首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 185 毫秒
1.
制作帮助文件是应用程序设计中相当重要的一个环节,一个好的应用程序离不开在线帮助,这样使得那些不喜欢读用户手册的用户能借此知道程序的每—步是如何工作的,为了管理和显示帮助文件,Windows专门提供了帮助引擎Win-Help.exe,可见帮助系统的重要性。下面就简单介绍一下帮助文件的制作以及在VB应用程序中的调用。1帮助文件的制作 1)Help文档(*.rtf)的编写 Help文档是用rtf格式编写的(现在有些帮助系统是基干HTML的),利用Word(或其他支持rft格式的编辑器)可以方便的编写He…  相似文献   

2.
本文提出了一种面向光盘文档库的数据组织方案(简称CBCD),并在此基础上实现了光盘文档库的生成系统和浏览系统。文档库生成系统以Internet上丰富的置标文档如SGML、HTML、XML等文档为数据源,通过转换生成光盘档库。同时利用在处理过程中可嵌入用户私有处理的功能来建立用户浏览和检索的支持机制。  相似文献   

3.
本文介绍了多文档界面(MDI)在商业MIS框架生成系统(FGSM)中的应用。重点介绍了FGSM系统程序框架结构及其实现的关键技术。  相似文献   

4.
郭紫薇 《电脑学习》1999,(2):F003-F003
用VC++的AppWizard生成基于文档/视(Doc/View)结构的MFC类库应用程序时,应用程序框架仅提供每一个文档模板对应一个菜单的自动支持。在实际应用中,有时需要在同一文档的不同视(View)中显示完全不同的菜单,由于AppWizard生成的应用程序不直接支持单一文档的多菜单资源,因此需要编程者在应用中添加必要的代码来实现。通过查阅VC++在线帮助文件和相应MFC类库源代码,发现可以利用MFC中一个未公开的虚成员函数CDocument::CetDefuhMnu()来实现同一文档的多个菜单的交替显示。1实现技术当AppWizard生成SDI或MDI应…  相似文献   

5.
论述了从数据库设计文档自动生成关系型数据库结构代码的方法,详细介绍数据库结构自动生成方法的工作原理、工作过程及优点.对数据库设计文档的模板提出了原则性的要求和推荐的格式.详细描述了所开发的数据库结构自动生成工具的特点以及在项目开发中的应用情况.应用表明,该工具能大大提高工作效率,对开发MIS系统等类型的软件有很大帮助.  相似文献   

6.
刘星  蔡勉  李燕  郭颖 《计算机安全》2009,(10):24-26
相对于普通的操作系统,安全操作系统能够为用户提供一个更安全、更可靠的计算机系统的操作平台。对安全操作系统安全功能的测评已经成为了验证其安全性的重要手段。以我国制定的关于信息技术安全性评估的标准(GB/TI8636~2001)为依据,设计了一个针对Linux安全操作系统的测评系统。该测评系统采用关键字驱动机制,更好地实现了操作系统的自动化测评。  相似文献   

7.
UltraPDF是用来制作综合资料演示系统和网上相册的最好工具,它可以把HTML文件(包括其内含的多媒体素材)、PDF文件、JPG图片以及微软Office系统中的DOC(Word文档)、XLS(Execl文档)、PPT(Powerpoint文档)文件制作成一个漂亮的演示文档,既可作为宣传资料又可供朋友们分享,而且操作非常简单,你只需要准备好素材,做好构思,UltraPDF就能在几分钟内帮你把这些素材组织成一套生动的资料演示系统和漂亮的网上相册系统。  相似文献   

8.
1大学英语六级考试难考证的自动生成(一页一张)邮件合并即Word97把来自“数据源”的有关信息加入“主文档”的邮件合并域中,以生成“主文档”的不同版本。邮件合并的过程分三步:(1)建立主文档(主文档包含对每个版本的合并文档都相同的文字和图形,如难考证的正文、格式,它在合并过程中保持不变);(2)建立数据源(数据源包含考生姓名、准考证号、考试地点等可变信息的文档);(3)完成主文档和数据源的合并(即把数据源中的信息插入到主文档中相应的域中)。下面来制作大学英语六级考试准考证:1)建立主文档单击“工具”“邮件…  相似文献   

