The security problems of system design based on Web can be divided into four kinds such as balefully register,logical threats,wilful input and rude permission.
基于Web的系统设计中的安全问题可以分为恶意注册、推理威胁、非善意输入和权限粗陋等四种,解决这些问题的对策有附加码技术、信息隐蔽、强制输入检查和层次式角色等级安全模型。
The concept of UTM(Unified Threat Management)conforms to the trend of integration in security protection.
统一威胁管理(UTM:Unified Threat Management)概念符合安全防护技术一体化、集成化的发展趋势。
Through the use of UTM (unified threat management) products,Use firewall and VPN (virtual private network) technologies to enable SMEs to establish secure system in a unified framework,In less investment costs on the basis of the network to provide comprehensive protection for SMEs.
通过使用UTM(统一威胁管理)产品,利用防火墙和VPN(虚拟专用网)技术使中小企业能够在一个统一的架构上建立安全基础设施,在较少投资成本的基础上为中小型企业提供全面的网络保护。
To change the situation of that all kinds of threats prevail hereinbefore,a design of UTM based on multi-core network processor is discussed mainly.
针对上述网络混合威胁盛行的现状,提出了一种基于多核网络处理器的统一威胁管理(UTM)的设计思想,介绍了UTM的硬件结构设计、多核网络处理器的结构以及UTM软件的体系结构设计,能较好地适应网络环境对高性能以及应用层数据处理的需求。
How to Design and Realize the UTM System;
UTM(统一威胁管理)系统设计与实现
This year, however, Japanese managers faced an even more menacing threat: activist shareholders.
然而,今年日本的管理者面对一个更加险恶的威胁:激进的股东。
Management has threatened to lock out if they do not accept the proposed changes.
管理部门已经威胁要停工,如果他们不接受提议的改变。
The Method of Multi-sensor Management Based on Rough Entropy and Target Threat Degree
基于粗糙熵和目标威胁等级的多传感器管理方法
To threaten by proximity, especially by pursuing closely.
威胁威胁,尤指逼近、紧追不放地威胁
To coerce or inhibit by or as if by threats.
威胁通过威胁或近乎威胁强制或禁止
Take no notice of his threats they're sheer bravado.
别理会他的威胁--完全是虚张声势.
he menaced the bank manager with a stick.
他用木棍威胁银行的经理。
The manager threatened his employee with dismissal.
该经理威胁他的雇员说要解雇他。
Speak the truth, even if it leads to your death.
即使威胁你的生命,也要宣讲真理。
Basketball "Three Threats" Movement Technology Principle Analysis and Research;
篮球“三威胁”动作技术原理分析与研究
The Social Identity Threat from the Perspective of the Social Identity Theory;
社会认同理论视野下的社会认同威胁
Study of Threat Estimation Method Based on Rough Set Theory
基于粗糙集理论的威胁估计方法研究
They parted cordialy enough, although Dick could not bring himself to match Charlie's bluff goodhumour.
他们告辞的时候依然很亲切,尽管迪克吃不消查理那种带有威胁性的好声好气。
without acts or threats of violence, shall be punished in accordance with the provisions of the "Regulations of PRC Governing Punishment for Offenses against Public Order"
未使用暴力、威胁方法的,由公安机关依照《中华人民共和国治安管理处罚条例》的规定处罚。
It is to table to proposal of CWISs’(campus-Wide Information Systems) safety strategies of management,in view of safety menace of CWISs in this article
本文针对目前校园网络面临的安全威胁,提出了校园网网络安全与管理策略。
Acquisition Failure:Protecting Management Benefit or Relieving Economic Security from Threat?--Case Study on Carlyle Acquiring Xugong
并购失败:管理者利益保护还是经济安全威胁解除?——凯雷收购徐工案例研究
the target company defends itself by threatening to take over its acquirer.
被兼并公司通过威胁接管对方来寻求自我保护。
CopyRight © 2020-2024 优校网[www.youxiaow.com]版权所有 All Rights Reserved. ICP备案号:浙ICP备2024058711号