助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   网络侵犯 的翻译结果: 查询用时:0.504秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

网络侵犯
相关语句
  network intrusion
     This paper first analyzes the status of the network security and points the main types of the network intrusion,then describes the policy for establishing the perfect securi-ty of the enterprise's network through combining an example.
     文章首先分析了网络安全问题的现状,指出了网络侵犯的典型类型,然后结合一个实例描述了建立完善的企业网络安全的策略。
短句来源
  “网络侵犯”译为未确定词的双语例句
     With the development of network,it puts up the new form about infringing the intellectual property right,namely the crime of infringing the intellectual property right on the network,and its harmfulness increases with the progress of the network day by day.
     随着网络的发展,侵犯知识产权犯罪呈现出新的表现形式,即网络侵犯知识产权犯罪,且其危害性随着网络的进步日益增大。
短句来源
     Exploration of Internet's infringe upon adolescent's right
     网络侵犯未成年人权利的民事责任探讨
短句来源
     The Relief and Legal Protection of Violating Commercial Secrets Through Internet
     网络侵犯商业秘密的救济和法律保护
短句来源
     Along with fast developing economy in China, there will be litigations regarding network intellectual property, digital contracts, network-related privacy, computer crimes, thus electronic evidences become more and more important.
     随着我国经济的不断发展,涉及网络知识产权、电子合同纠纷、网络侵犯隐私权、网络与电子商务中的计算机犯罪等民事、行政、刑事案件中也越来越多,电子证据出现的频率越来越高。 因此,对于电子证据的准确定位日益显得重要。
短句来源
     This article analyzed phenomena of cyber violation that include traditional mass media violating copyright of the cyber works,cyber violation of the cyber works and cyber violation of traditional mass media etc.
     分析了网络侵权现象 ,即传统媒体侵犯网络作品、网络侵犯网络作品、网络侵犯传统媒体的著作权等 ;
短句来源
更多       
  相似匹配句对
     Network Data
     网络
短句来源
     NETWORK
     网络
短句来源
     The Crime of Infringing the Intellectual Property Right on the Network
     论侵犯网络知识产权犯罪
短句来源
     The Study of the Survey of Crime of Internet
     侵犯网络罪问题研究
短句来源
查询“网络侵犯”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  network intrusion
Design of a new type of integrated classifier for network intrusion detection systems
      
Based on the analysis of the network intrusion detection model, a new design scheme for the integrated classifier is proposed.
      
Early warning model of network intrusion based on D-S evidence theory
      
Network intrusion detection method based on RS-MSVM
      
A new method called RS-MSVM (Rough Set and Multi-class Support Vector Machine) is proposed for network intrusion detection.
      
更多          


This article analyzed phenomena of cyber violation that include traditional mass media violating copyright of the cyber works,cyber violation of the cyber works and cyber violation of traditional mass media etc.It further proposed the necessity of amending present laws on copyright.It put forward that the amending of present Laws on Copyright must be within reasonable “degree”. Consolidation of protecting the cyber works must be executed with the maximum access of the cyber information.

分析了网络侵权现象 ,即传统媒体侵犯网络作品、网络侵犯网络作品、网络侵犯传统媒体的著作权等 ;提出了修改现行著作权法的必要性 ;探讨修改现行著作权法必须掌握合理的“度” ,在强化网络著作权保护的同时 ,又要使网络信息最大限度地畅通。

With the development and application of Internet/Intranet,computer network plays a very important role in our society.Much larger the network has been scaled,much complexes its topology is.At the same time ,network security has become an urgent problem all over the world.How to protect the intrusion to the Intranet,especially for the enter-prises,must be considered when authors begin to design the network.This paper first analyzes the status of the network security and points the main types of the network...

With the development and application of Internet/Intranet,computer network plays a very important role in our society.Much larger the network has been scaled,much complexes its topology is.At the same time ,network security has become an urgent problem all over the world.How to protect the intrusion to the Intranet,especially for the enter-prises,must be considered when authors begin to design the network.This paper first analyzes the status of the network security and points the main types of the network intrusion,then describes the policy for establishing the perfect securi-ty of the enterprise's network through combining an example.

随着计算机网络技术的飞速发展,计算机网络已经成为人们活动中不可缺少的一部分。网络的规模不断扩大,其拓扑结构也日益复杂。与此同时,网络的安全问题也成为紧迫的问题。特别对于企业而言,如何保护其内部的局域网不受侵犯是规划网络时必须要考虑的问题。文章首先分析了网络安全问题的现状,指出了网络侵犯的典型类型,然后结合一个实例描述了建立完善的企业网络安全的策略。

Drowning in a convenient and speedy net society,youth are also being changed by internet.Being open,hidden and free,net would drive youth lost for morality,which makes net injury tend to be earlier.To youth net injury,the article analyses its enpression and features,puts forward reasons for high rate injury and further raises countermeasures to it.

生活在网络社会的青少年在享受着网络社会的方便与快捷的同时 ,也在被互联网所改变 ,网络的开放性、隐蔽性与无约束性会导致青少年道德失范 ,网络侵犯行为呈现出低龄化的趋势。本文分析了青少年网络侵犯行为的表现及其特征 ,并给出了青少年网络侵犯行为多发的原因 ,进而提出了网络侵犯行为的治理方法。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关网络侵犯的内容
在知识搜索中查有关网络侵犯的内容
在数字搜索中查有关网络侵犯的内容
在概念知识元中查有关网络侵犯的内容
在学术趋势中查有关网络侵犯的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社