查询词典 in security
- 与 in security 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
We specialize in information security of Internet users in China and its security work.
我们专业致力于中国互联网用户的信息安全及其安全防护工作。
-
Intrusion detect and protect technology,the one of kernel technology in our distributed firewall system is a new information security technology which could supply a gap of the firewall and the intrusion detect system in the information security domain.
新型分布式防火墙采用的核心技术之一——入侵检测/防御技术是网络安全领域为弥补防火墙及入侵检测系统的不足而新兴的信息安全技术。
-
As a kind of regulating method, the virtual water strategy could increase the water supply for the region in lack of water so as to maintain the regional or national security in the view of water resource and food security.
作为一种调节手段,可增加水资源紧缺地区的水资源供应,从而维护区域或国家的水资源安全和粮食安全。
-
X This line of thinking is more common in the Supreme National Security Council of Iran which is the main body in charge of the security of the Islamic Republic of Iran.
x这想法是比较常见的最高国家安全委员会,伊朗是在对伊朗伊斯兰共和国的安全负责的主体。
-
In contrast to the traditional security concepts and technologies,survivability has become a new direction in network security.
网络可生存性研究是对传统的安全概念和技术的突破,已经成为网络安全研究的新方向。
-
In addition to the criminal standard, the Ministry of Public Security promulgated and implemented the "rental housing provides security management," which calls for rental housing, the main tenant of the basic right of registration, to the police station to record. found inside a rental illegal activities in a timely manner to the police.
除了刑法规范,公安部发布实施的《租赁房屋治安管理规定》,其中要求出租房屋之前,房主要对房客的基本情况进行登记,并向派出所备案,发现出租房内有违法活动要及时报警。
-
Rise and development with the trade of security investment fund,how to use and draws lessons from the fund achievements of the western countries and appraise the system and cany on objective and overall appraisal to the security investment fund of our country rationally,become an important problem put in front of the theory worker and real worker in our country.
随着证券投资基金行业的兴起和发展,如何合理地运用和借鉴西方国家的基金业绩评价体系对我国证券投资基金进行客观全面的评价,成为摆在我国理论工作者和实际工作者面前的一个重要问题。
-
In his address to the annual RSA Conference on computer security held in San Francisco on March 2nd, Art Coviello, president of EMC's security division, noted how civilisation started with barter, then invented coins to make money more portable—even though people still had to carry their wealth around with them physically.
3月2日,在美国旧金山举行的RSA计算机安全的年度会上,EMC安全部的总裁Art Coviello演讲时谈到了人类文明是如何从以物易物的贸易开始,然后发明了硬币以便于携带——尽管当时人们还得随身携带他们的财富。
-
After a study on Chinese financial practice, we find that though Chinese banking system has high cost and low efficiency, one side, Chinese security market has very low efficiency to overcome asymmetric information and has many unsolved problems in short term that brings very high additional cost, so security market is not a good system to substitute the Chinese banking system and must develop after these problems are solved, on the other hand, the cost of Chinese banking system is mainly exogenously produced, the experiences of western commercial banking practice and the joint-stock reform in some Chinese banks have proved that the efficiency of Chinese banking system can be improved. So one of our conclusions is that China should emphases on the reform and development of the banking system.
一方面,本文通过对中国证券市场的进一步分析,发现中国证券市场制度设计上存在严重不合理,短期内仍然缺乏合适的生存环境,这也导致其过去十多年的超常规发展中不仅具有低的效率,而且形成了许多短期内难以克服的缺陷,这充分表明证券市场不应成为我国金融体系短期内的重点方向,证券市场未来的进一步发展必须以这些问题和缺陷的解决为前提;另一方面,进一步的分析表明,我国银行业目前的巨大成本主要为外生,同时,对西方发达国家银行业发展和我国银行股份制改革的经验总结表明,只要在一定的条件下,银行业的效率完全可以有效提高,因而,中短期内我国应重点对银行业进行改革和发展,尤其是要加快银行业的股份制改革进程。
-
The supporting technologies of network information security are summarized. The unitive authentication systems existing are analyzed in this paper; their virtues and shortcomings are discussed.2. About the distributed peculiarities of allied resource, the concept of alliance grid is established. The access control model of alliance grid is established by directive ideas of access control security of alliance grid. AG-RBAC model is set up in the basic of common RBAC, interbedded relations between roles are set forth.
针对制造联盟企业资源分布式的特点,提出了联盟网格的概念;根据联盟网格安全访问控制的指导思想,提出了联盟网格访问控制模型;在一般RBAC模型的基础上提出了基于角色的联盟网格访问控制模型,清晰的表述了角色之间的层次关系;初步分析了AG-RBAC的实现模式,重点讨论了角色定义和权限配置的实现方法。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。