The flow is according with the OS' security theory and the PP theory, inosculating the security function module.
指标制定流程一方面符合系统安全原理,另一方面将PP保护轮廓的产生过程融入到该流程之中。
Secondly it illustrates the most important theory basis in this paper: crisis management theory and nontraditional security theory.
其次引入了论文的两个重要理论基础即危机管理理论和非传统安全理论。
The paper based on the research of industrial security theory and industrial security evaluation, argues that the existing industrial security evaluation have some limited.
本文通过对产业安全理论和评价的研究,认为现有的产业安全评价模型具有一定的局限性。
In this paper, based on provable security theory, a provable security cipher DFC is improved on speed without lost of security by means of fast implementation of square hash function.
介绍基于对称密码系统的可证明安全理论,利用平方哈希函数实现技术,对一种可证明安全算法DFC实施改进后,安全性没有损失,但是速度得到了提高。
It should all work fine in theory. But in practice the guardians of Internet security seem badly to need guarding themselves.
这套程序在理论上没有问题,但实践中这些网络卫士看样子非常需要先保护好他们自己。
And the theory that risk had been dispersed because of securitisation added to the false sense of security.
证券化能分散风险的理论使人们产生了错误的安全感。
The new security council, to be run by Mr Allawi and his Iraqiya party may in theory clip Mr Maliki’s military wings. But no one knows how it will operate.
阿拉维和其“世俗伊拉克”党管理的新安全委员会在理论上可能削弱马利基的军事势力。
A sub-theory is that Litvinenko died not on Mr Putin's direct order, but through a freelance vendetta pursued by current or former security agents.
次级的推测认为利特维年科被杀并非普京直接下令所致,而是现任或前安全人员私人之间的仇杀所致。
"Security" management theory through the study of unsafe behavior, based on the establishment of a system of employee behavior, the mechanism of improving safety performance.
“行为安全”管理理论通过对不安全行为的研究,建立一套基于员工行为的、系统的、改进安全绩效的机制。
The new security council, to be run by Mr Allawi and his Iraqiya party may in theory clip Mr Maliki's military wings.
而由阿拉维先生和他的Iraqiya党运行的新安全理事会理论上会削弱马利基先生的权力。
Due to the absence of evaluation theory, most of the security evaluation is informal, random, and low efficient in practice.
由于当前评估理论的匮乏,导致实际中相当多的安全评估不规范,随意,低效率。
Courses mainly opened such as Regional planning theory and method, Urban security and emergency management, Computer Graphics etc.
主要开设区域规划理论与方法、城市安全与应急管理、计算机制图等课程。
The all-digital holography is based on the optical theory, combined with the strong manipulated ability of the computer, which is applied to the information security fields.
全数字全息术以光学原理为其理论基础,与计算机强大的处理能力相结合,应用于信息安全领域。
Since there are weld defects in welds, using traditional strength theory based on no defect and no crack to design, crane's security in rating load can't be insured.
由于在焊缝部位存在焊接缺陷,采用传统的建立在构件无缺陷、无裂纹基础上的强度理论进行设计计算时,往往不能确保起重机在额定载荷下使用的安全性。
I the store security have also carried on in the theory elaboration regarding the net on and further have given the expansion and the consummation.
我还对于网上商店的安全性进行了理论上的阐述和进一步的予以了扩充和完善。
Empirical philosophy, sociology of law and social thought constitute a defense theory of a common security system of punishment theory and the theoretical basis.
实证哲学、法社会学思想以及社会防卫理论共同构成了保安处分理论和制度的理论基础。
With the deepening of research, security questions, as well as the theory of punishment should be set up security measures in our system of criminal law scholars also discussed extensively.
随着研究的不断深入,保安处分的理论问题以及应否在我国建立保安处分制度在刑法学界也引起了广泛的讨论。
In this paper we will expound the theory basis, function, application, actuality and foreground of PKI security mechanism.
本文对PKI安全机制的理论基础、基本组成和功能、P KI技术的应用以及PKI的现状和发展前景加以论述。
Computing: Quantum cryptography is unbreakable in theory. But like any security system, in practice it is only as safe as its weakest link.
计算:量子密码理论上是无法破解的。但和任何安全系统一样,在实践中其安全度取决于系统里最薄弱的一环。
The security measures of our country is lagging behind action research on action theory and system of security had to be excluded.
我国的保安处分研究相对滞后,对保安处分理论和制度曾一度加以排斥。
The paper combines these factors and introduces information asymmetry into the model to analyze the security price formation mechanism using Game Theory under market maker environment.
文章将把这两方面因素结合起来考虑,把信息不对称引入模型,对做市商市场的证券价格形成机制进行了均衡分析。
The security of QKD is guaranteed by the quantum measurement theory and quantum no cloning theorem.
量子密钥的安全性由量子测量理论和量子不可克隆定理所保证。
In addition, by researching the theory of price elasticity of electric demand in the paper, function of security price is explained from the economic Angle.
此外,基于电力需求价格弹性理论的研究,从经济学角度,本论文对安全电价的意义和作用进行了解释。
Architectural curtain wall security estimation method based on Fuzzy Theory.
基于模糊理论的建筑幕墙安全评价。
It is very important to understand the relationship between price formation mechanisms and security price behavior both in theory and in practice.
理解价格形成机制与证券价格行为之间的关系,无论从理论上还是从实务上来说都很重要。
Based on the principle of new barrel theory, this paper probed into the digital library, strengthen the network security protection measures.
文章根据新木桶理论的原理,探讨了加强数字图书馆网络安全防护的措施。
Through the tests and the analysis result, confirmed that the use of the data mining theory to the security audit analysis is feasible and effective.
通过对测试结果的分析,验证了将数据挖掘理论融入安全审计分析是可行和有效的。
Through the tests and the analysis result, confirmed that the use of the data mining theory to the security audit analysis is feasible and effective.
通过对测试结果的分析,验证了将数据挖掘理论融入安全审计分析是可行和有效的。
应用推荐