network database
- network database的基本解释
-
-
网状数据库
- 相似词
- 更多 网络例句 与network database相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The proportion of rents that firms get depends on their network capability. This reveals the essential relationships between network resource, network rents and network capability: First of all, network rents come from the network resources. Furthermore, network rent is the representative of the competitive advantage and the value of the network resource. Second, network resource is the foundation of the network capability, the function of network capability is activated in the process of using network resource by firm. It enables the network resource to be a potential value resource of the competitive advantage. At last, network capability activates the network rents in the network resource, and make sure that the firm get the additional benefit;(4) the network capability can be classified as: network visioning capability, network constructing capability, network operating capability and network constructing capability. Some factors, such as maturity of IT, openness of culture, management system involved, experience of participation in network, have a positive effect on the network capability of the firm;(5) the impact of network capability on innovation performance is realized through knowledge transfer between network partners, namely, knowledge transfer is the mediator; and (6) the type of innovation network, exporation network or exploitation network, has moderator effect on the relationship of network capability and knowledge transfer, and network capability and innovation performance as well. In the exploration network, network constructing capability has more effect on the performance of the knowledge transfer and innovation. In the exploitation network, network operating capability has more effect on the performance of the knowledge transfer and innovation.
通过对创新网络环境下网络资源、网络租金和网络能力的概念界定和内涵分析,本研究辨析了三者之间以及它们与竞争优势之间的本质关系:首先,网络资源是网络租金的来源,而网络租金是企业竞争优势的表征,也是网络资源的价值体现;其次,网络资源是网络能力的基础,而网络能力在运用网络资源的过程中发挥其作用,实现了网络资源成为竞争优势源泉的内在价值;最后,网络能力激活了蕴涵在网络资源中的网络租金,并确定企业获得这种额外收益的份额,网络租金正是网络能力发挥作用的成果;(4)企业网络能力可以分成网络规划能力、网络配置能力、网络运作能力和网络占位能力四种,本研究的实证结果表明企业的IT成熟度、文化开放度、网络管理体系和网络活动经验都能够正向影响企业的网络能力水平,因而企业可以通过改善上述各种因素的水平来实现提升企业网络能力的水平;(5)企业网络能力对企业创新绩效的促进作用更多地是通过正向影响知识转移实现的,即知识转移在其中起到了中介作用;(6)创新网络的类型,即探索型创新网络和利用型创新网络,分别在网络配置能力和网络运作能力与知识转移之间的关系中,以及在网络配置能力和网络运作能力与创新绩效之间的关系中起到调节作用,在探索性创新网络中,企业的网络配置能力对提升企业获得的知识转移绩效和创新绩效更为重要;而在利用性创新网络中,企业的网络运作能力对提升企业获得的知识转移绩效和创新绩效更为重要。
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
-
Chapter 1 is a preface to introduce the motives of this paper research methods scope restriction and frame Chapter 2 will fist introduce the concept of database and then discuss the necessity of database protection in the creating methods and with or without originality This chapter will put emphasis on the importance of originality to database Chapter 3 will observe the British America and Germany's viewpoint of originality to discuss their legislative mode of database legal protection Chapter will introduce EU Directive/96/9/EC of database protection and four judges of EU Court after the Directive takes effect in 2004 to find how the ECJ use the Directive Then according to the DG Internal Market and Service Working Pater and BEUC's evaluation of the Directive this paper will find whether there is positive reaction and influence in database market after EU member countries take the same legislations with the Directive Section 5 will introduce the legislation of British and Germany following the Directive and analyze the development and questions of the two countries' current legislation Chapter 5 will start with Americas case Feist v Jane Doe to understand the case's influence to American legal protection of databases and introduce the Parliament's proposal after the EU Directive Chapter 6 will introduce Japan legislation regarding legal protection of database works and discuss the goodness and badness through Japan academy and judicial viewpoint Chapter 7 will introduce Taiwan's legislation to find whether current law provides enough and adequate protection to databases and discuss whether there is a necessity of amendment At last this paper will try to provide some suggestions about our legislation Chapter 8 is the conclusion of this paper
第二章首先介绍资料库之概念,并以建置方式与是否具原创性区分方式探讨资料库法律保护之必要性,而因著眼原创性对於资料库法律保护之重要性,便於第三章以比较法独立观察英、美、德国对原创性之观点,以接续探讨三国对资料库所采取之立法途径。第四章部份介绍欧盟资料库保护指令之相关规定,并就指令公布后,欧盟法院於2004年接续作出四个关於资料库保护之判决加以介绍,以期寻求欧盟法院如何运用指令规范中之构成要件,而后并参考欧盟委员会工作小组及消费者组织报告对欧体资料库指令之评估文献,探究欧盟各国采取与指令相同立法后,在资料库市场上是否有正面的回应及影响,并於第五节针对英、德两国跟进欧盟资料库保护指令立法之介绍,并归纳、检讨英、德两国之现行法制之发展与所面临之问题。第五章延续第三章、第四章论述后,进入美国1991年Feist案后,美国法院对国内资料库保护之后续见解,探究1991年Feist案对美国资料库保护之影响程度,同时并述美国於欧体公布资料库指令后国会提出之资料库立法草案。第六章则针对日本新增资料库著作之立法模式加以介绍,并藉由日本学界、实务之见解探讨该立法模式之优缺点,再於第七章进入我国法制之介绍,以观察我国目前之法制是否提供资料库充分的保护,探讨资料库立法之必要性,最后尝试提出我国立法模式之建议。第八章则为总结之论述。
- 更多网络解释 与network database相关的网络解释 [注:此内容来源于网络,仅供参考]
-
network database:网络数据库
1.百度百科上解释为: 网络数据库(Network Database)其含义有三个:①在网络上运行的数据库. ②网络上包含其他用户地址的数据库. ③信息管理中,数据记录可以以多种方式相互关联的一种数据库. 网络数据库和分层数据库相似,
-
network database:网状数据库
而应用于大型数据储存的数据库一般为网状数据库 (Network Database)、关系数据库 (Relational Database) 以及面向对象型数据库 . 此外也有应用在LDAP(轻量级数据访问协议)的树状数据库 (Hierarchical Database).
-
network database:网络式数据库
network control signaling unit 网络控制发信单位 | network database 网络式数据库 | network design 网 络 设 计
-
network database:数据库系统
网络数据库:Network DataBase | 数据库系统:Network Database | 股票查询系统:Stocks Query System
-
NDB Network DataBase:网络数据库
NCUC Network Control Unit Controller 网络控制单元控制器 | NDB Network DataBase 网络数据库 | NDBMS Network DataBase Management System 网络数据库管理系统
- 加载更多网络解释 (6)