security log 中文意思是什麼

security log 解釋
安全標識
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • log : n 1 原木,圓木,乾材。2 測程儀,計程儀。3 航海日誌,(飛行員用的)航海日誌;旅行日記。4 〈英國〉...
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. Measurement precision contribute to improving the security class and economic of boiler running and automatic level of whole plant. the smart measurement instrument of the boiler ’ s air flow designed in the thesis and the instrument can make the degree of accuracy get to. firstly, the thesis build the “ velocity - area ” method which is on basis of “ log - tchebycheff ” on the analyzing of basic measure method of boiler ’ s air flow. secondly, model86 averaging pitot tube was selected the right model of flow transducer which can pickoff the differential pressure and static pressure. modelc264 which made in setra system corp. u. s. a was selected as ultra low differential pressure transmitter. a good flow of boiler ’ s air was calculated by offsetting pressure and temperature. finally, numeroscope was designed with z80cpu and other chips

    精確的監測有助於提高鍋爐燃燒的安全型、經濟性,也有助於提高電廠的整體自動化水平。本文設計的智能化鍋爐風量測量裝置能夠實現對鍋爐送風的精確測量,精度可達。本文首先研究鍋爐送風矩形大管道測量理論,提出在流來流量測量測點布置基於「對數-切比雪夫」法的速度-面積法。
  3. We will provide real, usable webmoney ( r ) serial with payment log, you should not have a suspicion of security. do not bid directly if you are oversensitive

    當方將提供真實可靠的webmoney號碼,並有支付紀錄,閣下無需懷疑號碼的安全性,神經質者請勿輕易下標。
  4. You as the authorized administrator need the configuration client to define a security policy and define network objects and log on to the firewall

    ) ,用戶作為授權管理員,需要配置客戶來定義安全策略(和定義網路對象以及登錄防火墻) 。
  5. Nonetheless, there is a new problem with the code sample above - no security conscious action is taken when a user tries to log into an account but fails to do so

    實際上被認為是調用「偽隨機」數生成器,當然,這些隨機數不是真正隨機的。這個事實對軟體的安全性有著深遠的影響。
  6. Another highlight of the architecture is introduction of data mining technique. ids makes use of data mining algorithms to abstract key features of system runtime status from security audit data such as system log and network data stream, and then constructs classify engine of audit data

    本文提出的體系結構中還引入了數據挖掘思想,利用數據挖掘技術中的關聯分析、分類等演算法從系統日誌、系統調用序列、網路流等海量的安全審計數據中提取關鍵的系統特徵屬性,根據這些屬性生成安全審計數據的分類模型用於入侵檢測。
  7. Zyxp slicer is our factory to producing the chemical thick liquid or the wood chip wood grinder with the timber, is it sharpen in blocks demand original slab to need, combine reality, develop but develop with multi - functional dishes of type sharpening blocks of planing meticulously, this machine structure is rational, the craft is superior, easy to operate, it is high to use security, productivity, can replace single function slicer, pulverizer, than use single function equipment raise the efficiency 40 %, power consumptive to reduce 25 %, suitable for log, reed, cotton firewood pole, mulberry skin, slab, branch material, etc. supplies, make the indispensable mechanical equipment of thick liquid with the timber in the papermaking trade

    Zyxp切片機是我廠針對用木材生產化學漿或木片磨木機,需要把原板皮削成片的需求,並結合實際,精心研製而開發和多功能盤式削片機,該機結構合理、工藝精良、操作方便,使用安全、生產率高、能代替單功能切片機、粉碎機,比使用單功能設備提高效率40 % ,耗電減少25 % ,適用於原木、蘆葦、棉柴桿、桑皮、板皮、枝椏材等物料,是造紙行業中用木材制漿不可缺少的機械設備。
  8. The digital rights management security audit log descriptive model presents what will be recorded by digital rights management security audit log

    摘要數字權限管理安全審計日誌記錄的內容由數字權限管理安全審計日誌描述模型給出。
  9. This paper puts forward " cause - context - result ( cause - context - result, ccr ) based digital rights management security audit log descriptive model " ; this model depicts digital rights management events from the point of digital rights management security audit

