助手标题
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
共[108]条 当前为第1条到20条[由于搜索限制,当前仅支持显示前5页数据]
 

相关语句
traditional security
    The Recognizition of Untraditional Security and Traditional Security
    对非传统安全传统安全中几个问题的认识
    We analyze China's security environment from the level of domestic security environment, neighboring security environment, regional security environment and global security environment, and China's objects of security interests from the traditional security and non-traditional security field with the method of "issue field".
    我们运用层次的方法,从国内安全环境、周边安全环境、地区安全环境及全球安全环境四级层次对当代中国面临的安全环境进行了分析,以及运用“问题领域”的方法,从传统安全和非传统安全两个领域对当代中国现实的安全利益和追求的安全利益目标进行了分析。
    Before the Cold War, military security is perpetually the most important security subject, and traditional security stands in the extremely prior status.
    冷战以前,在西方的国际安全理论研究中,军事安全始终是世界各国面临的最重要、最突出的安全课题,传统安全在国家安全中始终处于绝对优先的地位。
    As a kind of active defense technology, intrusion detection technology detects sorts of malicious attacks in time and responds when the net system is endangered. It is a reasonable supplement to traditional security technology such as firewall.
    入侵检测技术作为一种主动安全防护技术,及时地检测各种恶意入侵攻击并在网络系统受到危害时进行响应,它是传统安全技术如防火墙的合理补充,是一种新兴的网络安全技术,也是当前计算机网络安全理论研究的一个热点。
    The intrusion detection is new technology. The traditional security technology include firewall, PKI, encrypt data and identify technology, these are static defense technology. As reinforce of traditional security technology and mechanism, the intrusion detection technology enlarged the depth and levels of the networks security and improved the networks security.
    与其它安全策略及安全技术相比,入侵检测是比较新的技术,传统的安全技术包括物理隔离、防火墙、身份认证、数据加密等都属于静态的防御技术,而入侵检测技术作为传统安全技术和安全机制的补充,具有动态防御的技术特点,它的出现和应用发展扩大了网络安全的保护层次和纵深,增强了网络的防御能力。
    This paper, after researching and analysing the security theories and technologies of traditional security operating system, with the characteristics of the embedded system, puts forward a security kernel frame which is suitable for embedded operating system: ESK_EC(embedded security kernel of Win CE).
    本文在研究分析传统安全操作系统的安全理论和技术的基础上,结合嵌入式操作系统的特点,提出了一种适合于嵌入式操作系统的安全核框架:ESK_EC (embedded security kernel of Win CE)。
    With the development of network commercial affair and network computing technology, the research of security problem is deepened more and more , especially Web services based on XML technology gradually ripe and deploy application in recent years, the traditional security solution (such as PKI technology ) hasn' t met new security needs , the security problem has already become one of the main obstacles that prevent web services from using on a large scale.
    随着网络商务和网络计算技术的发展,对安全问题的研究越来越深入,特别是近年来基于XML的Web服务(Web Services)技术使用的越来越多,传统安全解决方案(如PKI技术)已经不能满足新的安全需要,安全问题也已经成为web服务技术大规模应用的障碍之一。
    As an initiative security defense technology, intrusion detection technology makes up for the weaknesses of traditional security technology.
    入侵检测技术作为一种主动防御型安全技术,弥补了传统安全技术的不足。
    Intrusion detection technology is an active security defensive technology that can overcome the shortcomings of traditional security technology.
    入侵检测技术是一种主动防御型安全技术,可以弥补传统安全技术的不足。
    ON Non traditional Security and the Corresponding Strategy of China
    非传统安全与中国的应对策略
    2. Security kernel architecture. Based on the analysis of the limitations in the traditional security kernel and reference monitor, this paper presents a security kernel architecture supporting dynamical policies.
    2.安全核体系结构 本文在分析传统安全核和引用监视器的作用及其不足的基础上,提出了一种支持动态策略的安全核体系结构。
    The overall capacity of the subject of nontraditional security is not comparable with that of traditional security.
    相对于传统安全,非传统安全威胁的主体和来源一般处于隐蔽的、未知的状态;
    The asymmetry of nontraditional security threat poses a stern challenge to traditional security.
    这种非对称性构成对传统安全的严峻挑战。
    First of all, the meaning and extension of the concept of nontraditional security are derived from the extension of the concept of traditional security.
    非传统安全传统安全之间存在着内在的深刻联系。
    In the post Cold War period, the tri-lateral relations among China, USA and Japan take on the complicated form of interdependence and inter-guardance in the domain of traditional security and non-traditional security.
    后冷战时期,中美日三边关系在传统安全和非传统安全领域呈现相互依存、相互借重、相互防范的复杂态势,中美关系在曲折中发展,中日关系则遭遇历史、领土等问题的困扰而处于停滞状态,而美日联手遏制中国的态势十分明显。
    Energy security is not only associated with traditional security elements, but also intertwined with non-traditional security elements, so energy security is a politics problem ,of which a world international politics and international connection especially.
    能源安全既与传统安全相关联,又与非传统安全因素交织,因而能源安全问题是政治问题,特别是当今国际政治、国际关系中的重大问题。
    In the beginning of Indian indePendance and l950s,fromtraditional poiflt of view,India fulfilled traditional security strategywhich took military straegy as major content, devoted main effOrts tOdeveloping military power,executed offensive defence to Chinadepended on military power chiefly in the respects of nationaldevelopmen and secure defence.
    在独立之初及50年代,印度从传统的安全观出发,实施了传统安全战略。 其传统安全战略又以军事战略为主内容,主要是大力发展军事力量,对华实施“攻势防御”战略。
    Firstly, the thesis introduces the traditional security model and PPDR model, analyses and compares the difference between two models.
    论文首先比较和分析了传统安全模型和PPDR模型;
    In the first part, the author expounds traditional security concept and its limitation.
    第一部分,传统安全观及其局限性。
    Intrusion detection is an active technology for defense, supplies the complement for shortcoming of traditional security technology like firewall, cryptograph.
    入侵检测是一种主动防御技术,它弥补了防火墙、信息加密等传统安全技术的不足。
 

首页上一页12345下一页尾页 

 
CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社