security classification 中文意思是什麼

security classification 解釋
安全保密級別, 密級
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • classification : n 1 選別;分等,分級;分選。2 【動、植】分類(法)。 〈分類級別為: phylum 【動物;動物學】及 div...
  1. Third, based on the guarantee code and citing the related articles from the corporation code, the receipt code, the insurance code and the copyright code, the author discusses the range and classification of the pledge rights over rights. also in this part, the author gives some new ideas about the set and realization of the pledge rights over security creditor ' s rights, the characteristics of the pledge rights over genral creditor ' s rights, the set and effect of the pledge rights over stock, the punitive restrictions in the pledge rights over knowledge and the characters of the pledge rights over immovables ' profit

    第三,以我國《擔保法》為主,結合《公司法》 、 《票據法》 、 《著作權法》等法律的相關規定,對權利質權的法定范圍和種類進行了論述。在分析了權利質權和動產質權的異同點后,闡述了權利質權的特點和種類。在證券質權的設定既實現、一般債權質權出質人的權利特點、股份質權的設定及效力、知識產權質權的處分限制、不動產收益質權的性質等方面提出了很多獨到的見解。
  2. Article 14 the administration and use of confidential archives, changes in their security classification, and the declassification of such archives must be effected according to the provisions of the laws and administrative rules and regulations of the state regarding secrecy

    第十四條保密檔案的管理和利用,密級的變更和解密,必須按照國家有關保密的法律和行政法規的規定辦理。
  3. Network forensics is an important extension to present security infrastructure, and is becoming the research focus of forensic investigators and network security researchers. however many challenges still exist in conducting network forensics : the sheer amount of data generated by the network ; the comprehensibility of evidences extracted from collected data ; the efficiency of evidence analysis methods, etc. against above challenges, by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic, the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence. at the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. experimental results show that the system can classify most kinds of events ( 91. 16 ? correct classification rate on average ), provide analyzed and comprehensible information for a forensic expert and automate or semi - automate the process of forensic analysis

    網路取證是對現有網路安全體系的必要擴展,已日益成為研究的重點.但目前在進行網路取證時仍存在很多挑戰:如網路產生的海量數據;從已收集數據中提取的證據的可理解性;證據分析方法的有效性等.針對上述問題,利用模糊決策樹技術強大的學習能力及其分析結果的易理解性,開發了一種基於模糊決策樹的網路取證分析系統,以協助網路取證人員在網路環境下對計算機犯罪事件進行取證分析.給出了該方法的實驗結果以及與現有方法的對照分析結果.實驗結果表明,該系統可以對大多數網路事件進行識別(平均正確分類率為91 . 16 ? ) ,能為網路取證人員提供可理解的信息,協助取證人員進行快速高效的證據分析
  4. Representation, classification and global reference name standard of the common security knowledge, are summarized. then a new model of system security trend analysis is presented, which combines vulnerability analysis ( using privilege graph analysis method ) and attack knowledge analysis ( using goal tree analysis method )

    本論文首次從信息對抗的角度分析了公共知識獲取和安全趨勢分析的意義,系統總結了公共知識分類、標準與知識描述等方面問題,給出動態防禦系統中公共知識獲取的方法,提出了權限圖與攻擊樹相結合的目標系統安全趨勢分析方法。
  5. The content of this course are as followings : the concept of the commercial law, features of commercial law, basic principles of commercial, the players in commercial field, behaviors, registration system, trade name, accounting books, the overview of corporate law and corporation, the classification of corporation, the establishement of company, the capital system under compnay law, share and assets, shareholders and their rights, corporate governance, merger and acquisation, overview of bankruptcy law, ? substantive bankruptcy law, procedure ? bankruptcy law, overview of commercial paper law, the classification and the basic rules of commercial paper, overview security law, ? issue and sponsor system, listing and trade system, investment fund system, overview of issurance law, issurance contract, property issurance, life issurance, issurance industry, maritime law, vessel and stewages, transportation contract, leasing vessel contract, incidents and the liability system etc

    課程內容包括,商法的概念、特徵、基本原則、商主體、商行為、商事登記、商號、商事帳簿、公司與公司法概述、公司的分類、公司的設立、公司的資本制度、股份與股票、股東與股權、公司的治理結構、公司的合併與解散、破產法概述、破產程序法、破產實體法、票據法概述、匯票、本票、支票、證券法的基本問題、證券市場主體法律制度、證券發行與承銷法律制度、證券上市及交易法律制度、證券投資基金制度、保險法概述、保險合同、財產保險、人身保險、保險業、海商法概述、船舶和船員、海上運輸合同、船舶租用合同和海上拖航合同、船舶碰撞、海難救助、共同海損、海事賠償責任限制等部分。
  6. Section i mainly probes into the questions of the conception, nature, characteristics of the mortgage and the classification and variety of mortgage as well. while in section ii, the paper particularly analyzes the questions of the acquiring approach of mortgage, the parties to the mortgage contract, the target objects of mortgage contract, the prescription and content of mortgage contract, mortgage registration, the organizations of mortgage registration, the procedures of mortgage registration, etc. and section iii mainly illustrates the questions of the scope of creditor ' s rights of mortgage guarantee, the scope of target objects connected with the effect of mortgage, the party ' s rights and obligations in mortgage affairs ; the relationship between mortgage and guarantee, the conflicts between mortgage and other real rights granted by way of security