    通過對已有數字權限管理事件模型的分析,提出了「基於原因背景影響的數字權限管理安全審計日誌描述模型」 ;這個模型從數字權限管理安全審計日誌角度描述了數字權限管理事件。
  10. Sparks of this paper are as follows : 1 ) a much improved security audit log is presented, which supports log file in main systems and ensures orginal log files before system intruding happens are protected from being tampered or deleted so that they can be saved completely to be used as investigation clues and evidence souces of great importance ; 2 ) a log file base including different kinds of log files is established to support log file collecting and analyzing ; 3 ) correlation analysis is applied to effectively identify latent clues

    本文的創新點在於: 1 )提出了一種較為完善的支持計算機取證的安全審計日誌方法,它可以支持目前常見系統的日誌文件,確保系統被入侵攻擊前的日誌文件記錄不被篡改、刪除,使得入侵者在入侵攻擊系統前留下的「痕跡」能被完整的記錄下來,作為取證人員重要的調查線索和證據來源; 2 )對各類系統不同日誌文件組成日誌文件庫,為獲取和分析日誌文件的記錄提供支持; 3 )對各類日誌文件的記錄採用關聯分析,更有效的提取潛在的計算機犯罪線索。
  11. The security request of the mobile - agent system is to protect the agent from the attack of the malicious machine and agent as well as to protect the machine from the attack of the hostile agent. hierarchical integratedsecure model in jade provides effective, extensible security framework for mobile agent by integrating bi - direction authentication, authorization, java security policy, environment based key generation, and audit log

    Made移動代理系統的層次化的集成安全模型在現有的安全技術基礎上,將雙向身份驗證、資源存取授權及控制、 java語言安全設施以及基於環境的密鑰產生法和核查日誌等方法有機地結合起來,為移動代理和運行環境提供了一個實用的可擴展安全環境。
  12. Describes the effects of event log interactions on application security

    描述事件日誌交互對應用程序安全性的影響。
  13. When the system security log reaches its maximum size it will stop recording security events

    當系統安全達到它的最大的限度時,它將停止記錄安全事件。
  14. We log these addresses and analyse them to understand where requests originate so that we can provide the most efficient service, enhance security, ensure appropriate usage and produce traffic volume statistics

    我們將記錄這些地址並對其進行分析,了解請求來自何處,以便提供最有效的服務、增加安全性、確保網站的適當使用,並統計訪客量。
  15. The article elaborates on medical treatment insurance integrated services network mis at last, especially details the issues in actualizing it : the strategy of network security, the technique of popedom management, the technique of multilayer - distributing bases on groupware, encrpytion checkout, the mode of popedom management bases on roles, audit and control of operation - log, and theory of closed loop safety control

    文章最後結合醫保綜合業務網路管理信息系統實例加以詳細說明,尤其在實施過程中採用了網路安全策略,權限管理技術,基於組件的多層分散式技術,加密校驗,基於角色的權限管理方式,操作日誌審計監控,閉環安全控制理論等問題進行了詳細的探討。
  16. It is considered a benefit to security that errors are written to the error log and not the browser, and hence nothing is given away about the setup on the server

    將錯誤消息寫入錯誤日誌文件而不是瀏覽器對于安全性是很好的設計,這樣就不會暴露服務的設置信息。
  17. Finally, the essay presents analysis and research on the function demand of the safety audit, other audit techniques as well as the security log analysis principle

    最後,本文對安全審計的功能需求和各種審計技術及日誌分析原理進行了分析研究,給出了郵件服務器日誌分析的具體實現過程和方法。
  18. To improve security, configure your membership provider to restrict the number of attempts a user may make to log on

    為了提高安全性,需將您的成員資格提供程序配置為限制用戶可嘗試登錄的次數。
  19. The intelligent control of the crystal growth is implemented in the process control level with higher control accuracy and the dynamic data display, automatic event alarm, log printout, on - line information look up and security limit detection are iraplemented in the control nangement level

    過程式控制制級實現了晶體生長的智能控制,控溫精度較高;控制管理級實現了數據動態顯示、事故自動報警、定時報表列印、在線信息查詢和安全權限檢查等功能。
  20. The " manage auditing and security log " user right

    「管理審核和security日誌」用戶權限。
分享友人