security information 中文意思是什麼

security information 解釋
安全資信
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  1. A multiagent - based implementation is also given in the dissertation. the system offer so a extendible, adaptive, intelligent environment for security information and knowledge handling

    論文最後給出了一個基於多代理實現的系統,該系統具有很好的系統集成能力、動態適應能力和知識更新能力,為安全管理員提供一個信息決策支持與安全控制管理的環境平臺。
  2. As a new branch of information security, information hiding technology including digital watermarking and steganography aims to protect intellectual property rights of multimedia contents and to send secret messages under the cover of a carrier signal

    信息隱藏是信息安全領域中的一項新興技術,主要有數字水印和數字密寫兩大分支,分別用於多媒體數據的版權保護和隱蔽通信。
  3. Hewlett - packard has abandoned its attempt to suppress security information via the digital millenium copyright act

    惠普公司放棄了利用《千禧年數字版權法》禁止發布有關(其公司操作軟體的)安全情況的嘗試。
  4. How can the solemnity of security information disclose system be guaranteed

    證券信息披露制度的嚴肅性如何落實
  5. According to some problems existed in network security information analysis, such as lacking of security description, low information visualization, false - positives and false - negatives, this paper suggests implementing correlation in integrated analysis of network alerts and logs to improve the capability of network security information analysis

    摘要針對當前網路安全信息分析過程中出現的安全描述片面性、信息可視化程度低和誤報警、漏報警現象等問題,提出運用關聯方法對網路中的報警和日誌信息進行綜合分析,用於提高網路安全信息分析能力。
  6. The task is to implement the security information subsystems of security health care system. besides, basing on " the implement of corba technology in depth network security system ", we partly implemented the function of attacking and defending subsystems

    本課題完成了安全保健體系中的安全信息子系統,並在《 corba技術在網路安全深度防禦體系中的應用》的成果基礎上實現了攻擊及防護子系統的功能。
  7. Basing on corba technology, the thesis puts forward a security health care system ' s construct scheme. this scheme is made up of four subsystems, they are information collect subsystems, security information subsystems, attacking and defending subsystems and event manage subsystems

    本文基於corba技術,提出了安全保健體系構建方案,該方案包括四個子系統:信息採集子系統、安全信息子系統、攻擊及防護子系統、事件管理子系統。
  8. Design the project of the system about " security information broadcast and dynamic monitor of ship on river ", the system is a typical application based on its communication platform. 2

    構建了「長江安全信息播發及船舶動態監測系統」的整體方案,該系統是基於智能交通通信平臺的一個典範應用; 2
  9. Shanghai software companies in china and thailand established in the south to develop marketing centres, network security technology and services support to the south advance, the center has become specialized in the shanghai pudong software park information network security, information security is the outcome of the national industrialization base ( eastern ) first be settled down enterprises

    公司在上海成立中軟華泰南方研發銷售中心,將網路安全的技術和服務支持向南方推進,中心成為上海浦東軟體園專門從事信息網路安全的機構,是國家信息安全成果產業化基地(東部)的首批入駐企業。
  10. Relied on the project “ management system of the hydro engineering construction trade of tianjin ” ( msect ) of hcht, this thesis analyzes the national situation of engineering construction trade and the domestic and international network trade at present, expatiates the knowledge of engineering construction trade, discusses the tender review methods which are often used and sets the mathematic models for methods of tender review which are being studied, designs the structure models and application development in detail, at last describes the technologies being used in network security, information security and impartial supervision

    本文依託北京海策環通科技發展有限責任公司承接的「天津市水利工程建設交易管理系統」開發項目,對國內工程建設交易的現狀和國際國內網上交易的情況進行了分析,對工程建設交易理論知識進行了全面闡述,對常用評標方法進行了對比研究,對在研評標方法進行了數學模型方面的探討,對系統的架構模型和應用開發進行了詳細設計和研究,最後對網路安全、信息安全和公正監督等採用的技術進行了重點闡述。
  11. Therefore, it is crutial to consider the approach to construct a uniform labour security information system ( ulsis ) and to improve social security working and management methodologies in order to increase the efficiency of social security system and to provide high - quality social services, and to enhance the efficiency of funding monitoring as well

