security table 中文意思是什麼

security table 解釋
安全表
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • table : n 1 桌子;飯桌,餐臺。2 手術臺;工作臺;游戲臺;賭臺;寫字臺。3 (飯桌上的)食物,酒菜,伙食;一...
  1. Standard booth : booth space rental, fascia board with company name, booth ' s partitions, carpeting, 1 table, 3 chairs, 2 spotlights, free listing in fair catalogue, 200 invitation card, free media publicity, security services at fairground, daily stand cleaning services

    標準展位包括:展位租金、公司招牌板、攤位圍板、地毯、一張臺、三張椅、兩支射燈、場刊公司介紹、兩佰張邀請、海外及澳門免費宣傳、會場內保安服務、每日展位元清潔。
  2. Companies long - term cooperation unit : shenzhen customs, futian district, shenzhen shanghai personnel bureau, the shenzhen public security bureau, the special police detachment, shenzhen ( international ) training center, yantian district office seamounts streets, the second shenzhen ( international ) fashion week, yuanling streets office, the south park street office, the hong kong - po beauty of the body, the hong kong table group, gabriel, a far - reaching enterprise consultants limited, the new company or enterprise management planning, wal - mart erecting a new book entitled " decision of success ", and many other brand enterprises and institutions, and produced a multilingual form of corporate image and the documentary film by passenger households highly praised

    公司長期合作單位:深圳海關、福田區委、深圳人事局、深圳公安局特警支隊、深圳(國際)人才培訓中心、鹽田區委海山街道辦、第二屆深圳(國際)時裝周、園嶺街道辦、南園街道辦、香港健體寶美容機構、香港百利時表業集團、深遠企業顧問有限公司、新升企業管理策劃公司、沃爾瑪上架新書《決策成功學》 、等諸多品牌企業及機關,製作過多種語言及形式的企業形象宣傳片和專題片,受到客戶的高度贊揚!
  3. The tourist receives the form has " the shanghai inhabitants togo abroad ( boundary ) to travel request form " and the hard card, " supplement situation table ", as well as the travel agency compiles " leaves country registration to go through card formalities ", " traveling notice ", these forms are the public security organ serialnumber specially print and the junction are authorized to are engagedin go abroad ( boundary ) to travel the service travel agency to issue0n another ' s behalf

    遊客領取的表格有《上海市居民出國(境)旅遊申請表》和硬卡、 《補充情況表》 ,以及旅行社編寫的《出境報名辦證手續》 、 《旅遊須知》 ,這些表格均系公安機關編號專印並交有權從事出國(境)旅遊業務的旅行社代發的。
  4. Beneath the glare of the mahjong parlour ' s white fluorescent tubes and roving security cameras, a grizzled, 70 - year - old pro clatters his tiles against the table, a cigarette burning slowly between his lips

    在麻將廳耀眼的日光燈管及不停移動的保安攝像頭下,一名頭發斑白的70歲老頭咔嗒咔嗒地在桌上糊著麻將牌,一根香煙在他唇間慢慢燒著。
  5. That is why mr putin is so keen to keep a firm grip on power at home ; it is also why he is so anxious to keep russia ' s seat at the top table, not just in the un security council but also the g8 club of rich countries

    這也是為何普京在國內獨攬大權,同時也解釋了他為何熱衷於不僅在聯合國安理會,而且在富國俱樂部的八國集團中占據一席之地。
  6. In this dissertation, the pivotal points relating to conditional access system, including the framework of mpeg - 2 system layers, the de - multiplexing of mpeg - 2 system, the service information table of mpeg - 2 and dvb, the encryption and decryption method for digital tv conditional access system, are fully discussed according to the market requisition. there is also a probe into the feasibility and security aspect of the coherent descramble algorithm

    本論文結合市場需要,詳細研究探討了與數字電視有條件接收系統緊密相關的部分關鍵技術,包括mpeg - 2系統層結構分析、 mpeg - 2系統復接技術、 mpeg - 2與dvb中業務信息表分析、數字電視有條件接收加解擾技術
  7. Contains a table of code security permissions

    包含代碼安全權限表。
  8. This paper presents the integration of the linux ip processing with the outbound and inbound policy through the linux netfilter, proposes the use of radix tree for organizing the security policy database, the use of hash table for organizing the security association database

    使用linux下的netfilter機制將ipsec的進入和外出策略處理與linux自身的ip層處理緊密結合,使用radix樹型結構來實現安全策略庫,使用哈希表來實現安全聯盟庫。
  9. In this thesis, we are studding and designing configuration management of 3g mobile network which based on tmn standard, including : ( 1 ) function analysis of configuration management of mobile network management based on tmn standard ; ( 2 ) proposing an system structure of configuration management of the mobile network based on tmn standard ; ( 3 ) security mechanism of configuration management system ; ( 4 ) the mechanism of user interface produced automatically ; ( 5 ) dynamic mechanism of related relation among management object classes ; ( 6 ) table adaptation mechanism

