The Shentou District Stability and Security Control System is a newly designed and developed Centralized Control System for District Network.
华北神头地区安全稳定控制系统是最新设计、研制的一套集中型区域电网安全稳定控制系统。
From data of accountant to information system of accountant, the paper builds the security control system of corporation accountant in the circumstance of E-commerce.
本文从点(会计数据)到面(会计信息系统)构建了电子商务环境下企业会计的安全控制体系。
HIMA company has long been committed to the development and application of security control system, and in the field has always maintained a leading position in technology.
HIMA公司长期致力于安全控制系统的开发和应用,并在该领域始终保持技术领先地位。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.
如果不谨慎地控制谁对文件系统有写访问权限,用户只需手工编辑配置文件,就可以破坏产品的安全性控制(比如审计)。
The system must provide security and control access to those functions based on permissions.
系统必须提供安全性,并根据相应的权限控制对这些功能的访问。
However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.
不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。
Access control. Enables the system to recognize security policies for groups of users.
访问控制—使系统能够识别用户组的安全性策略。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
Security is also an issue; SimpleDB's access control system is similar to S3's.
安全性也是一个问题;SimpleDB 的访问控制系统类似S3。
Security experts say Stuxnet attacked the software in specialized industrial control equipment made by Siemens by exploiting a previously unknown hole in the Windows operating system.
安全专家称,该病毒通过利用Windows操作系统以前的未知漏洞专门袭击西门子控制设备。
The TCS requires control over the allocation and release of key system resources, including database records, communication sockets, security keys, etc.
TCS要求控制关键系统资源的分配和释放,包括数据库记录、通信套接字、安全密钥,等等。
Do you have a browser or backup utility or security scanner or version-control system that serves you well when it operates on local files?
您拥有在操作本地文件时能很好地工作的浏览器、备份实用程序、安全性扫描程序或版本控制系统吗?
New access-control methods will also be introduced as research into operating system security continues.
随着对操作系统安全性的深入研究,将会引入新的访问控制方法。
Then there's the need to bridge the gap between traditional computer security and research into industrial-control-system security.
还有就是需要将传统方式上电脑安全和研究与工业控制系统的安全联系起来。
The reliable design of control system ensures the security and stability of loading process.
控制系统的可靠性设计保证了装车过程的安全性和稳定性。
Whether the security of operating system is determining directly safety of information, thus the control for in system resource use and file system safe become more and more important.
操作系统的安全与否直接决定着信息是否安全,因而系统在文件系统安全方面和在系统资源使用方面的控制就变得越来越重要。
The industrial control system security market is growing quickly, and now, as part of Belden, we will be able to truly seize the opportunity.
工业控制系统安全市场正在迅速增长,现在,作为百通的一部分,我们将真正能够抓住这个机遇。
More interestingly, if an attacker breaks into the Web server and becomes root, the attacker won't gain control over the whole system — given a good security policy.
更有趣的是,如果一个攻击者攻入了Web服务器并成为root,攻击者不会获得整个系统的控制权——如果有一个好的安全策略的话。
Power system state estimation is the core of electric energy management system and the bases of dispatch, control, security evaluation and so on.
电力系统状态估计是电力系统调度、控制、安全评估等方面的基础,也是电能管理系统的核心组成部分。
By using access control matrix, we can achieve the real time and dynamic control of task, which ensures the system security.
通过引入访问控制矩阵,实现了对任务的实时、动态的控制,从而确保了系统的安全。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.
网络安全是目前信息系统应用的一个重要研究方向,如何确定用户身份以控制用户对信息资源的访问,是其中的一个重要问题。
Through the research, this article has the guiding role to the Shaangu information system safety control, and has reference to the manufacturing enterprise information system security management.
通过研究,本文对陕鼓信息系统安全管理有指导作用,对制造型企业信息系统安全管理有借鉴作用。
Identity authentication as an important means of prevention is the first security system barriers, strengthening teller control, a clear correlation responsibility is of great significance.
身份认证作为事前防范的重要手段,是安全体系的第一道屏障,对于加强柜员制约、明确相关责任具有重要意义。
Consider the effectiveness of the company's internal control system, including information technology security and control.
评价公司内部控制系统的有效性,包括信息技术安全和控制。
Put forward the question of the marketing capital security, and the control system of marketing capital security.
所以,提出营销资金安全这一问题,并对因资金变动而产生的安全问题进行控制。
Industrial control system as the representative of the key infrastructure is a new field of security in recent years, much attention.
工控系统为代表的关键基础设施领域是一个新兴的安全领域,近年来备受关注。
The authentication based on JAAS together with authorization and audit function provided by J2EE application server assure the security control for system.
利用基于JAAS的认证功能和J2EE服务器特有的授权和审计体系,为系统的安全控制提供了保障。
应用推荐