technology audit 中文意思是什麼

technology audit 解釋
科技審核
  • technology : n. 1. 技術,工程,工藝。2. 製造學,工藝學。3. 術語(匯編)。
  • audit : n. 1. 會計檢查,查賬。2. (地主與佃戶間的)決算。vt. ,vi. 1. 檢查,查(賬)。2. 〈美國〉(大學生)旁聽(課程)。
  1. Countermeasures for the serious problems of the financial control over subsidiary companies are to ( 1 ) establish a scientific share holding structure of its subsidiary companies ; ( 2 ) strengthen its control over authorization right of its subsidiary companies ; ( 3 ) establish a scientific budget duty system ; ( 4 ) establish a scientific financial reporting system ; ( 5 ) use modern technology of information and network to establish the financial balance network of business operation, accounting checking network and electronic bank system ; ( 6 ) perfect the target assessing system over its subsidiary companies ; ( 7 ) send financial supervisors to its subsidiary companies ; ( 8 ) strengthen the scheduled or nonscheduled financial audit over its subsidiary companies

    摘要子公司的財務控制問題日顯突出,解決的對策是:建立科學的子公司股權控制結構;加強對子公司進行授權控制;建立科學的責任預算制度;制定科學的財務報告制度;利用現代化的信息網路系統,建立經營業務結算網、會計核算網和網上銀行結算系統;完善對子公司的考核指標體系;向子公司委派財務總監來實現日常的財務監控;加強定期或不定期審計,實現對子公司的財務監督。
  2. Gks. information technology - computer graphics and image processing - graphical kernel system - audit trail

    信息技術.計算機制圖和成像處理.圖形核心系統
  3. Presently, under the condition of applying computerized accounting, handworked audit is still our main method. in addition, the level of the audit theories and practices ca n ' t adapt to the fast development of information technology

    目前,在現代的計算機應用環境下,我國基本上還是沿襲傳統手工審計方式,而國內理論研究和實踐應用水平還不能適應信息技術的迅速發展。
  4. Preference will be given to the candidates who are proficient in putonghua, possess a good working knowledge of operating a computer, and have not less than three years experience in the fields of information technology, project management, accounting, internal audit, engineering or law enforcement

    申請人若能操流利普通話,熟悉電腦操作及具有資訊科技,工程管理,會計,內部稽核,工程或執法等工作經驗達三年或以上者將獲優先考慮。
  5. With the development and progress in social economy, politics and technology, modern audit function has greatly expanded in the fields of independent auditing, government auditing and internal auditing

    隨著社會經濟、政治和科技的發展,現代審計功能在獨立審計、國家審計和內部審計領域都有極大的拓展。
  6. The change object is defined with configuration status management technology, including configuration status identifier, configuration status control, configuration status accounting, and configuration status audit

    用技術狀態管理技術定義變更結果,包括技術狀態標識、技術狀態控制、技術狀態紀實和技術狀態審核。
  7. Log system based on watermark technology it can add watermark in log record, and protect log record ' s originality and unchangeableness. it provides a powerful and undeniable proof for log audit ; 5

    4 、數字水印日誌在日誌中加入數字水印保證日誌的原始性和不可更改性,為日誌審計提供了強有力的不可抵賴的依據。
  8. Our research project is basic condition platform construction project of the national science and technology of the ministry of science and technology. this paper researches the security audit techniques which watch and track actions in network information systems, and develops audit tool software. on the base of technology research, we will constitute technology standards that have own intelligence property, so that we could enhance network recovery capability to protect important computer information systems

    本文課題是科技部國家科技基礎條件平臺建設項目,研究對網路信息系統進行全面監視和對網上行為進行跟蹤的安全審計技術,開發符合信息安全管理需要的審計工具軟體,為構建網路安全信息系統提供技術支持,並在技術研究的基礎上研究制定具有自主知識產權且能與國際接軌的技術標準,以提高國內信息網路防禦能力,保護國家關鍵基礎設施,維護國家事務、經濟建設、國防建設、尖端科學技術等重要領域的計算機信息系統的安全。
  9. Network management is a guarantee of the operation of campus networks. as one of the most important area of network management, accounting management can not only billing the network usage by a person or an organization, but also log and audit the network access in detail, which can be used by performance management, configure management and security management. so it is very important to study and develop the network accounting technology and management policy