    在這一建設過程中如何建立好統一的勞動保障管理信息系統,如何改進社會保障工作方法和管理方式、提高社會保障工作和管理效率、提供優質的社會化服務、加強基金的有效監管、提高宏觀決策的科學性等等都具有重要意義。
  12. U. s. safeguard system for national security information

    美國國家信息安全保障體系簡介
  13. The model controls the dynamic security of network information flow on four layers : security entrance layer requires user authentication and encapsulates security information flow ; social intelligence layer makes information flow to have the ability of self - sensing self - protecting and self - adjusting ; business layer carries out business logic in forms of transactions which can be submitted, processed and roll back, in order to provide real - time protecting and online recovering ; tcp / ip security layer ensures security communication for information flow

    該模型分4個層次控制網路信息流的動態安全;安全入口層負責用戶的身份驗證和信息流的安全封裝;社會智能層賦予信息流自我感應、自我保護、自我調控的行為能力;事務層實現商業事務的提交、處理、回滾,提供實時保護和在線恢復機制; tcp / ip安全協議層則保障網路信息流的安全傳輸。
  14. Has up - to - date security information, white papers, and downloads. in this section

    在設計ado . net應用程序時,將建立威脅模型作為必要的過程。
  15. In order to achieve our vision to be a top tier customer service center and grow talents at the same time, we are determined to keep working to enhance operation and maintenance service systems so that we can offer users with comprehensive, and timely services, including 24 - hour hotlines, online reply, bbs and internet security information reviews

    客服中心致力於不斷完善服務運維體系,向廣大用戶提供全方位及時周到的服務。包括提供24小時熱線服務郵箱回復bbs帖子回復,網上業務信息安全審核等,同時也不斷努力向合作運營商提供電信級服務支持。
  16. As well as preserving the current advantages of otp, otpap also patches up some faults successfully : it can be used not only for the identification of users, but also for preventing effectively the fake login. besides, it can construct a reliable security information channel between the users and login nodes, and otpap also supports the remote modification of secret pass - phrases and iterative values even if the user ' s secret pass - phrase has been leaked or the iterative value has been zero

    Otpap除了保持otp現有的優點外,還成功地彌補了otp的這些缺陷: otpap不但可用於鑒別用戶,也可以有效地防範假冒的登錄節點,並能在用戶和登錄節點之間建立可靠的保密通道; otpap還支持遠程修改秘密通行短語和迭代值,即使用戶的秘密通行短語已經泄密了或者用戶的迭代值已經為0 。
  17. Security on secret information network system is different from the general information network. after doing the abundant investigation to x institute information network system, a solution on its system physics safe, network operation security, information safe and secret and safe and secret management, etc. has been designed according to the safety engineering. the designed scheme for the x institute has passed the evaluation of " the national weaponry secret qualification of production unit of scientific research examine authentication "

    根據涉密信息網路對安全的特殊性,根據國家對涉密信息網路安全的相關規范,筆者對x所的信息網路系統進行了充分的調查,以及系統脆弱性和風險分析后,按照信息系統安全工程的方法設計了針對該所整個信息網路系統物理安全、網路運行安全、信息安全保密以及安全保密管理等方面的解決方案,完成了網路安全域劃分、防電磁泄漏、安全審計、網路安全管理、信息傳輸加密和訪問控制等工作。
  18. But, we can use information assurance to improve the network ' s security. information assurance focus on the system ' s intrusion detection ability, event reaction ability and the quick restore ability when system has been intruded

    信息保障強調為了保障信息安全,除了要進行信息的安全保護,還應該重視提高系統的入侵檢測能力,系統的事件反應能力和系統遭到入侵引起破壞的快速恢復能力。
  19. Section three : analysis the status quo, chance and challenge that our country confronts about the issues of non - traditional security from economic security including finance, energy, environmental security, information security, transnational crime and contagious illness, and so on

    第三部分:分別從我國的經濟安全方面(包括金融、能源等) 、環境安全方面、信息安全方面、恐怖主義、販毒等跨國犯罪方面以及傳染性疾病蔓延方面進一步分析我國目前在非傳統安全問題上面臨的現狀、機遇與挑戰。
  20. A data structure that contains the security information for a securable object, such as a share, file, sink, or event filter

    Security descriptor -安全說明符包含可保護對象(如共享、文件、接收器或事件篩選器)的安全信息的數據結構。
分享友人