security consideration 中文意思是什麼

security consideration 解釋
安全考慮
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • consideration : n. 1. 考慮,考察;討論,商量。2. 照顧,關心;體諒,體恤。3. 報酬,補償。4. 尊敬,敬意。5. 原因,理由;須考慮到的事實[問題];理由。6. 〈罕用語〉重要性。
  1. Consideration of security project of the dunhuang caves

    敦煌石窟安防工程建設的若干思考
  2. As long as nuclear deterrent remains to be an important security consideration or military option, the us should n ' t bind itself up by approving the ctbt

    只要美國的國家安全還依賴核威懾,美國就不能停止核試驗。保守派歷來對ctbt持反對態度,此次共和黨否決該條約也是這一傳統政策的延續。
  3. This paper aims to confirm the technological status of a crane ' s metallic structures, taking the factors which affects cranes " performance into consideration, forecasting the crane ' s additional useful life, developing the software which is about the security evaluation of the crane ' s based on visual c + +

    本論文以港口起重機為研究對象,考慮影響起重機結構的各種因素,確定金屬結構的技術狀態,對其安全使用期限進行預測,並採用visualc + + 6 . 0開發了一套主要針對裝卸橋和門座起重機的安全性綜合評價系統。
  4. Last week, beijing made clear that it was not prepared to support an overhaul of the governing structure of the united nations, effectively delaying consideration of plans to promote japan and several other major countries to permanent membership on the security council

    北京在上周明確表示不支持為聯合國改革設時限,有效地延緩了對發展日本及其他幾個主要國家加入聯合國安理會常任理事國的計劃。
  5. The theory base of the liability of warrant for defects is to maintain the considerate balance relationship of contracts with consideration and to protect trade security and interests and rights of the consumer

    維護有償合同的等價均衡關系,保護交易安全和消費者權益,是瑕疵擔保責任產生的理論根據。
  6. On the consideration of the important function of xml in message communication, security plan and the standard of digital signature in different granularity is given

    鑒于xml在消息通信中的重要作用,研究了不同粒度的安全方案和數字簽名標準。
  7. The estoppel of anglo - american law system, which is a substitute and supplement of consideration, is the result of application of the principle of good faith and equitable idea in order to protect transaction security

    摘要英美法系的禁反言規則,是對價理論的代替物和補充,是誠實信用原則與衡平理念適用的結果,目的是保護交易安全。
  8. In this paper the design of network security architecture for the state monitor and management information system of housing private foundation is presented, including the comprehensive consideration of physical security, network security, operation system security, application and supporting platform security, and information security, etc ; it is carried on to analyze possible security threats, vulnerabilities and their risks, and a design scheme of network security architecture, especially the network regulations which have been adopted in the system implement, is proposed

    本文對全國住房公積金監督管理信息系統網路安全體系進行設計,包括對物理安全、網路安全、操作系統安全、應用系統及應用系統支撐平臺安全、信息安全等各個層面進行綜合考慮,並對其中的用戶認證與訪問控制和網路隔離技術等關鍵技術進行了詳細分析。對網路中可能存在的安全威脅、安全脆弱點、以及由此產生的安全風險進行了分析,提出了相應的網路安全體系設計方案,尤其是明確提出了網路規則。
  9. This dissertation analyzes detailed research about some key technology and security policy, such as secure saving and getting between agents, secure communication between agents and hosts or agent proxy servers, mobile agent self - safe, safe transfer and control and timestamp, md5, dsa, identity authentication, digital signature etc. the insecure, single problems are resolved gradually, the whole safe framework needs to synthesize the consideration and form further

    由於很多安全問題之間也有相互制約,只能根據實際情況,找到最適合實際需要的安全策略。接下來對某些關鍵技術,諸如移動agent之間, agent與主機、代理服務器之間的安全存取資源,移動agent自身保護,安全地傳輸與控制,安全的通信,時間戳技術,消息摘要,數字簽名身份認證等安全策略,進行較詳細的剖析研究。
  10. This thesis mainly introduce a development process of mis of steel tube enterprise producing. a universal mis of adapting to our country middle and small producing enterprise is developed in accordance with the practical situations of our country producing enterprise. the structure and developing method of the mis are analyzed, followed by the introduction of the development process in stages. the system development abides strictly by the requirements of software engineering, with all the files standard and complete. during the process of the development, we took into consideration practicality as well as scientific principles. the system is development under a quick prototype method. first, the logic module of the system is established through the analysis of the business flow process and the information flow concerning productive enterprise of steel tube ; secondly, in light of the module, the system is set up including the design of the system ' s network platform, developing tools, database, system code, software modules, system security, user ' s interface and so on. finally, the prototype of the system is implemented on the basis of the design

    文中首先分析了管理信息系統的開發方法和體系結構,然後分階段地介紹了具體的開發過程。該系統的開發嚴格遵守軟體工程的要求,文檔規范完善,在開發過程中堅持實用性和科學性相結合的原則。系統採用快速原型法進行開發,首先通過對鋼管生產企業業務流程和數據流程的分析,建立了系統的邏輯模型;接著針對該模型進行系統設計,包括對系統的網路平臺、開發工具、數據庫、編碼、軟體模塊、系統安全及用戶界面等方面的設計;然後在設計的基礎上實現了系統原型;通過對原型的評價和改進,使原型最終成為實際產品。
  11. The paper puts forward an ecosystem and the consideration of grading management and planning of water used for ecology, approaches to the water resources issues related to 8 important aspects of water and ecologic security, property management of water resources and business accounting, water resources allocation management, management of water resources policies, management of water resources development and utilization, water used for ecology and carrying capacity of water resources, man - built meadows and water saving, protection, management and water use of semi - desert meadows on the border of oasis and puts forward important strategic countermeasures on sustainable development of oasis situated on the downstream of dry endorheic drainage based on the study of orientation and key points of ecological building of the oasis

