safe strategy 中文意思是什麼

safe strategy 解釋
安全策略
  • safe : adj 1 安全的,安穩的;無危險的。2 確實的,一定的。3 安全,平安〈作 arrive come 等的述語用〉。4 謹...
  • strategy : n. 1. 戰略(學)。2. 策略,作戰方針 〈cf. tactics 〉。
  1. Based on the fact project that the development of the self - help bank " s fontal - machine system of beijing lianyintong company, this paper introduces the centralization and the network of the fontal machine ; designs the software systematical framework of fontal - machine system and functional model ; analysizes the fontal machine system " s safe strategy, the framework of encryption / decryption and its net framework

    本論文結合實際課題? ?北京聯銀通自助銀行前置機系統開發,介紹了大集中數據中心建設,前置機系統拓撲:設計了前置機系統的軟體體系結構,功能模塊:分析了前置機系統的安全策略,加解密體系結構及其網路架構。
  2. The experiences of this item could be generalized in following aspects : rational zone layout safe and free communication lines, diversified composite space, double functions in the landscape and green system, three - dimensional and dynamic junketing system, peculiar regional atmosphere and sustainable strategy for development

    總結了在武漢新區城市濱江空間設計的經驗體會,主要表現在一下幾個方面:合理的規劃布局、安全通暢的交通流線、豐實的建築空間特徵、雙重功能的綠化系統、立體的動態旅遊觀景系統、濃郁的地域文化氛圍、可持續的發展戰略。
  3. Database plays a vital role in nmis, therefore the quality of database effects directly on the success of nmis or not. the whole process of database " development is described in detail. meanwhile, we also deeply discuss the databases " performance optimization, backup and restore scheme, the strategy of safe control, data exchange in new and old central blood mis and so on

    數據庫是整個mis大廈的基石,其設計的好壞直接影響到mis設計的成敗,因此,如何設計一個性能優良的數據庫便顯得至關重要,本文詳細地描述了山西省采供血網路管理系統數據庫的設計以及對其進行規范化和非規范化處理的整個過程,此外,文章對數據庫的性能優化、備份與恢復方案、安全控制策略、中心血站新舊mis系統的數據交接等方面也進行了較為詳盡的分析和討論。
  4. In the author ' s opinion, being an unique passage linking china mainland with the southeast asia in addition to the south asia, which are playing more and more important role in today ' s world political and economy, the railroad passage is an important military strategy engineering, which is very crucial to the country " defense safe, rather than a common transport project

    本文認為,作為中國大陸唯一一條走向對當今世界政治、經濟起著至關重要作用的東南亞、南亞的陸上通道,該通道的意義已經不再是普通意義上的交通運輸項目,而是關繫到我國國防安全、軍事戰略的重要工程。
  5. In order to avoid shock of said resources to the combined power system. corresponding technical measures should be taken, and better for strategy for integral, operation, and control being worked out, to ensure safe and stable operation of the combined power system

    為避免其對聯合電力系統造成沖擊,需要採取相應的技術措施,制定較好的集成、運行和控制策略,以保證聯合電力系統的安全與穩定運行。
  6. An integrated fluorine supply strategy has been demonstrated to be the most effective means of implementing a safe and reliable fluorine supply to users seeking a low - cost replacement for standard chamber clean chemistries

    對一般氣相沉積反應器清洗而言,一體化氟氣供應策略,對尋求低價取代方案的使用者而言,是最安全和穩定的供應方式。
  7. In this paper, from the viewpoint of the design of a safe architecture, the security problem of openeai message system is studied, and ssl protocol and encryption strategy is studied in transmission layer and application layer

    從安全體系結構設計的觀點,本文還研究了openeai消息系統的安全問題,按傳輸層和應用層研究了ssl協議和密碼學的加密策略。
  8. Entering into coal trade embodies joinworld ' s high level of vertical integration, but this is an absolutely necessary action to soften coal resource price - rising, and is a safe action to solve problems influencing strategy performance. it will affect the healthiness of the whole strategy

    進入煤炭行業體現了眾和戰略的高度縱向一體化,但這是為了弱化煤炭資源漲價的不得已行為,是為了解決影響戰略實施的問題的挽救行為,它將影響到整體戰略的健康性。
  9. Firstly, strategy for safe operation management system is proposed on the basis of operation log. the range of mis in power system has been extended based on operation log of the control. an interface with monitoring and control system is develop, by which information in real - time databased can be read. the system and data structures are presented. and the function and relationships between modules are explained. then the design and implementations of some critical subsystems are discussed in detail

    本文首先闡述了安全運行管理系統的策略,提出了以運行日誌為主線管理調度日常的運行生產。擴展了信息管理系統的處理范圍,在運行管理系統中實現了與自動化監控系統的介面,可以訪問實時數據庫中的信息。本文分析了系統的體系結構和數據流程,說明了各個系統的功能和相互關系。
  10. The harem strategy, generally followed by plains and mountain zebra as well as by feral horses, often provides a relatively safe environment in which mothers and their foals can thrive

