英语人>网络例句>体系结构 相关的搜索结果
网络例句

体系结构

与 体系结构 相关的网络例句 [注:此内容来源于网络,仅供参考]

Based on the distributed peculiarities of DFP and guiding principles of the access control security of DFP, the access control model of DFP was established.

根据角色的网络资源访问控制的理论,以及统一身份认证的体系结构和功能模型实现了本文的原型系统。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

Chapter 3 dissertates the structure, trust model, security performance and development of PKI, then discusses the correlated technologies of PKI which includes message digest, digital signature, digital time stamp, digital certificate, SSL, SET and IPSec protocol.

首先分析了PKI的体系结构、信任模型、安全性能和发展方向,然后讨论了PKI的相关技术:包括消息摘要,数字签名,数字时间戳,数字证书,SSL协议,安全电子交易(Secure Electronic Transaction,SET)协议,和Internet安全协议(Internet Protocol Security,IPSec)。

The actual sequence of assembly operations is a directed path in the BSN and depended on situated sensory input.

基于行为基元的体系结构是在如何使低级行为完成目标任务方面进行的一种新的尝试。

Software architecture is an independent branch and a new research direction in the field of software engineering.

软件体系结构是软件工程领域的一个独立分支与新的研究方向。

Programming, Discrete Mathematics, Data Structures and Algorithms, Introduction to the Design and Analysis of Algorithms, Operating Systems, Compiler Principles and Practice, Computer Networks, Computer System Architecture, Embedded Systems and Applications, Database Systems and Applications, Formal Language and Automata, Software Engineering, Artificial Intelligence, Introduction to Computer Graphics, Software System Design, Software Project Management, etc.

主干课程:算法分析与设计、面向对象技术与应用、软件项目管理、软件体系结构、软件过程改进、计算机网络技术、网络与信息安全技术、软件测试技术、信息系统分析与设计、软件度量技术、数据库管理技术、软件平台与中间件技术、数据仓库与数据挖掘、软件需求工程、计算机图形学等。研究方向:软件工程与管理、软件理论与系统、信息系统与工程、计算机图形学与辅助设计。

Author discussed some key technology of application system development, software architecture, discreteness technology, XML,Visual Studio.

在系统的研究开发中,作者探索了软件体系结构、组件技术、XML、Visual Studio。

Moreover, the addition of disjointed features leads to a gradual erosion of the architectural vision.

因此,增加脱节的技术特征导致了体系结构观点的逐步腐蚀。

At a word, the aim is: get across information technology to conformity resource for all company, to realize innovation in organization management, operation, service, to distend in lower cost, to buildup ability in anti-risk, to build quick response mechanism and expedite communicate channel, to advance adaptive ability and meet an emergency ability to the circumstance, and construct an attach most importance to clients and oriented to market company system.

简而言之,这个目标就是:整合公司的整体资源,实现组织管理创新、业务创新、服务创新,实现低成本扩张,增强抗风险能力,建立快速反应的运行机制,建立通畅的沟通渠道,提高对环境的适应能力、应变能力,建设以客户为中心、以市场为导向的公司体系结构

On the basis of the investigation of the system's features, the system's essential characteristics are brought forward. Networked, integrative, distributable and cooperative are all included in the characteristics.

在研究了网络化制造环境下装配CAPP特点的基础上,提出了系统的基本特性,即网络化、集成化、分布化和协同化,由此而建立了系统的体系结构

第28/100页 首页 < ... 24 25 26 27 28 29 30 31 32 ... > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。