In this paper, we define sustainable developing oil and gas resource security system, and set up its evaluation model and evaluation index system.
研究一种用于油气管道安全分布式光纤预警系统的侵入事件识别方法。
These system contracts define the qualities of service that a resource adapter provides for transaction management, connection management, and security (Figure 1).
这些系统契约定义资源适配器为事务管理、连接管理和安全提供的服务质量(图1)。
Use command resource security to ensure that only the queue manager's administrators can modify SYSTEM resources of any kind, such as queues and channels.
使用命令资源安全性确保只有队列管理器的管理员能够修改任何种类的SYSTEM资源,如队列和通道。
These system contracts define the qualities of service that a resource adapter provides for transaction management, connection management, and security (see Figure 1).
这些系统契约定义了资源适配器为事务管理、连接管理及安全提供的服务的质量(参见图1)。
Beneath all the capabilities of the WebSphere Integration Reference Architecture are the management services for security, directory, system management, and resource virtualization.
位于WebSphereIntegrationReferenceArchitecture的所有功能之下的是安全性、目录、系统管理和资源虚拟化的管理服务。
You can do so by limiting access to the commands that can affect them, and also through command resource security. Here are some considerations for SYSTEM resources.
为此,可以限制对可能会影响它们的命令的访问,或者,也可以通过命令资源安全性提供保护。
If in addition to the backstop profile, you define SYSTEM and application profiles, then only resources (such as queues) that match those command resource security profiles can be defined.
如果除backstop配置文件外,还定义了SYSTEM和应用程序配置文件,那么只能定义匹配那些命令资源安全性配置文件的资源(比如队列)。
Whether the security of operating system is determining directly safety of information, thus the control for in system resource use and file system safe become more and more important.
操作系统的安全与否直接决定着信息是否安全,因而系统在文件系统安全方面和在系统资源使用方面的控制就变得越来越重要。
Smart city top-level design is a comprehensive security challenges of data resource system management deficiencies.
智慧城市顶层设计的综合安全挑战是数据资源系统管理缺陷。
In view of resource particularity in wartime information systems of blood security organizations, binary system coding mode and coarse granularity parallel model were adopted.
考虑到血液保障组织系统系统中资源的特殊性,编码方式采用二进制编码,并行模型为粗粒度并行模型。
Intrusion detection is an essential component of information security protection system, which guarantees the security of the network resource.
入侵检测是信息安全保护体系中的一个重要组成部分,确保计算机网络资源的安全性。
Third, we should establish the system of social security in rural areas and pay part of the insurance fees for peasants to realize the social value of cultivated land resource.
实现耕地资源的社会价值,建立农村社会保障体系并根据社会价值量的大小为农民支付部分保险费用。
The techniques need unite network security mechanism and resource recovery mechanism in order to insuring system usability.
网络容灾技术需要结合传统的网络安全机制和资源恢复机制,从多方面确保系统的可用性。
Operating system manages the computer resource directly, which security is the base of the computer system's security.
操作系统是计算机资源的直接管理者,其安全是整个计算机系统安全的基础。
The prototype system shows the project reinforces security of host system, and the resource usages is less, and it is applicable in secret network.
该方案对服务器系统安全有所加强,所占用的主机资源和网络资源较少,适用于针对涉密网等高安全级别的可信系统中。
The research of security analysis needed a systemic security analysis model that was from the system resource and security factor of computer network.
安全性分析研究工作需要把计算机网络与安全相关的系统资源和安全因素抽取出来建立一种面向安全性分析的安全模型。
Currently, virtualization technology has been widely applied to the server consolidation, cluster computing, dynamic resource migration, system security and system development and testing and so on.
目前,虚拟化技术已被广泛应用到服务器管理整合、集群计算、资源动态迁移、系统安全以及系统开发测试等领域。
Based on the demand status of the information resource, analyses the network information security technique and the current status of authentication system.
就信息资源保护的需求现状,分析了当前网络信息安全通常采用的技术以及身份验证技术现状。
Until now, there have appeared more than 40 famous P2P systems, which deal with resource sharing, cooperate computing, instant message and system security.
到目前为止,于P2P相关的著名系统已经超过40个,涉及到了资源共享,协同计算,及时短信服务,系统安全等方面;
Abstract: In wireless telecommunication, in order to protect communication system from monitoring and steal radio resource by illegal intruder, security is a critical issue for any operator.
摘要:无线通信领域中,每个无线通信系统都很重视空中接口的安全性,防止非法者监听或是盗用系统的空中无线资源。
Related to peer - to -peer routing algorithms, distributed index and searches problem, distributed security system problem and resource accessing efficiency problem.
设计到点对点路由运算法则,分布式的索引和搜索功能,分布式安全系统问题,资源访问效率问题。
Using this synchronous method, the system resource was saved, and because the transported signal was not a whole chaotic signal, the security performance of the system was improved.
应用本同步方法不仅可以节约信道资源,同时,由于发送的信号已不是完整的混沌信号,也提高了系统的保密性。
The system used authority management based on resource roles to enhance the security.
在安全方面,系统采用基于资源角色的权限管理,增强了系统运行的安全性。
China water security dynamic model were built up based on the systematical analyses of characteristics and their inter relationship of sub systems of water resource system in China.
运用系统分析的理论与方法,分析了中国水生态系统的特征及各组分间的相互作用,建立了中国水安全动态模型。
In the area of security, system-based resource management role in the competence of management, enhance the operation of the system's security.
在安全方面,系统采用基于资源角色管理的权限管理,增强了系统运行的安全性。
The report also shows some deficiencies in health resource structure and health security system in China.
同时,也反映了中国在卫生筹资结构和医疗保障水平等方面存在的问题。
As water resource is the indispensable material in life and its security is emergent, the development of water security evaluation and assurance system is desiderated so that we can recognize the.
由于水资源是维持生命所必需的物质,其安全保障问题迫在眉睫,因此亟需建立起水安全评价体系及水安全保障体系,通过系统的方法和技术认清水安全形势,探讨保障水安全的措施和方法。
This human resource management system takes on incomparable benefit such as fast search, convenient look up, huge capacity, well security, reliability etc.
本在线申报系统具有手工管理所无法比拟的优点,如:检索迅速、查找方便、存储量大、保密性好、可靠性高、信息透明等。
Section II focuses on the resource base in a systematic analysis, including software development framework for the overall system, database, storage system type and system security;
在第二节着重对本资源库进行了系统的分析,包括系统整体软件开发架构、系统数据库、系统存储类型和系统的安全等;
Section II focuses on the resource base in a systematic analysis, including software development framework for the overall system, database, storage system type and system security;
在第二节着重对本资源库进行了系统的分析,包括系统整体软件开发架构、系统数据库、系统存储类型和系统的安全等;
应用推荐