And the theory that risk had been dispersed because of securitisation added to the false sense of security.
证券化能分散风险的理论使人们产生了错误的安全感。
The new security council, to be run by Mr Allawi and his Iraqiya party may in theory clip Mr Maliki’s military wings. But no one knows how it will operate.
阿拉维和其“世俗伊拉克”党管理的新安全委员会在理论上可能削弱马利基的军事势力。
It should all work fine in theory. But in practice the guardians of Internet security seem badly to need guarding themselves.
这套程序在理论上没有问题,但实践中这些网络卫士看样子非常需要先保护好他们自己。
The new security council, to be run by Mr Allawi and his Iraqiya party may in theory clip Mr Maliki's military wings.
而由阿拉维先生和他的Iraqiya党运行的新安全理事会理论上会削弱马利基先生的权力。
With the deepening of research, security questions, as well as the theory of punishment should be set up security measures in our system of criminal law scholars also discussed extensively.
随着研究的不断深入,保安处分的理论问题以及应否在我国建立保安处分制度在刑法学界也引起了广泛的讨论。
"Security" management theory through the study of unsafe behavior, based on the establishment of a system of employee behavior, the mechanism of improving safety performance.
“行为安全”管理理论通过对不安全行为的研究,建立一套基于员工行为的、系统的、改进安全绩效的机制。
Empirical philosophy, sociology of law and social thought constitute a defense theory of a common security system of punishment theory and the theoretical basis.
实证哲学、法社会学思想以及社会防卫理论共同构成了保安处分理论和制度的理论基础。
In this paper we will expound the theory basis, function, application, actuality and foreground of PKI security mechanism.
本文对PKI安全机制的理论基础、基本组成和功能、P KI技术的应用以及PKI的现状和发展前景加以论述。
The security measures of our country is lagging behind action research on action theory and system of security had to be excluded.
我国的保安处分研究相对滞后,对保安处分理论和制度曾一度加以排斥。
I the store security have also carried on in the theory elaboration regarding the net on and further have given the expansion and the consummation.
我还对于网上商店的安全性进行了理论上的阐述和进一步的予以了扩充和完善。
Due to the absence of evaluation theory, most of the security evaluation is informal, random, and low efficient in practice.
由于当前评估理论的匮乏,导致实际中相当多的安全评估不规范,随意,低效率。
It is very important to understand the relationship between price formation mechanisms and security price behavior both in theory and in practice.
理解价格形成机制与证券价格行为之间的关系,无论从理论上还是从实务上来说都很重要。
The all-digital holography is based on the optical theory, combined with the strong manipulated ability of the computer, which is applied to the information security fields.
全数字全息术以光学原理为其理论基础,与计算机强大的处理能力相结合,应用于信息安全领域。
Secondly it illustrates the most important theory basis in this paper: crisis management theory and nontraditional security theory.
其次引入了论文的两个重要理论基础即危机管理理论和非传统安全理论。
The security policy is abstractly redefined, and made a new interpretation in noninterference theory.
给出了抽象安全策略的新定义,并用无干扰理论重新进行了解释。
This paper discusses on the problem of information security from message level, and introduces emphatically information theory based cryptology and complexity theory based cryptology.
文章从消息层次上讨论了信息安全问题,重点介绍了信息理论密码学与复杂性理论密码学。
The paper based on the research of industrial security theory and industrial security evaluation, argues that the existing industrial security evaluation have some limited.
本文通过对产业安全理论和评价的研究,认为现有的产业安全评价模型具有一定的局限性。
The paper combines these factors and introduces information asymmetry into the model to analyze the security price formation mechanism using Game Theory under market maker environment.
文章将把这两方面因素结合起来考虑,把信息不对称引入模型,对做市商市场的证券价格形成机制进行了均衡分析。
In addition, by researching the theory of price elasticity of electric demand in the paper, function of security price is explained from the economic Angle.
此外,基于电力需求价格弹性理论的研究,从经济学角度,本论文对安全电价的意义和作用进行了解释。
In behavioral finance theory the investors in the security market are "Bounded rational People", whose irrational behaviors can, less or more, easily to cause behavioral deflections.
该理论认为证券市场中的投资者属于“有限理性人”,其行为或多或少地存在着非理性,因而容易出现行为偏差。
Based on the principle of new barrel theory, this paper probed into the digital library, strengthen the network security protection measures.
文章根据新木桶理论的原理,探讨了加强数字图书馆网络安全防护的措施。
At the end of the paper comments and analysis of the Security Complex Theory are offered.
文章的最后部分将对“复合安全理论”进行评论与分析。
Through the tests and the analysis result, confirmed that the use of the data mining theory to the security audit analysis is feasible and effective.
通过对测试结果的分析,验证了将数据挖掘理论融入安全审计分析是可行和有效的。
The security of these new cryptosystems depends on some NP-complete problems in the theory of Diophantine equations and on the difficulty of large number decomposition.
这些体制的安全性依赖于求解丢番图方程中的一些NP完全问题和大数的素因子分解的困难性。
The security of QKD is guaranteed by the quantum measurement theory and quantum no cloning theorem.
量子密钥的安全性由量子测量理论和量子不可克隆定理所保证。
The author made analysis in the results from both macroeconomic and microeconomic aspects, and make theoretical explanations on Land-for-security policy with the theory of social exchange.
笔者从宏观和微观两个方面对这一结果进行了分析,并结合社会交换理论对土地换保障这一社会政策进行了理论探讨。
Based on the security time limit theory, the calculation method for the consumption amount of the appointed time and some examples of reliability analysis were presented.
基于“安全期限理论”,提出了直升机使用期限消耗量的计算方法,并进行了实例的可靠性分析。
According to its essence of national intervention, finally, this paper points out the limitation of security supervision right and thus lays a theory basis for carrying out the ruling system.
最后,基于证券监管权国家干预的本质指出其固有的局限性,为后文探讨对其进行规制提供了理论依据。
According to its essence of national intervention, finally, this paper points out the limitation of security supervision right and thus lays a theory basis for carrying out the ruling system.
最后,基于证券监管权国家干预的本质指出其固有的局限性,为后文探讨对其进行规制提供了理论依据。
应用推荐