    第一部分主要就抵押權及抵押的概念、性質、特徵、抵押權的分類、種類等問題進行了探討;第二部分著重分析了抵押權的獲得方式、抵押合同的當事人、抵押合同的標的物、抵押合同的訂立、內容,抵押登記、抵押登記機關、抵押登記程序;第三部分闡述了抵押擔保的債權的范圍,抵押權效力所及的標的物的范圍,抵押關系中當事人的權利義務,抵押與保證的關系,抵押權與其他擔保物權的競合,抵押權的處分;第四部分探討了抵押權的實現條件,抵押權的實現途徑,抵押權的實現方式,抵押權實現的限制,抵押權的次序,抵押權的消滅;第五部分重點研究了權利抵押權、最高額抵押權中的若干問題。
  7. Definition and classification of operation states present a new tool to evaluate security of power systems

    電力系統運行狀態的定義和劃分為了合理分析和評估系統的安全性能提供了新的手段。
  8. We use control chart to characterize states of security environment and data mining to construct intrusion detection strategies. the latter includes pattern mining, pattern consolidation arid pattern comparing. in succession to it, we construct attribute set and training set for classification of net data

    其次討論了自適應空間的構成,使用控制圖來構建條件空間,用數據挖掘技術來構建策略空間,重點討論了怎樣把數據挖掘技術應用到策略空間的構造中,包括模式的挖掘、合併、比較以及在此基礎上構建分類器所需要的屬性集與學習集。
  9. They cover various issues including ethics and data privacy policy, data classification policy, access control policy, technical measures for protection of customer personal data, location security, staff security and transfer of customer personal data

    守則內容涵蓋多個層面,包括操守及資料私隱政策、資料分類政策、取存資料管制政策、保障顧客個人資料的技術措施、儲存資料地點的保安、員工的保安及顧客個人資料轉移的保安。
  10. In data security, the elimination of classified information from magnetic media to permit the reuse of the media at a lower classification level or to permit the release to uncleared personnel or personnel without the proper information access authorizations

    在數據安全技術中,從磁介質中消去保密信息,使之可重新用於密級較低的場合或允許釋放給未被認可參與機密事項的人員和沒有正式的信息存取授權的人員使用。
  11. What is a p visa ? the p classification is petition - based, which first requires approval from the department of homeland security

    " p "是一類短期工作的簽證,此短期工作紙的批準是必須由美國國土安全局預先批核的。
  12. Moreover, we reinforce our view of social security law from both objective and subjective standard of branch law classification

    同時,筆者又從法律部門劃分的客觀標準和主觀標準兩個角度來證明社會保障法確實是一個獨立的法律部門。
  13. Secure storage units. classification for high security locks according to their resistance to unauthorized opening

    安全存儲裝置.防止擅自開啟的高安全性要求鎖具的分類
  14. The chaos sequence was applied in these two algorithms to increase its security and was served separately as the random watermark generator and the watermark image encryption techniques. due to the analysis of the image characteristics, we determined the watermark strength by the classification of the image content and obtained better robustness and imperceptibility. new algorithms of meaningful digital watermarking in svd domain with chaotic transform encryption are proposed

    混沌序列在這兩類演算法中分別作為隨機水印信號發生器和二值圖像水印的混沌加密手段,具有安全性高、形式簡單的優點;利用hvs特性,分別在時空域和dct頻率變換域中計算圖像內容的自適應嵌入強度,增強了演算法的穩健性;水印的嵌入和檢測計算復雜度小,演算法簡單。
  15. In designing of the information security guarantee system of the telecom business enterprises, we need to follow the wooden pail principle of the network information security, the integrality principle of the network information security, security evaluation and balance principle, standardization and consistency principle, the principle of the combination of the technology and management, the principle of unified planning and separate implement, grade - classification principle and maneuverability principle

    然後,研究電信企業的信息安全保障體系的設計問題。在設計信息安全保障體系時,必須遵循信息安全木桶原則、網路信息安全整體性原則、安全性評價與平衡原則、標準化與一致性原則、技術與管理相結合原則、統一規劃分步實施原則、等級劃分原則和可操作性原則。
  16. Glass in building - security glazing - testing and classification of resistance against explosion pressure

    建築玻璃.保險玻璃.防爆炸壓力的試驗和分類
  17. After studying many relative books and combining with my own understanding, i write this thesis. this thesis includes : the meaning & characteristics of network security ; threatening & attacking that the computer network faces ; general measures to protect network security ; brief introduction, classification and relationships to network security technology ; general description and key technology of fire proofing ( package filtrate technology, delegating technology, nat technology ) ; the constructive type of fire proofing ( filter route ware, multi - port host computer, host computer screen, subnet screen etc. ) ; the examples of the constructive application of fire proofing ; the future developing trend of fire proofing technology and products, etc. so, net security and fireproof technology are the title of this paper

    綜上原因,本文將「網路安全」和「防火墻技術」組在一起形成本論文題目。本論文是筆者在研讀許多相關文獻並結合自己理解基礎上寫成的,主要內容為:網路安全含義及特徵、計算機網路所面臨的威脅和攻擊、保障網路安全的一般措施;網路安全技術的簡介、分類及關系;防火墻概論、防火墻關鍵技術(包過濾技術、代理技術、 nat技術等) ;防火墻的構建類型(過濾路由器、多埠主機、主機屏蔽、子網屏蔽等) ;防火墻的構建應用舉例;防火墻技術的未來發展趨勢及產品等。
  18. Glass in building - security glazing - testing and classification of resistance against bullet attack

    建築玻璃.安全玻璃.抗槍擊性的試驗和分類
  19. Glass in building - security glazing - testing and classification of resistance against manual attack

    建築玻璃.安全玻璃.抗人工沖擊試驗和分類
  20. Glass in building - security glazing - testing and classification of resistance against bullet attack ; german version en 1063 : 1999

    建築物玻璃.安全玻璃.防彈玻璃試驗和分類
分享友人