    良好的網路管理是保障校園網正常運轉的必要手段,計費管理作為網路管理的一個重要的功能領域,不僅可以計算用戶或單位的網路運行費用,還可以監視和記錄用戶或單位對網路資源的使用情況,為性能管理、配置管理和安全管理提供參考數據,因此校園網路計費技術及管理策略的研究與完善對提高校園網的運行效率及安全狀況,保障各類網路應用的順利開展起到重要作用。
  10. First of all, the thesis introduces traditional security technoloies briefly ; secondly we put forward the preliminary design of diap. dm technology is introduced to mine audit logs, make analysis and make real - time security strategy for administrator. the thesis also introduces multi - agents into the distributed user ’ s environment ; at last, we put forward the detailed test plan which proves that the diap meets the requirements of the system

    論文首先對信息安全技術做了簡要介紹;其次對信息審計平臺作了詳細的系統設計,平臺引入agent和數據挖掘技術,實時挖掘審計日誌,自動擴充規則庫,並闡述了事件agent的構造和agent之間的通訊機制;最後闡述了信息審計平臺關鍵模塊的實現,還對整個平臺的性能做了合理準確的測試。
  11. Intrusion detection system is an active security technology developed in the recent decade, which integrates detection, audit, alert and response function. as an important part in information security mechanism, it supplies a gap for access control and identity authentication, thus becoming a main study area. in this thesis, the various intrusion detection models and detection methods are firstly categorized and studied, merits and defaults of which are discussed in detail, then the intrusion response system and intrusion traceback are studied

    本論文對現有的各種入侵檢測模型和技術進行了系統歸類和分析研究,詳細討論了各檢測分析技術的優點和存在的不足;對入侵響應系統和入侵追蹤技術進行了初步的研究;在研究基於靜態自治代理和移動代理的入侵檢測基礎上,設計了一種基於多代理的分散式入侵檢測與響應系統模型( multi - agent - basedintrusiondetectionresponsesystem , maidrs ) 。
  12. The key technologies, in my research, include how to organize and implement " multi - layered " structures, how to achieve " work flow " in " office automatization ", how to implement the technology on the information communion, encryption and protection, the technology on business guidance and audit, and the technology on the information protection and sharing

    「 oracle分散式數據庫遠程數據的維護和安全性的研究」要解決的關鍵技術有多層次架構的實現與如何組織、工作流技術在辦公自動化中如何實現、信息加密與保護技術的實現、業務監控與審計技術、信息保護和共享技術等地實現是解決這一問題的基本要素。
  13. Keynote speech by mr k c kwong, secretary for information technology and broadcasting at the 14th annual asia - pacific computer audit, control and security conference of information systems audit and control association

    資訊科技及廣播局局長鄺其志在國際資訊系統審計協會主辦的第十四屆亞太區電腦審計、監控與保安研討會上致辭全文
  14. On the basis of systematic analysis of the impact of computer and network technology upon traditional audit theory and practical application, this paper put forward a complete new idea - - - - set up an information system audit based on the combination of information technology especially network technology and audit technology

    本論文較為系統的分析了計算機、網路技術的應用對傳統審計理論和實務的影響,從而提出建立以信息技術特別是網路技術與審計技術相結合的信息系統審計。
  15. Information technology. open systems interconnection. systems management. security audit trail function

    信息技術.開放式系統互連.系統管理.安全審核跟蹤功能
  16. Information technology - open systems interconnection - systems management : security audit trail function

    信息技術.開放式系統互連.系統管理:安全審查跟蹤功能
  17. Information technology - open systems interconnection - systems management - part 8 : security audit trail function

    信息技術開放系統互連系統管理第8部分:安全審計跟蹤功能
  18. It realizes log audit through the filter technology of jsp and interfuses log management and the system

    應用jsp的過濾器技術實現日誌審計,使得日誌管理與系統自身融合在一起。
  19. Information technology, internal audit, accountancy, organization and methods, systems analysis, contract administration, project management, engineering or the management of land or property, or other professional fields

    資訊科技、內部稽核、會計、組織及方法、系統分析、合約管理、項目管理、工程、土地或物業管理、或其他專業范疇。
  20. Guidance for technology audit of fibre optic connector kits and terminated connectors

    光纖連接器組件和終端連接器的技術審核指南
分享友人