    草原斑馬、山斑馬和野馬組成的群體就是屬于上述的后宮系統,這通常可以提供雌馬和馬仔一個相對穩定、有利生存的環境。
  11. This text expatiates the foundation top of the safe concept in population in the synopsis, measure to the population safety the evaluation index sign system set up and its deal turns, writer according to total leading thought that sets up the basis and the establishment of the principle, measure the evaluation system construction frame establishes, can operate the choice of the index sign, use the tree form diagram come out the index sign system manifestation, proceed the logic way of thinking that deal turn one by one to the index sign value, set up a set of systems completely, chien is clear, science, viable population safety measures the evaluation index sign system and its deals turn the early - warning standard, aiming at for research with establish the " 11 " population the development the strategy and should talk about of follow - up thorough research the offering consults basis

    摘要本文在簡要闡述人口安全概念的基礎上,對人口安全測評指標體系的構建及其量化,筆者按照構建的總體指導思想與原則的確立、測評體系結構框架的設置、可操作指標的篩選並用樹狀圖把指標體系顯示出來和對入選指標逐一進行量化的邏輯思路,構建了一套系統全面、簡明、科學、可行的人口安全測評指標體系及其量化預警標準,旨在為研究和制定「十一五」人口發展戰略以及該論題的后續深入研究提供參考依據。
  12. As part of any recovery strategy, always keep a current script of your replication settings in a safe location

    作為任何恢復策略的一部分,請始終將當前復制設置的腳本保存在安全的位置。
  13. Given that so few classes actually include such documentation, the safe strategy when calling a method that doesn t document its call semantics or side - effect behavior is to create a defensive copy before passing it to any such method. ironically, the performance benefit of the decision to make

    因為很少有類真正包含這樣的文檔,所以在調用一個沒有用文檔說明其調用語義或副作用行為的方法時,安全的策略是在傳遞它到任何這樣的方法之前創建一份防禦副本。
  14. At present, there is still a great deal of problem in the application of the secure model of the distributed database. under common circumstance, the secure usually is self - contradict with vivid in the database, while customer wanting to get stronger and vivid capability, needing the sacrifice to the database secure in some extent, vice versa. based on distributed database system and secure characteristic, this text analyzed its database safe strategy and related secure model, the system appearance and operate rule, the system appearance and operate rule, studied the customer role management, safe strategy and the role authorition problem, specially emphatically studied the bell. lapadula model. ( including its basic concept, system appearance, related operation and the secure rule gather ). according to the actual application environment, this text carried bell. lapadula model to entity to turn, through a research discover that model adoption compulsory secure strategy, attain a vivid secure control not easily, so increase the secure strategy of the independent access control mechanism to carry on " flabby " to the original model, and relatedly increased rule, put forward a new kind of secure mechanism - ddm ( the distributed database discretionary mandatory ). turn the rule principle according to the ddm secure mechanism and entity, designed a secure controller of database - dds ( the distributed database secure distribute ) controller adopted ddm secure mechanism, and established the secure control mechanism of the dds secure controller

    拉帕丟拉模型進行實體化,通過研究發現該模型採用強制性安全策略,不易做到靈活的安全控制,因此添加自主存取控制機制的安全策略對原模型進行「鬆弛」 ,並相應的增加了規則,提出一種新的安全機制? ? ddm ( distributeddatabasediscretionaryandmandatory ,分散式數據庫自主與強制性)安全機制。基於實體化規則原理,設計了一個採用ddm安全機制的數據庫控制器? ? dds ( distributeddatabasesecure ,分散式數據庫安全)控制器,並設置了dds安全控制器的安全控制機制。通過dds安全控制器在實踐中的應用,本文分析了dds安全控制器的各項功能和安全特點,設計了實際應用中dds控制器的管理方案,實現了分散式數據庫安全控制。
  15. Design of safe strategy in area net in bureau with realizes

    淺談局域網安全策略的設計與實現
  16. The safe strategy of the untouched ic card

    卡的信息安全策略論述
  17. Analysis of the bank card safe strategy

    銀行卡安全策略淺析
  18. 3 ) the system security is discussed and a three - layer safe strategy is presented

    3 )探討了系統的安全性控制問題,提出了三層安全策略。
  19. The author was lucky to participate the e - government constuction in mianyang, the work is to analyse network security, the safe requirement analysis, safe target and the safe strategy establishment

    作者在綿陽市信息中心工作期間,有幸參與了綿陽電子政務系統建設工作,具體工作是參與承擔了該電子政務系統網路安全風險分析、安全需求分析、安全目標和安全策略制定。
  20. This solution is based on the practical requirement and technique practice of network reforming in icbc, and it is provided with practical importance to constructing network platform and putting the network safe strategy in the process of carrying forward the new generation integrated business system and data concentration engineering

    所設計的方案建立在工商銀行網路改造的現實要求和技術實踐的基礎之上,對推廣新一代綜合業務系統和實施數據大集中過程中的網路平臺建設和實施網路安全策略具有現實的指導意義。
分享友人