security host 中文意思是什麼

security host 解釋
安全描述符
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • host : n 〈常 H 〉【宗教】聖餅,聖餐用麵包。n 1 主人 (opp guest)。2 (廣播、電視的)節目主持人。3 旅館...
  1. During the design and development, we have considered the security and proposed the strategy to protect the host and searching aglets

    在設計和開發過程中,考慮到了安全性問題,提出了對主機和搜索aglet保護的策略。
  2. The configuration of internal and external packet filter and a single home bastion host provide very good security

    內部和外部包過濾器和一臺單向定位的bastion主機的配置提供很好的安全性。
  3. Currently, there are a group of experienced professional ship repairing in our corporation, which relies on the humanist management idea, stimulates staffs host spirit the company hold the belief of : seeking survival through quality guarantee, further development through efficiency promotion, promising future through environmental protection and the management nust be faithful, the production must be safety, administration must be in guarantee, the service must be high - quality in order to increase the companys market competitive ability, and foster a good and healthy company image now we still be busy in constructing the platform of the quality and security, and we will take satisfaction of shipowner is our pursue as the goal, create the deligently brand of the industry outstanding credit enterprise, all staffs in the corporation are now pushing themselves to work hard in order to let the people in the world getting much understanding of east fujian, and to let the ship industry of east fujian being well - known in the world

    目前公司已擁有一支精練的專業修船隊伍,憑藉以人為本的管理理念,激發員工的主人翁精神。公司實行「以質量求生存,以高效求發展,以環保求未來」和「誠信經營安全生產保證質理優質服務」的方針,提高了公司的市場競爭力,塑造良好的企業形象。我司仍在積極構建質量安全平臺,以「船東的滿意就是我們的追求」為目標,努力創「工業優秀信用企業」品牌,全司員工正在為讓世界了解閩東,為閩東的船舶工業走向世界而努力奮斗。
  4. The purpose of this subject is to implement a transparent proxy server based on linux os which can provide intranet host network security

    本課題目標是完成一套基於linux操作系統的透明代理型防火墻軟體,為在內部網的主機提供安全保護。
  5. This paper is beneficial for the study of the intranet network security and the applications of the intranet host firewalls

    不僅在理論上對企業級的計算機網路安全防護的研究和發展有較大的意義,而且對實際的企業級主機防火墻的設計應用也有一定的指導意義。
  6. In one typical use of code access security, an application downloads a control from a local intranet host web site directly to the client so that the user can enter data

    在代碼訪問安全性的一種常見應用場合中,應用程序將控制項從本地intranet宿主網站直接下載到客戶端,以便用戶能夠輸入數據。
  7. In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply

    本文針對網路安全的現狀,分析了邊界防火墻及現有主機防火墻的不足之處;對現有黑客的網路攻擊手段與方法進行分析研究,並對防禦這些攻擊的方法進行了研究;對企業網的網路安全策略進行討論,分析了現有主機防火墻在企業網中應用的不足,並在此基礎上,結合包過濾、虛擬專用網、入侵檢測等防火墻技術,設計了一種企業網中的主機防火墻模型,並對這一模型進行了較深入地研究。
  8. To set application domain policy, the host must be granted the security permission provided through the

    若要設置應用程序域策略,必須授予宿主控制域策略的安全權限(通過
  9. Then based on information theory, we discuss the security of informatin hiding system, including the security of plain messages, secure messages and host images

    基於信息論描述了圖象信息隱藏及其攻擊過程,提出三類典型的理論安全性,即明信安全性、密信安全性和宿主圖象的安全性。
  10. The necessity theories of it mainly include the society profit, financial risk, security creditor ’ s rights, society choices and so on ; the objects of it are to get the final result and to reach the final aim of the supervision behavior which are the premise of the effective financial supervision and the basis of taking actions of supervision authorities ; the principles of it are the independence of supervision body, the supervision respected for the law, the mixture of “ inner and outer control ” and paying equal attention to supervision and self - discipline, stable operation and prevention of risk and the mutual supervision between the host nation and homeland ; the main content of it is the supervision of market admittance of the financial organization, market operating process and market diffusion ; the model of it in organizing system is three

    本文通過對金融監管的含義、金融監管必要性理論、金融監管的目標和原則、金融監管內容和國際金融監管主要模式的研究,對金融監管理論做出了一個總體概括。在此基礎上,介紹了美國、日本這兩個世界比較發達國家的金融監管制度沿革,對兩國金融監管的發展歷程、主要特徵進行了概括敘述,並對兩國不同時期金融監管制度的利弊進行了分析。通過對兩國的金融監管制度的比較分析,更進一步了解美國、日本金融監管在保護金融業健康發展、確保其審慎經營方面的促進作用。
  11. This company produces the multi - purpose microcomputer electrothermal furnaces ( fission type electricity wok ) and the court music stove ( light wave stove ) primarily, may use each kind of flat - bottomed pan to have, smokeless, misfires, the radio magnetic wave radiation, conforms to the international sanitation standard, is the new security environmental protection kitchen utensil, this product uses germany core technologies, undergoes the multiple lethality experiment, durable, the reasonable price, is the host who the present will replace the electromagnetic oven hits the product, now develops many kinds of models the product

    本公司以生產多功能微電腦電熱爐(分體式電炒鍋)和雅樂爐(光波爐)為主,可以使用各種平底鍋具,無煙、無火、無電磁波輻射,符合國際衛生標準,是新型安全環保廚房用具,該產品採用德國核心技術,經過多次毀壞性試驗,經久耐用,價格合理,是今後代替電磁爐的主打產品,現在研製出多種型號的產品。
  12. The purpose of this attribute is to enforce host - specific programming model guidelines, not security behavior

