The second chapter is about the positivist analysis of the security market in China.
第二章的题目是“我国证券市场与经济增长关系的实证分析”。
At the end of the paper comments and analysis of the Security Complex Theory are offered.
文章的最后部分将对“复合安全理论”进行评论与分析。
Analysis of the security logs can detect patterns of suspicious behavior, allowing the administrator to take action.
安全日志的分析可以检测可疑行为,并且允许管理员采取行动。
According to the analysis of the security demand of multicast communication, a multicast key management scheme based on key matrix is proposed.
该文在分析组播通信安全需求的基础上,提出一种基于密钥矩阵的组播密钥管理方案。
The analysis of the security and complexity of the scheme demonstrates that it has higher security and can satisfy the demands on wireless communication.
对该方案的安全性进行了分析,得出了该方案是一个安全性高、符合无线通信要求的结论。
This paper proposes a new simple trace semantics that can be used to specify security properties, this technique supports a protocol designer to provide formal analysis of the security properties.
本文提出了一种新的简单的迹语义,用于刻画协议部分安全性质,即只针对协议规约的单个主体,此技术支持协议设计者对安全性质进行形式化规约。
Centralizing the implementation of security policies, log analysis and reporting is a good thing.
安全策略、日志分析与报告的中心化实现是个不错的主义。
The sheer amount of data makes the storage, retrieval, and understanding of this information very difficult without a properly designed security event gathering and analysis architecture.
如果没有完善设计的安全性事件收集和分析架构,存储、检索和理解这样巨大的信息量是非常困难的。
In some ways his new book, "Slow Finance", is in the tradition of Benjamin Graham, the founder of modern security analysis.
他的新书《迟缓的金融》在某种程度上完全承袭了本杰明·格雷厄姆,现代安全分析的创始人。
In our previous column, we discussed software security analysis at a high level, introduced a methodology for assessing software security, and explained the key characteristics of a risk analysis.
在上一专栏中,我们从较高层次讨论了软体安全性的分析,介绍了软体安全性的方法,并且说明了风险分析的关键特性。
Security is a multi-faceted problem that requires close analysis of all the vulnerable factors in a business infrastructure.
安全是一个涉及多方面的问题,需要对业务基础设施中所有容易受到危害的因素加以分析。
The focus is on open source technologies, but there are also mentors for Secure software's CodeAssure product line for automated security analysis of software.
集中在开源技术上,而不是检查安全软件的代码保证产品线。
The Internet cookie Report page of the Security Space Web site offers some frequency analysis through associating the cookie names with the server that issues them.
SecuritySpaceWeb网站的InternetcookieReport网页通过将这些cookie的名称和发行它们的服务器联合起来,从而提供了一些频率分析。
Security analysts are often called white hats, and white-hat analysis is the use of hacking for defensive purposes.
安全分析师通常称为白帽(white hat), 白帽分析是为防御目的而使用的密码破解。
Thus begins a studious and academic analysis of the fun, happy, bouncy, up-beat song "Lookin 'Out My Back Door" as it applies to the topic of Web security.
因此,我们首先从适用于Web安全性主题的方面入手,对有趣、愉快、活泼、乐观的歌曲“小心我的后门(LookinOut My Back Door)”进行认真的学术分析。
It is designed to handle the growing demands of enterprise security architecture by using updated cutting-edge analysis and correlation features that were not present in the previous products.
它是专门通过使用最新的前缘分析和相关性分析特性来处理快速增长的企业安全性架构需求,而这些特性是以前的产品所不具备的。
The analysis and design of Security Protocol is always complex and error prone.
安全协议的设计和分析是复杂而且容易出错的。
For Web applications, the most important type of security static analysis is called taint flow analysis.
对于Web应用程序,安全静态分析最重要的类型叫做污染流分析。
The latest is voice risk analysis (VRA), which, among others, Harrow Council in London is testing [font=Arial]as a way of identifying fraudulent claims for social-security benefits[font=Arial].
声音危险性分析(VRA)是最近的技术发明。 和其他此类发明一样,[font=Arial]伦敦的Harrow理事会正在测试一种对社会安全有利的测试说谎的方法[font=Arial]。
The security analysis of two scheme is proposed.
还给出两种方案的安全性分析。
So the analysis and design for efficient security protocol is more important research problem in the field of computer communication.
因此,分析、设计安全有效的安全协议是计算机通讯领域中一个极为重要的研究课题。
Power system security and stability analysis is necessary to the security and stability operation of power systems.
电力系统安全稳定分析是保障电网安全稳定运行的重要环节。
On the basis of analysis of connotation of oil import security and the current situation of Chinese oil import, this paper put forward some security problems in Chinese oil import.
文章在对石油进口安全的内涵及中国石油进口现状进行分析的基础上,指出了中国石油进口中存在的一些安全问题。
The key lies in the completion of data processing, analysis, coupling, the premise of the transfer, and the transmission of data must be built on the basis of information security.
其关键在于完成数据的处理、分析、耦合,其前提在“传递”,而数据的传递须建立在信息安全基础之上。
With the comparative analysis of five typical social security modes Savage, Insurance, Welfare, State security and Self help, the following paper proposes our country's social security modes.
本文通过救助型、保险型、福利型、国家保障型、自助型五种社会保障模式比较分析,提出了我国社会保障模式的构想。
Digital library of the University analysis of the threat to network security, made a series of network security management strategy.
通过对高校数字图书馆的网络安全面临的威胁进行分析,提出了一系列的网络安全管理策略。
The article applies labor market supply-demand analysis as main studying method, analyzing the employment security of the handicapped in China through two aspects of supply and demand.
本论文以劳动力市场供求分析为主线,从供求两方面对我国残疾人就业保障问题进行分析。
Assist to complete each promotion of financial product, and participate in making the security analysis report.
协助完成各项金融产品的推广,并参与完成证券分析报告。
Assist to complete each promotion of financial product, and participate in making the security analysis report.
协助完成各项金融产品的推广,并参与完成证券分析报告。
应用推荐