Auditing enables the database server to log sensitive operations performed by users and administrators for analysis and identifying system misuses.
审计功能允许服务器记录用户和管理员执行的敏感操作,以便进行分析并识别系统误用。
Redesigned and re-implemented the Log Analysis subsystem of Computer Log Forensic system.
重新设计并实现了计算机日志勘察取证系统日志分析平台。
UE log analysis is one of the key methods of trouble location in WCDMA system test.
在WCDMA系统测试中,分析手机日志是故障定位的重要手段之一。
Event log is one of the most information sources about analysis of fault in modern IT system.
事件日志是现代IT系统中分析和处理故障的重要信息来源。
Log analysis regard as component part of network security defending system, it plays a very important role in the network security.
日志分析作为网络安全防御系统的组成部分,在网络安全中起着重要的作用。
The automatic optimal design system is based on the circuit analysis software-PSPICE. In application, a video log amplifier is designed and the results are presented.
介绍基于PSPICE电路分析程序的自动优化设计系统及其在对数视频放大器设计中的应用和实验结果。
The importance of designing and realizing a FTP log analysis system is stated clearly in this article from the Angle of network security protection.
本文从网络安全防范的角度讲述了设计和实现一个FTP日志分析系统的重要性。
The term "other operations" as mentioned in these Operating Rules refers to the feedback of doubtful information, check of log inquiries, statistical analysis, and system management, etc.
本操作规程所称其他操作是指疑义信息反馈、核查日志查询、统计分析、系统管理等操作。
An exact statistical fit and auto-correction system for neutron log data has been set up with the use of image network statistics, network weighted analysis (algorithm) and fit.
利用图象网络统计、拟合、加权分析技术,提出中子测井资料环境影响校正分析方法和处理模式,建立起精细的统计、拟合自动分析校正系统。
Second, By powerful digital image processing technique, the system analysis dust density when needed, so it change the case in which log parameter in industrial field occurs.
通过对图像的去噪处理和分析识别,由识别的结果有效迅速地对烟尘排放情况进行分析判别。
The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.
系统实现了对数据的分析、处理以及对非法数据的实时发现和显示,同时存入日志,满足了入侵检测系统的基本功能需求。
The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.
系统实现了对数据的分析、处理以及对非法数据的实时发现和显示,同时存入日志,满足了入侵检测系统的基本功能需求。
应用推荐