    摘要在研究乾旱內陸河流域下游綠洲生態建設方向與重點的基礎上,提出了生態系統和生態用水量分級管理和規劃的思想,探討了其所涉及的重要的水安全與生態安全、水資源產權管理與核算、水資源配置管理、水資源政策管理、水資源開發利用管理、生態用水與水資源承載能力、人工草場與節約用水、綠洲邊緣半荒漠草場的保護治理與用水等8個方面的水資源問題,提出了乾旱內陸河流域下游綠洲可持續發展的重大戰略對策。
  12. It draws the following conclusions : ( a ) when the commission is fixed, security investors take consideration of the distance and convenience of transaction

    得出以下結論: ( 1 )在固定傭金制下,投資者主要考慮距離的遠近和交易的方便程度,券商提升經紀業務盈利的手段主要是增加營業部數量。
  13. Most of the existing network information security technologies focus primarily on the defensive response to external attacks, and give less consideration on management of the active network accessing behavior from local users

    現有的網路信息安全技術大多將主要精力集中在對外來攻擊進行防禦性響應上,而對規范網內用戶的主動訪問行為考慮的較少。
  14. This thesis demonstrated in detail the bank organization, operation procedures, security requirement analysis, etc. it also lucubrated the information security theory, and analyzed the information security structural levels. based on the above results, a security design scheme was developed from a technically and operationally integrated consideration for e - banking system in beijing agriculture bank. technique factors consisted of security controls of website, including the firewall strategies, break - in testing and system scanning, ca digital certification system and security controls

    在研究了信息安全的相關理論的基礎上,提出了北京農行網上銀行系統的技術和業務上綜合考慮的安全設計方案,前者包括針對網站的安全控制,如包括防火墻策略、入侵檢測和系統掃描、 ca數字證書體系、安全控制等,後者以個人業務、對公業務、銀券通業務等流程說明業務的安全實現。
  15. It has been playing an important role in equipping all kinds of arms and services for campaigns, tactical exercises and emergent actions etc. based on the detailed analysis of the exchange ' s architecture and implementing, this thesis points out some disadvantages of the device, such as too many absolute components, not very high enough reliability and security, very large size and weight, operating and maintaining difficultly. considering low power requirement and man - machine interface optimizing design at the same time, the thesis come up with an integrated design scheme to the previous device based on " mcu + cpld / fpga architecture " : ( 1 ) signal frequency dividing, timing frequency producing, 20 customers " led states controlling are implemented in cpld ; ( 2 ) decoding, latching data and controlling signals are implemented in cpld by bus interface between mcu and cpld ; ( 3 ) chip selecting principles and mcu idle mode design are completed under the consideration of low power requirement ; ( 4 ) operation by chinese lcd menus is adopted in the man - machine interface

    本項目以該交換機為研究對象,在詳細分析原設備的系統結構和功能實現方式的基礎上,指出該機型在使用過程中存在技術相對陳舊、分立元件過多、可靠性和保密性不夠、體積大、重量大、維修困難等問題,同時結合系統的低功耗需求和優化人機介面設計,本文提出基於「單片機+ cpld fpga體系結構」的集成化設計方案:在cpld中實現信號音分頻和計時頻率生成電路、 20路用戶led狀態控制電路; cpld與單片機以總線介面方式實現譯碼、數據和控制信號鎖存功能的vhdl設計;基於低功耗設計的器件選型方案和單片機待機模式設計;人機介面的lcd菜單操作方式。
  16. In full consideration of the factors such as the information ' s security, high - efficiency, compatibility and expansibility, etc, the oilfield integrated information management and search model based on software agent are designed

    在充分考慮信息的安全性、高效性、兼容性及擴展性等因素的基礎上,設計了基於軟體agent的石油綜合信息管理和檢索模型。
  17. It includes demand analysis for the whole web - oriented courses system, the whole blue print design, the multimedia teaching system, the resolving question system, the exercise training system, the mock examination system, the demo of virtual model and virtual mechanism system, jsp ( java server page ) technology of developing dynamic web site, the choice of graphics processing platform, database design and security consideration

    其中包括:整個網路課程系統的需求分析,整體方案設計,多媒體授課、輔導答疑、習題練習、模擬考試、虛擬模型機構演示子系統具體功能分析和設計, jsp動態網站開發技術,圖形處理平臺選擇和數據庫設計,安全問題。
  18. In very exceptional circumstances, where factors other than the design, maintenance, sensitivity or operation of the systems can be shown to have been responsible for a particular false call, then the owner of the system may request that this incident be deleted from the record. such a request should be in writing contain all relevant details with supporting documentation and be sent to chief inspector security companies inspection unit for consideration

    在十分特殊的情況下,倘若誤鳴事件並不是由於警鐘系統的設計、維修、敏感度或操作等因素而引致,戶主可申請把有關的誤鳴報告從記錄中刪除。此申請應以書面提出,並連同一切有關資料和文件證據呈交保安公司監察小組總督察考慮。
  19. Security consideration for individual controls

    個別控制項的安全注意事項
  20. Most current implementations of active networks are based on early architecture and lack of security consideration

    已有的主動網路實現案例多數基於早期的體系結構,欠缺安全考慮。
分享友人