英语人>网络例句>in security for 相关的网络例句
in security for相关的网络例句

查询词典 in security for

与 in security for 相关的网络例句 [注:此内容来源于网络,仅供参考]

Companies without any security at all on their wireless networks make it risibly easy for hackers to break in. Switching on the security that comes with the network technology should be automatic.

无线网没有任何安全措施的公司会让黑客轻而易举地攻破,因此采用网络技术确保安全是必然的;网络公司版权申明:本站网络公司文章均来自网络。

Article 11 If under the circumstances that the valid term of an identity card expires, the citizen's name has changed, or the card is undistinguishable because of a serious damage, a new identity card shall be applied for; where any of the registered items of an identity card is erroneous, the public security organ shall correct it in time and issue a new card; and the old card shall be returned to the public security organ when a new card is issued.

第十一条居民身份证有效期满、公民姓名变更或者证件严重损坏不能辨认的,应当申请换领新证;居民身份证登记项目出现错误的,公安机关应当及时更正,换发新证;领取新证时,必须交回原证。

Through our security analysis, we can find most security related problems. In the future, we can improve our machine's design, and make an inspection manual for voting machine's test based on these potential problems.

透过本研究的安全性分析,我们可以找出大部分的安全问题,做为电子投票机进行细部设计时的改良重点,以及未来进行实体安全测试的验证参考。

In the security technology area, we depend on the acuminous sense and strong technology force, we concentrate on the research and develop security high-tech products, which are the most suitable for the current market.

在安全技术领域,公司依靠敏锐的市场触觉和雄厚的技术力量,致力开发最适合中国市场需要的安防高科技产品。

We will improve the strategy and mechanism for national security, and keep high vigilance againstand resolutely forestall separatist, infiltrative and subversive activities in various forms to safeguard national security.

完善国家安全战略,健全国家安全体制,高度警惕和坚决防范各种分裂、渗透、颠覆活动,切实维护国家安全。

A private security firm, Askar Security Services, is at the centre of the financial scandal under investigation by the commissioner for labour, employment and industrial relations in the Ministry of Gender, Labour and Social Development....

私人保安公司的保安服务阿斯卡尔,处于中心位置的财务丑闻进行调查,劳工处处长就业和劳资关系部在性别、劳动和社会发展

In addition, this thesis also studies the aspects of international relationship, national security, Taiwan history of culture, the interaction and relation of Taiwan Straits, etc and explores the strategies of international political and economical issues and the development of the relations among US, mainland China and Taiwan, the structure of country security, the relation of culture and local though, history evolution and political changes, and the effects of basic doctrinism, the goodness of new government for the people.

本文系藉由相关之研究方法,诠释民进党自建党初期,历经「台湾主权实质独立论」时期、「台湾独立建国论」时期、「革新保台论」至政党轮替前等各时期的大陆政策演变,并从国际关系、国家安全、历史文化、两岸关系与互动等方面,以国际政经与战略、美中台三边关系的发展、国家安全架构、文化与本土思潮、历史演进与政治变迁、基本教义派的影响、新政府的善意表现、连任后的两岸关系与互动以及反分裂国家法对两岸关系的冲击等角度来探讨影响民进党政府大陆政策制定的背景因素。

The grid establish on public Internet which is much open and heteromerous. Except for considering security problem of traditional Internet, lots of new features bringing security problems in the grid computation environment has to be considered, such as users and resources could change dynamicly, process is asked to start when computing, applicate or release resources.

网格建立在开放性、异构性极大的公共网络Internet中,除了考虑传统网络的安全问题之外,还必须考虑网格计算环境中的诸多新特点所带来的安全问题,如:用户、资源动态可变,计算过程可中动态请求启动进程、申请或释放资源等等。

To further enhance the security and connectivity for wireless sensor networks,proposed an improved key management scheme.introduced the scheme,a random key predistribution using multiple key spaces and multipath key reinforcement was based on group-based deployment model which in the paper of du wen-liang.analysis and simulations show that the scheme has lower memory and communication overheads, better ability against attacks besides good security performance.

为了进一步提高无线传感器网络的安全连通性,在分析du wen-liang等人的group-based节点投放模型的基础上,提出了一种改进的密钥管理方案:多密钥空间与多路径增强相结合的随机密钥预分配方案。结果分析表明,该方案需要较少的内存存储空间,不仅提高了系统的连通性,还降低了节点的被捕获概率。

Exchanging security information between reliantly parties, it defines a mechanism for exchanging authentication and authorization information among different systems, Single Sign On is an effective method which implement Integrated authentication and authorization.Base on analyze traditional SSO ,this paper discussed an effective application system using SAML and PKI/PMI technology , which resolved Security information exchange among heterogeneous system through once authentication realize full access. This technology was used successful in the project of "third of CTAIS".

构,它定义了不同系统之间安全服务交换认证和授权信息的机制,单点登录技术SSO是实现集成身份认证和授权服务的有效方法,通过对传统的SSO分析,提出一种基于SAML、利用PKI/PMI的单点登录企业级的应用系统,有效解决跨域系统和异构应用平台的一次认证、全程访问的安全信息交换;成功在&金税三期&资源整合中界面整合及门户项目得到应用。

第27/100页 首页 < ... 23 24 25 26 27 28 29 30 31 ... > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。