded in a book or on a computer system

    登記股票或有價證券持有者將其持有的對股票或有價證券的所有權正式記錄在冊或記錄在電腦系統中的做法。
  3. The energy management system ( ems ) is a computer system comprising a software platform providing basic support services and a set of applications providing the functionality needed for the effective operation of electrical generation and transmission facilities so as to assure adequate security of energy supply. unfortunately, the traditional ems does not meet the need of power market. it is difficult to develop the new application software on ems

    能量管理系統( energymanagementsystem , ems )是一套為電力系統控制中心提供數據採集、監視、控制和優化,以及為電力市場提供交易計劃安全分析服務的計算機軟硬體系統的總稱,它包括為上層電力應用提供服務的支撐軟體平臺和為發電和輸電設備安全監視和控制、經濟運行提供支持的電力應用軟體,其目的是用最小成本保證電網的供電安全性。
  4. My net assistant can optimize settiongs automatically, if you are an advanced user, you can optimize settings manually ; backup and restore with the optimization, the ones that can make users relaxed will resume the state before optimized, in order to ensure the system security. 2. maxmtu automatically discovery : specifies whether microsoft tcp ip will attempt to discover the largest packet size the mtu over the path to a remote computer

    1 .領先的網路優化項目,全面提升網路性能:軟體開發組通過對windows操作系統環境9x me nt 2000 xp 2003下的500臺電腦的實際評測分析,自主分析評測出絕對領先的多達29項的網路優化項目,通過智能化的自動優化向導,將網路系統參數設置得更合理,讓用戶的網路性能發揮到最高點為方便高級用戶,軟體內置了詳細的自定義手工優化系統,可以更精確的設置各個項目最安全最先進的系統同步備份與還原功能,可以讓用戶輕松的將系統恢復到優化以前的狀態,以保障系統的優化安全。
  5. In computer security, a procedure established for positively identifying a terminal dialing into a computer system by disconnecting the calling terminal and reestablishing the connection by the computer system ' s dialing the telephone number of the calling terminal

    在計算機安全學中,為了確認一個終端叫通了計算機系統,而先切斷該呼叫終端與計算機系統的連接,再由計算機系統呼叫該終端的電話號碼來重建連接的過程。
  6. The influence of offset in the security of computer system

    偏移量對計算機系統安全的影響
  7. Another computer system for tracking the performance of contractors was extended from the original scope of public cleansing services to other outsourced contracts, including market and hawker bazaar cleansing, building cleansing, security guard services, pest control, cemeteries and crematoria services, and transport

    此外,用以監察承辦商表現的電腦系統亦經過改良,監察范圍已由原來的公眾潔凈服務,擴展至街市及小販市場潔凈樓宇潔凈保安防治蟲鼠墳場及火葬場服務,以及運輸等其他外判合約服務。
  8. The drawback of the password is that it is easily given away. therefore there are great security threats in the access to information and resource in computer, hi an effort to confront the threats biometrics ( such as fingerprints, keystroke dynamics, and so on ) combined with the traditional verification methods may greatly increase the system security

    傳統的計算機系統登錄方式為單一的口令認證,其弊端是口令易被泄露,帶來安全隱患,而採用人的生物特徵(如指紋和擊鍵模式等)結合傳統認證方式可增強系統的安全性。
  9. Analysys of the factors affecting the computer network system security and countermeasures

    影響計算機網路系統安全的因素分析及對策
  10. Considering this was a project to restructure a complex owned by one of the leading firms in designing and managing computer systems for banks and developing security systems for web trading, it was vitally important to optimise the spatial layout, so that the systems and passage ways for the cables serving the computer system

    我們的客戶是最大的專門服務于銀行和進行各種網上金融服務的公司之一。所以,最大限度地合理利用空間資源,為我們的客戶創造一個舒適而高效的空間是極其重要的。
  11. After intruducing the security demand from the computer area, this paper present the designing aim of the real time audit analysis system ( raas ), considering the trusted computer system evaluation criteria ( tcsec ) of us dod and common criteria for it security evaluation ( cc )

    本文首先介紹了計算機領域的安全需求,根據美國國防部的可信計算機評測標準( tcsec )和計算機信息系統的通用安全評價準則( commoncriteriaforitsecurityevaluation , cc )中提出的安全操作系統的審計標準,提出本系統的設計目的。
  12. Elliptic curve cryptosystems on reconfigurable hardware information security technology is a compositive subject, which includes information theory, computer science, cryptography and other aspects fields. it aims to research the protection method of information, which are transferring in the computer system and communication network. also it is responsible to the security, secrecy, verity and integrity of the information

