configuration identification 中文意思是什麼

configuration identification 解釋
配置標識
  • configuration : n. 1. 結構;構造;圓形,外形。2. 組合,布置;配置。3. 地形;【天文學】(行星等的)相對位置,方位;【化學】(分子中原子的)組態,排列;【物理學】位形;組態。
  • identification : n. 1. 認出,識別,鑒定,驗明(罪人正身等)。2. 【心理學】自居作用。3. 身分證。4. 【數學】黏合,同化。
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. The editing system interface of media asset management system integrates the user authority identification, the module of downloading and uploading, the selection of programs and advertisements, the configuration of transferring data information, the display of downloading stuff information, the restriction of system requirement, audio formats ’ selectivity conversion and other functions

    媒體資產管理系統的編輯系統介面里,集成了用戶權限識別、導入導出模塊、節目廣告分選、上傳素材信息設置、下載素材信息顯示、系統要求限定、音頻格式可選擇性轉換等功能。
  3. The configuration space contains vendor and product identification information

    配置空間包含供貨商和產品辨認信息。
  4. Fitting currently district traffic control need digitizing, latticing, intelligentized, base on ic card and license plate identification technique, design develop latticing district vehicle pass in and out management system, specific analysis the system of basic function, performance index, software and hardware configuration, emphasize design database management system, last give the implement outline

    摘要為適應當前小區交通管理數字化、網路化、智能化的要求,基於ic卡與車牌識別技術,設計開發了網路化小區車輛進出管理系統,具體分析系統的基本功能、性能指標和軟、硬體配置,著重設計了數據庫管理系統,最後給出實施綱要。
  5. Aforementioned approaches is presented for the estimation of the parameters of a complex structural system - the foundation - silo interaction system. the identification endeavour with the method of substructural parameters identification technique is accomplished by dividing system into upside configuration and foundation substructure

    把以上建立的解決復雜結構參數識別的方法應用到貯倉一地基相互作用系統的參數識別中,把上部結構和地基作為兩個子結構,運用動態子結構參數識別方法分別進行了參數識別。
  6. Binding digital license to a unique identification of hardware configuration of the rendering device is the most popular strategy adopted in current digital rights management

    將數字許可證與機器硬體配置標識信息綁定是數字版權保護技術普遍採用的方法。
  7. A planar sidm with j loops ( expressed in term of smj ) can be regarded as comprising of a sidm with j - loops ( expressed in term of smj - 1 ) and a dyad ( expressed in term of dyadj ). then, the circuit condition of sm, is determined by the circuit condition of smj - 1 and the configuration of dyadj. based on the above thought and combined with the automatic generation of structural decomposing of planar mechanism according to the type transformation theory, circuit automatic identification of planar sidm are realized, two examples are given to demonstrate the use of this method

    具有j個環路的sidm可看作由j - 1個環路sidm與一個雙桿組(記作dyad _ j )組成,則sm _ j的迴路情況由sm _ ( j - 1 )的迴路情況、 dyad _ j的構形以及dyad _ j與sm _ ( j - 1 )運動的相互作用決定,基於此思想,在全面分析了所有類型雙桿組的構形及裝配條件的基礎上,與型轉化法機構結構分解路線的自動生成相結合,實現了平面sidm迴路識別的系統化與自動化;最後給出了兩個分析實例。
  8. Via this model, automatic identification of circuit and circuit defect of s - sbc are realized. the procedures to check for the existence of a crank in all types of s - sbm are found. the method of stationary configuration loop to solve the order of motion of s - sbm is presented

    基於此模型,實現了s - sbc迴路及迴路缺陷的自動識別,給出並證明了所有類型的s - sbm的曲柄存在條件及判斷方法;提出了解決s - sbm運動順序問題的靜止位形點環路法。
  9. Note in some industry sectors, configuration management is a means by which identification andtraceability are maintained

    備注在某些產業中,型態管理為達到識別與追溯的一種方式。
  10. Practice for hvac duct shapes ; identification and description of design configuration

    採暖通風與空調導管形狀慣例.設計技術狀態標識和描述
  11. Standard practice for hvac duct shapes ; identification and description of design configuration

    採暖通風與空調導管形狀.設計配置的描述和識別
  12. Bst ant g2xx serial access product is specially designed for the in out access which is not convenient to place object bst ant g0xx serial or bst ant g1xx serial, it can be embeded into wooden plastic glass material wall, and looks beautiful and hidden. it is suitable for goods and personel identification applications. bst - ant - g2xx series access product is one long range device which is compatible with the iso15693, and can choose strong or weak configuration

    Bst - ant - g2xx系列通道產品是倍思得公司專門為不方便在現場擺放物品的一些出入口通道而設計的,它可以嵌入到木塑料玻璃等材料製成的板狀物或一些墻體裏面,安裝非常隱蔽,適合物品自動知識及防盜人員識別等應用。
  13. Note in some industry sectors, configuration management is a means by which identification and traceability are maintained

    注:在某些行業,技術狀態管理是保持標識和可追溯性的一種方法。
  14. In respect to financial cipher database system configuration design, we adopt encryption mode in dbms rind, and accomplish identification and data encryption etc. through adding encryption management program in client, and security deputy program between application and dbms

    對于財政密文數據庫系統的結構設計,本文採取在dbms外層加密的方式,通過在客戶端增加加密管理程序,在應用程序與dbms之間加入安全代理程序,實現了身份認證和數據的加解密等功能。
分享友人