助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   audit analysis 的翻译结果: 查询用时:0.006秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
审计
互联网技术
更多类别查询

图标索引 历史查询
 

audit analysis
相关语句
  审计分析
     Security audit analysis based on feature fusion
     基于特征融合的安全审计分析
短句来源
     Second, it builds a browning for display audit analysis result and the relationship of audit meta objects through visual way.
     同时为审计分析结果构造了浏览器,以可视化的方式来表示审计分析结果,将审计元对象间的关联以网状的形式直观地展现出来。
短句来源
     Based the audit analysis and auto response from CC, it have completed like IDS in kernel.
     本文根据CC中的审计分析和响应要求,在内核层完成了一个类似入侵检测的实时审计分析系统(RAAS)。
短句来源
     This paper gives a better introduction to the concepts,types,statment of the secure_auditing,configuration and audit analysis of INFORMIX Database and shows some practical examples.
     介绍了INFORMIX数据库安全审计的概念、类别 ,安全审计的启动、配置、以及审计分析 ,并利用例子进行了说明
短句来源
     Through the tests and the analysis result,confirmed that the use of the data mining theory to the security audit analysis is feasible and effective.
     通过对测试结果的分析,验证了将数据挖掘理论融入安全审计分析是可行和有效的。
短句来源
更多       
  审计评析
     The Audit Analysis of Financial Fraudulent Practices
     经济舞弊行为的审计评析
短句来源
  “audit analysis”译为未确定词的双语例句
     Compressed Air Compressed Audit Analysis and Optimization Case study in Forge Industry
     铸造工业压缩空气系统节能潜力测试分析及优化案例
短句来源
     After intruducing the security demand from the Computer area, this paper present the designing aim of the Real time Audit Analysis System (RAAS), considering the Trusted Computer System Evaluation Criteria (TCSEC) of US DoD and Common Criteria for IT Security Evaluation (CC).
     本文首先介绍了计算机领域的安全需求,根据美国国防部的可信计算机评测标准(TCSEC)和计算机信息系统的通用安全评价准则(Common Criteria for IT Security Evaluation,CC)中提出的安全操作系统的审计标准,提出本系统的设计目的。
短句来源
     The log is usually stored at the local machine, the capability of storage is limited, and audit analysis is limited to the function of simple inquiry.
     日志一般是限于本机存储,容量有限; 分析审计也仅限于简单的查询等功能。
短句来源
     This paper mainly focus on the construction of the audit system based on host, including getting audit records, analysis of the audit record and browning result of audit analysis.
     本文主要研究如何构造基于主机的审计系统,包括审计记录的获取,审计记录分析方法以及最后的审计浏览。
短句来源
     Systematic log and audit analysis is base of confidentiality damage detection.
     系统安全日志和审核的分析作为保密性检测的基础。
短句来源
更多       
查询“audit analysis”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  audit analysis
The OpenVMS Audit Analysis utility allows you to generate various reports from this data.
      
Last but not least, the post-audit analysis is composed of knowledge inventory, knowledge maps and social network analysis.
      
A multi-dimensional audit trail allows for detailed audit analysis of field force and system.
      


A network security auditing system to a information system is the black box to a plane., It catches more and more attenhons ofthe system administrators.According to Ihe definition of CC criteria, the security audit function requirement includes these families: Security audit automaticresponse, Security audit data generation, Security audit analysis, Security audit review, Security audit event selection and Security audit eventstorage.Following the requirement of CC criteria, we designed...

A network security auditing system to a information system is the black box to a plane., It catches more and more attenhons ofthe system administrators.According to Ihe definition of CC criteria, the security audit function requirement includes these families: Security audit automaticresponse, Security audit data generation, Security audit analysis, Security audit review, Security audit event selection and Security audit eventstorage.Following the requirement of CC criteria, we designed a network security audit system that has the following functions: (1)Monitoring the abnormal operations on the network; (2) Collecting the audit data from the operation system and application system; (3)Real-thoe Alarming; (4) Network Connection Control; (5) Maintenance of Audit records; (6) Rule defining.This network security audit system has a distributed structure, which is composed of an audit center, a group of audit device that act asmonitors on network, and a group of software modular that act as the agents in various systems. It can perform the security audit in networklayer, system layer and application layer.The technique points that are introduced are: Intrusion detecting rules, Audit Protocol and By-pass Control.

首先介绍了计算机网络安全审计的概念、国际上对安全审计的一般认识以及CC标准对信息系统安全功能中的审计功能的定义,然后介绍了一套分布式多层次审计系统的方案及特点,以及在这个审计系统中采用的一些技术和算法。

Audit quality is the soul of the audit.We can control audit quality to some extent by taking up several methods.That is to promote field audit performance to disclose fraud according to audit procedure and appropriate statute,to emphasis on main links such as yearly audit plan,audit writ,audit analysis and group discussion,to adopt station responsibility system,to strengthen assessment and recording,to look into fault cases, to match responsibility,power and benefit,and so on.

审计质量是审计工作的生命。要控制好审计质量 ,必须深化现场审计 ,实事求是地揭露、坚持审计程序和准确适用法律法规 ,必须抓住年度审计计划、审计文书制作、审计复核、集体审议等主要环节 ,必须纳入岗位责任制、加强考核、记载、实行错案追究和责权利相匹配。

This paper gives a better introduction to the concepts,types,statment of the secure_auditing,configuration and audit analysis of INFORMIX Database and shows some practical examples.

介绍了INFORMIX数据库安全审计的概念、类别 ,安全审计的启动、配置、以及审计分析 ,并利用例子进行了说明

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关audit analysis的内容
在知识搜索中查有关audit analysis的内容
在数字搜索中查有关audit analysis的内容
在概念知识元中查有关audit analysis的内容
在学术趋势中查有关audit analysis的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社