    信息安全技術是一門綜合的學科,它涉及信息論、計算機科學和密碼學等多方面知識,它的主要任務是研究計算機系統和通信網路內信息的保護方法以實現系統內信息的安全、保密、真實和完整。
  13. To high - tech companies as a starting point, with technology as the core and the powerful technological support for the team, committed to the government, enterprises, individuals, and network providers to provide high - tech network applications solutions, network engineering installation, training and technical services, technical advice, information consulting, computer network security system maintenance, marketing ; computer software and hardware and peripherals, cultural office supplies, internet information services, internet station design, installation, commissioning services, website promotion and e - commerce ; design and production network advertising, graphic design and image planning for the integration and operation of a professional combat capabilities companies

    公司以高科技為起點、以技術為核心、以強大的技術隊伍為支撐,致力於為政府、企業,個人,和網路提供商提供高技術含量的網路應用解決方案,網路工程安裝、技術培訓與服務、技術咨詢、信息咨詢、計算機網路系統安全維修、銷售;計算機軟硬體及外圍設備、文化辦公用品、網際網路信息服務、網際網路站的設計、安裝、調試服務、網站推廣及電子商務;設計和製作網路廣告、形象策劃與平面設計等為一體的,具有專業實戰運營能力的公司。
  14. With the scale of computer information system ( cis ) expanding and the security technology developing, a systematic and normalized computer information system security architecture ( cissa ) is needed to strengthen the design, development, implementation, evaluation and management of cissa. in order to normalize the build of cissa, and construct the security defense architecture in our country, a uniform cissa model and the implementary standard must be built

    隨著計算機信息系統規模的不斷擴大和信息安全技術的不斷發展,為了加強計算機信息系統安全體系的設計、開發、使用、評估和管理,需要對計算機信息系統安全體系進行系統化的認識和規范化的建設,因此必須建立統一的計算機信息系統安全體系模型和實施標準,規范計算機信息系統的安全體系建設,構築我國計算機信息系統安全防範體系。
  15. Along with the rapid development of computer technology and internet, computer system has been shifted from independent mode of computer to an open internet. the problems of network and information security are emerging increasingly. different kinds of attacking incidents on the internet keep on happening

    隨著計算機技術和internet的飛速發展,計算機系統已經由獨立的單機模式轉向開放、互聯的網路環境,網路安全和信息安全問題日益突出,網路上各種攻擊事件不斷發生,相應地各種安全措施也越來越多。
  16. The main research fields are parallel processing systems, computer parallel and distributed processing systems, computer security architectures, computer system design, embedded computer system, computer network and intelligent processing

    主要研究方向:并行處理系統、計算機并行與分散式處理系統、計算機安全體系結構、計算機系統設計、嵌入式計算機系統、計算機網路與智能處理。
  17. Firstly, the thesis analyzes the goal of computer network security and the security threat of network faced, and then introduces several traditional security techniques such as data encryption techniques and firework techniques. it analyzes the problems of these traditional security techniques and brings forward combine intrusion detection system ( ids ) and the traditional network security techniques to create multi - layers recovery system. it indicates the status in security domain and its significance of ids

    本論文在分析了計算機網路安全的目標以及網路所面臨的安全威脅基礎上,討論了幾種傳統的計算機網路安全技術,如數據加密技術、防火墻技術等,並分析了傳統網路安全技術存在的不足,在此基礎上提出了以入侵檢測技術與傳統的計算機網路安全技術相結合的多層次防禦體系,指出了入侵檢測系統在整個安全領域中的地位以及研究ids的重要意義。
  18. With the scale of the campus network being increasingly expanded, the problem of network security appears to be more and more serious. traditionally, the firewall is the primal line of defence, but it is a passive defense technology. the intrusion detection system ( ids ) is an important part of the computer network security, and it realizes real - time intrusion detection, therefore actively avoiding being attacked

    入侵檢測系統( ids )是計算機網路安全的一個重要組成部分,它實現實時入侵檢測的功能,主動保護自己免受網路攻擊,是防火墻的合理補充,擴展了系統管理員的安全管理能力(包括安全審計、監視、攻擊識別和響應) ,提高了信息安全基礎結構的完整性。
  19. Hg2000a intelligent security monitoring and data collection system is a network computer system in residential areas, capable of remote reading of various electronic meters, remote monitoring of site statuses, and remote control of site equipment

    該系統是一個應用於住宅群的能夠完成遠程抄錄多種電子計量表,遠程監測現場各種狀態、遠程控制現場設備的計算機網路系統。
  20. Operating system security based policies for computer virus prevention

    基於操作系統安全的計算機病毒防禦策略
分享友人