    此屬性的目的在於強制實施特定宿主的編程模型準則,而非安全行為。
  13. Familiar with banking it system architecture knowledge, including computer room environment, host machine ( mainframe ) and server, network, security, storage, system software ( database, transaction middleware, network management, system management, security management, project management, testing management ) etc

    熟悉銀行it系統架構知識,包括機房環境、主機及服務器、網路、安全、存儲、系統軟體(數據庫、交易中間件、網路管理、系統管理、安全管理、項目管理、測試管理)等方面。
  14. Foreign funds have had a important role on the economy of chinese, who has been the largest country in the world, and the second largest one in the developing countries, but, there has been some unavoidable questions in chinese economic security, especially come to lash of industry ? so we 11 do our best to take the paper is organized into these major parts : ( 1 ) the development of tncso ( 2 ) tncs ' s fdi o this section will analysis the key factors and the causes when tncs launchs the action in fdi ; ( 3 ) the effectso they include ones produced in the world economy, home country economy and host country economy ; ( 4 ) the functions of the foreign funds when china has taken in these fdi ; the part emphatically points out the impacts by the model of econommetric

    目前,作為發展中國家的最大、全球的第二大引資國,外資在中國的經濟發展中起到了一定的積極作用,但也不可避免地對中國的經濟產生安全問題,特別是產業的沖擊。本文主要從以下幾個方面加論述: 1 、跨國公司的發展情況,主要是說明跨國公司的發展狀況和分析其在新的環境下的發展趨勢; 2 、跨國公司的對外直接投資,主要闡述其在對外投資活動中的可行性研究,在選擇投資環境中應考慮的關鍵因素和跨國公司對外直接投資活動的動因; 3 、跨國公司對外直接投資活動的影響,著重分析對世界、母國和東道國的經濟影響,以及在全球經濟結構變化中的作用; 4 、跨國公司對華直接投資和中國的對外直接投資的現狀:著重分析跨國公司對華直接投資的影響,並用計量經濟模型來分析其影響。
  15. You can do useful work - track down a network security problem, prepare and distribute a memorandum, or view a downloaded multimedia presentation - with knoppix, confident that, once you pull out the cd - rom, the host system will return to its normal operation

    利用knoppix ,您可以執行非常有用的工作跟蹤網路安全性問題、準備和分發備忘錄,或者查看已下載的多媒體演示文稿請您相信:一旦您取出cd - rom ,主機系統將返回到它的正常操作。
  16. Application domains offer many of the advantages of processes, such as fault isolation, improved robustness, and security, without requiring support from the underlying host operating system

    應用程序域提供進程的許多優點,如錯誤隔離、增強的可靠性和安全性,所有這些並不要求來自基礎主機操作系統的支持。
  17. After studying many relative books and combining with my own understanding, i write this thesis. this thesis includes : the meaning & characteristics of network security ; threatening & attacking that the computer network faces ; general measures to protect network security ; brief introduction, classification and relationships to network security technology ; general description and key technology of fire proofing ( package filtrate technology, delegating technology, nat technology ) ; the constructive type of fire proofing ( filter route ware, multi - port host computer, host computer screen, subnet screen etc. ) ; the examples of the constructive application of fire proofing ; the future developing trend of fire proofing technology and products, etc. so, net security and fireproof technology are the title of this paper

    綜上原因,本文將「網路安全」和「防火墻技術」組在一起形成本論文題目。本論文是筆者在研讀許多相關文獻並結合自己理解基礎上寫成的,主要內容為:網路安全含義及特徵、計算機網路所面臨的威脅和攻擊、保障網路安全的一般措施;網路安全技術的簡介、分類及關系;防火墻概論、防火墻關鍵技術(包過濾技術、代理技術、 nat技術等) ;防火墻的構建類型(過濾路由器、多埠主機、主機屏蔽、子網屏蔽等) ;防火墻的構建應用舉例;防火墻技術的未來發展趨勢及產品等。
  18. According to hiberarchy security model of information system, osgw system is partitioned into four layers, forcibly implemented with hardware - based security and protects data through internet ; 2, to recieve and forward the oracle data packets, we put forward a promethean method of service renaming which makes it possible to enhance the oracle ' s security ; 3, after finishing the analysis of security demand, the gateway implements seveval kinds of security policy model and this make the gateway may be applied in sorts of condin ' on ; 4, the syntax of subject and object label is flexible and helps to scheme these labels, which is pioneer in correlative fields ; 5jby blacklist the osgw filtrates some loggin request based on accounts, host and applications. the blacklist subsystem strengthens the availability and performance of the gateway system

    黑名單系統在中間層實現了基於客戶身份,客戶主機和客戶應用程序的安全過濾,增強了系統的可用性和性能。本文的主要工作包括設計並實現osgw安全系統和osgw安全信關兩個部分。 osgw安全系統關注的是從物理層,軟體層和inetert層實現oracle系統的安全性; osgw安全信關本質上是osgw安全系統的軟體層, osgw安全系統的b級安全特性由osgw安全信關來實現。
  19. This kind of firewall is independent from host, isn ’ t easy to be cheated and has flexible management. it is a more perfect security basic framework

    這種基於硬體來實現的防火墻具有不依賴主機操作系統、不能被繞過和管理更靈活的特點,是一種更加完善的安全基礎架構。
  20. This paper mostly concern design and implement a kind of personal firewall for pc based on windows operation system which provides host network security

    本論文所涉及的課題是為基於windows操作系統的個人電腦開發一款個人防火墻軟體,為pc提供網路安全保護。
分享友人