参考例子
- 1.We involve a variety of synthetic security technologies, such as physical security, network security, application system security, data security and security management.
- 具体应用上涉及了防火墙、入侵检测、虚拟专用网络、网络防病毒、虚拟交换网、密码技术等。
- 2.Base on different applications, the system administrator can put up the security policy. He can set up different security levels, and put different security purviews to different security levels.
- 依据应用场合不同,允许系统管理员进行安全策略配制,即设置不同的安全级别,以及对不同安全级别赋予不同的安全权限。
- 3.1. Base on different applications, the system administrator can put up the security policy. He can set up different security levels, and put different security purviews to different security levels.
- 依据应用场合不同,允许系统管理员进行安全策略配制,即设置不同的安全级别,以及对不同安全级别赋予不同的安全权限。
- 4.The paper trys to excavate the quintessence of Confucianism from the angle of social security system, social security idea and social security tradition.
- 本文试从社保制度体系、保理念和社保传统角度挖掘孔孟社会保障思想中的精髓以为今鉴。
- 5.The Security Law enacted in 1995 has stipulated typical security, however the practice and theory of untypical security is still poor in China.
- 我国1995年制定的《担保法》已对典型担保作了较完善的规定,而非典型担保在理论和实务中尚还薄弱。
网络释义
- heighten security measures
- 加强保安措施;
- preventive security measures
- 保安预防措施;
- get to the security control building and hack the terminal to reconfigure prison building security system
- 到达安全控制室用计算机从终端解除监狱的警报系统。; 到达安全控制室用计算机从终端解除监狱的警报系统文勉熟归识六今吴要。统廿识教起当皆飞岱; 到达安全控制室用计算机从终端解除****的警报系统。; 到达安全控制室用计算机从终端解除狱的警报系统。;
- CHAPTER II FUNCTIONS AND POWERS OF THE STATE SECURITY ORGANS IN THE WORK OF STATE SECURITY
- 第二章 国家安全机关在国家安全工作中的职权;
- The Application of Information Security Risk Assessment is used in the Protection of Bank IT Security System Architecture
- 上一篇论文: 关于风险评估在银行信息安全等级保护体系中的应用;