助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   audit techniques 的翻译结果: 查询用时:0.193秒
图标索引 在分类学科中查询
所有学科
审计
计算机硬件技术
更多类别查询

图标索引 历史查询
 

audit techniques
相关语句
  审计技术
     The traditional audit theory structure contains audit purpose,audit postulate,audit concept,audit regulations and audit techniques.
     传统的审计理论结构要素包括审计目的 ,审计公设 ,审计概念 ,审计规则 ,审计技术
短句来源
     At the same time,Information technology not only changed the mode of operation and information flow, but also the audit methods and audit techniques of auditors, both of which changed the nature and the production of audit risks.
     同时,信息技术改变了被审单位的经营方式和信息流程,也改变了审计人员的审计方法和审计技术,这两方面都改变了审计风险的产生和性质。
短句来源
     The research on audit is divided into three sorts: audit markets, audit techniques and audit behaviors.
     审计研究可以分为三类:审计市场研究、审计技术研究和审计行为研究。
短句来源
     The article firstly discusses the audit techniques, and the conflict between prudent principle and cost-benefit principle in audit practice, and then ,through harmonizing the conflict, puts forward two measures to improve audit quality.
     本文从审计技术角度,从审计实践中的职业谨慎原则和成本效益原则的冲突入手,通过对其协调,提出了审计实践中提高审计质量的技术措施。
短句来源
     Finally, the essay presents analysis and research on the function demand of the safety audit, other audit techniques as well as the security log analysis principle.
     最后,本文对安全审计的功能需求和各种审计技术及日志分析原理进行了分析研究,给出了邮件服务器日志分析的具体实现过程和方法。
短句来源
更多       
  “audit techniques”译为未确定词的双语例句
     Study on Kernel-level Security Audit Techniques of Linux System
     Linux系统内核级安全审计方法研究
短句来源
     This paper mainly researches distributed security audit techniques:
     本文对分布式安全审计相关技术进行了研究,主要内容如下:
短句来源
  相似匹配句对
     audit;
     ⑦审计;
短句来源
     Internal Audit Research Based on Concurrent Auditing Techniques
     基于并行审计技术的内部审计应用研究
短句来源
     CASTING TECHNIQUES
     中国有色金属史(九)——铸造技术
短句来源
     security audit;
     安全审计;
短句来源
     ENCRYPTION TECHNIQUES
     加密技术
短句来源
查询“audit techniques”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  audit techniques
The audit should be conducted or led by a person knowledgeable in audit techniques who is impartial towards the facility or area being audited.
      
The audit should be conducted or led by a person knowledgeable in audit techniques and who is impartial towards the facility or area being audited.
      
These audit techniques are outlined in a step-by-step fashion and explained in detail.
      
This new technology and the challenges faced by the control and audit techniques will require that a new framework be adopted for auditing.
      
Table 10.2 presents the specific requirements and the corresponding CEMS performance criteria for each of the three acceptable audit techniques.
      
更多          


Based on paper [6], incentive model design for the Enterprises Contract Management Responsibility System (ECMRS) be discussed deeply in this paper, which include two section SectionⅠ,incentive model of ECMRS,similar to an principle-agency model be set up with per-fect information, and the rule which determine the optimal strategy be give SectionⅡ, the above model be extended by introducing an audit technique as the method of acquiring information, under imperfect infonnation structure.

企业行为诱导模式及策略分析(Ⅱ)雷明(北京大学工商管理学院100871)IncentiveModelDesignandStrategyAnalysisforState-ownedEnterprise(Ⅱ)LeiMing(SchoolofBusines...

With introducting two testing indices of ECMRS,behavior modal of the contract enterprise and the state in ECMRS are in our paper,then two connive models of ECMRS are made by introducing an audit technique as a means of acquiring information Moreover,a general rule which determines optimal strategy with perfect informtion is also given.

SystemAnalysis&IncentiveModelDesignforEnterpriseContractManagementResponsibilitySystem(ECMRS)LEIMing(DepartmentofEconomyManga...

Beginning with the analysis of the computer security and security auditing problems in brief,this paper integrates them with the network systems,and attempts to make a thorough study on the security and security auditing technique of the computer network;finally,a model of the network security auditing system is proposed.

通过对计算机安全和安全审计问题的简要分析,并结合网络系统的特点,力图较系统深入地探讨计算机网络安全及其审计技术;在此基础上,提出了一个网络安全审计模型。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关audit techniques的内容
在知识搜索中查有关audit techniques的内容
在数字搜索中查有关audit techniques的内容
在概念知识元中查有关audit techniques的内容
在学术趋势中查有关audit techniques的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社