    本論文主要工作是研究並設計基於tmn的3g移動網管中配置管理系統。研究內容主要包括: ( 1 )基於tmn的移動網管配置管理的功能分析; ( 2 )基於tmn的移動網管配置管理的體系結構; ( 3 )合理有效的安全機制; ( 4 )管理界面自動生成機制; ( 5 )關聯關系的動態構造機制; ( 6 )表適配機制。
  10. By the role number of role authorization table, certification server can use different security - class identification technologies according to diverse users dynamically, and decides responding authorization with the identification results

    通過角色授權表中的角色數字,認證服務器能夠對不同用戶動態地採用不同安全級別的認證技術,並能根據認證結果做出授權判斷。
  11. The directional routing protocol ds _ dsr put forward by the author is the improvement of the current protocol dsr, complete routine discovery and maintenance by directional neighbor nodes routing table, source routing and directional steering. the research discovers the application of the directional antenna, compare the omnidirectional antenna can increases the networks " total throughput, obviously reduces the co _ channel interference ( cci ), multiple access interference ( mai ), enlarges the nodes " signal and interference to noise ratio ( sinr ), and because of the high gain of directional antenna can realize the communication with farther distance and less jump, end to end delay can decrease deeply, simultaneously, security of networks can be improved partially, the node energy also can be saved easily by power control

    本文提出的定向路由協議ds _ dsr是基於對現有協議dsr的改進下實現的,通過定向鄰節點路由表、定向源路由和定向搜索來完成路由發現與維護。研究發現,定向天線的應用,相比全向天線可明顯提高網路的總的吞吐量,減少通道干擾、多址干擾,提高信干噪比,且由於定向天線的高增益可實現較遠距離、較少跳數的通信,減少了路由發現時間,這樣大大減小了傳輸時延,網路的整體性能得到了不同程度的提高,同時部分地解決安全問題,通過功率控制還可較容易的實現節能的目的。
  12. Isolate part of a table for security reasons

    由於安全原因而隔離表的某一部分。
  13. Ensuring consistent safety and security from the farm to the dinner table

    2確保實現從農場到餐桌的安全一致性
  14. In the fourth chapter of this thesis, the author shows the outcome of the whole designing, namely all the application table of dalian telecom e - business system, and introduces the network organization and the system function of the ctca service disposal point system, the e - tax system, the e - security system, the web business office system of telecom and the e - ticket system in de tail

    在本文的第四章,作者對本次設計的結果,即大連電信電子商務系統的各應用平臺進行了介紹,其中詳細介紹了電信ctca業務受理點系統、電子稅務系統、電子證券系統、網上電信營業廳系統和電子票務系統的網路組織和系統功能。
  15. If your application must use sensitive information for user identification, such as social security numbers, you may want to provide the user with a non - sensitive user id and then use a lookup table in the database to match the sensitive information

    如果您的應用程序必須使用用戶標識的敏感信息,如身份證號碼,則您可能需要向用戶提供非敏感的用戶id ,然後使用數據庫中的查找表來匹配該敏感信息。
  16. By designing the cure table of local stabilization control and transmitting each dictate, we can actualize the control of power system. the thesis analyzes the structure of the stability and security of electric power net, discusses the research project, designs the control program and argues the memory frame

    本文分析了電網安全穩定控制系統的結構模型,對電網安全穩定控制系統的研究方案做了較為深入的探討,對其決策表的錄入介面程序和決策表的存儲結構進行了較為深入的研究
  17. This thesis also introduces how to use key and key - table distribution in local group to implement end - to - end security

    並與國外同類消息中間件產品的安全系統作了比較。
  18. Applying a similar technique against credit card numbers or social security numbers is no more difficult - it just takes more time and a larger lookup table

    將類似的技術應用於信用卡號或社會保險號也不會困難多少只不過是多花點時間,採用更大的查找表而已。
  19. Ortheogonal table, which has wide applications in experimental design, coding theory and computer security is an importan sort of array structres

    正交表是一類非常重要的數組結構,它在正交實驗設計、編碼理論、計算機安全等領域有著廣泛的應用。
  20. First, by analysing the disadvangtages of the decomposition and recovery algorithm in the usual security model, a new algorithm of double structure tables, which is suitble for master - slaver structure tables, is presented in this paper. second, in resolving the semantic ambiguity and operational incompleteness easily emerged in master - slaver structure tables, an improved master - slaver structure table model and relative decomposition and recovery algorithm are provided. third, considering the merits and demerits of security model, a multilevel secure transaction model is defined on the basis of security model

    本文通過分析以往安全模型的分解和恢復演算法的缺點,提出了一個適合於主從結構表這種雙結構表安全模型的分解和恢復演算法;針對主從結構表安全模型容易產生語義模糊性和操作不完備性等問題,提出了一個改進的主從結構表安全模型,並提出了其分解和恢復可行方法;討論了安全模型的優缺點,定義了建立在安全模型基礎之上的多級安全事務模型,分析了多級事務面臨的眾多難題,提出了一個安全、正確的多級事務調度演算法;根據上述的諸多理論,開發了一個多級安全數據庫管理系統的原型系統。
分享友人