9.
谭良  刘震  周明天 《计算机科学》2006,33(3):249-251
尽管CC和SSE-CMM均可通过对信息安全产品或系统的开发、评价、使用过程等各个环节实施安全工程来确保产品或系统的安全确信度,但CC和SSE-CMM是两个不同的安全评估标准.文中分别介绍CC和SSE-CMM的结构模型和特点,并对CC和SSE-CMM进行比较分析.最后,针对CC与SSE-CMM具有互补性的特点,提出了将CC与SSE-CMM结合起来开发高确信度信息安全产品或系统的开发方法.  相似文献   

10.
SmarTeam提供工作组(Workgroup)和企业级(Enterprise)的PDM解决方案。不仅帮助设计工程师更有效地完成文档管理,版本管理和跟踪设计数据等任务,还帮助整个企业内部各部门间及时获取最新数据信息,并将CAD系统中生成的数据自动发送到相关的生产车间或采购部门,这样的操作都将作为工程师常规设计过程的一部分。内嵌式浏览能力SmarTeam中内嵌了多种文件格式的直接浏览功能。支持150多种CAD文件、办公自动化文件和光栅格式的浏览,如SolidWorks、AutoCAD、HPGL,M…  相似文献   

11.
本文首先对安全评估标准CC(ISO/IEC15408)的辅助工具CC Toolbox作简单介绍,然后对CC Toolbox的工作流程和操作细节进行了介绍和讲解,最后对CC Toolbox提出了一 点改进设想。  相似文献   

12.
The Common Criteria for Information Technology Security Evaluation standard (CC) promises to replace scattered and often conflicting regional and national security standards. An emerging international standard, it is intended to support developers, evaluators and consumers of security products. The CC provides a framework to rate products by evaluation assurance level (EAL). Each EAL embodies a recommended set of assurance requirements: the higher the EAL, the more secure the product. You can use EALs to pick and choose which assurance requirements you want to satisfy. Think of the EALs as you would think of bandwidth or processor speed. Not everyone in your organization needs a dedicated T3 line or a 450 MHz desktop. Likewise, not every security product you use needs an EAL7 rating. The article shows how you, as a security products consumer, can use the CC to help determine if a given product meets your security needs. By rating different products according to their EALs, the CC can help you comparison shop and select an appropriately secure product. Further, the standard's international scope can help you integrate your system's security components with those in other countries-whether those components belong to customers, vendors, or other divisions of your own enterprise  相似文献   

13.
安全Linux内核安全功能的设计与实现   总被引:12,自引:1,他引:11  
CC标准是一个新的国际标准,由于缺乏可借鉴的范例,开发符合CC标准 的安全操作系统是一项挑战性的工作。借助一项研究实验结合中国安全保护等级划分准则等3条款,讨论了安全Linux内核安全功能在CC框架下的设计与实现问题,通过CC功能需求组件给出安全功能的定义,从系统结构和安全模型方面讨论安全功能的实现方法,并测算安全机制产生的性能负面影响。研究表明,中国国家标准的要求可以通过CC标准进行描述。最后,还指出了安全操作系统进一步的研究方向。  相似文献   

14.
本从主要对协同OA系统信息安全评估及系统安全的建设模型进行深入探讨。文章从系统传输、数据存储、操作平台等方面对协同OA系统信息安全进行了评估、并给出了OA系统的安全体系模型架构以及实施系统信息安全的原则,希求在此基础上为企业的协同办公系统的建设和实施提出较好的解决方案。  相似文献   

15.
吴丹  王志英 《计算机科学》2003,30(11):152-154
The information security evaluation is an important part of information field. It is a general method to execute evaluation to the information security products under the instruction of Common Criteria (CC).A new method of information security evaluation, based on the combination of CC and Systems Security Engineering Capability Maturity Model (SSE-CMM),has been proposed in the paper. The basic idea of this method is using the reference of the security system engineer. Based on the experiment of a Target of Evaluation (TOE)in CC, the evaluation result of security assurance by this new method is proved to be more accurate, more comprehensive and more acceptable.  相似文献   

16.
Building secure systems is difficult for many reasons. This paper deals with two of the main challenges: (i) the lack of security expertise in development teams and (ii) the inadequacy of existing methodologies to support developers who are not security experts. The security standard ISO 14508 Common Criteria (CC) together with secure design techniques such as UMLsec can provide the security expertise, knowledge, and guidelines that are needed. However, security expertise and guidelines are not stated explicitly in the CC. They are rather phrased in security domain terminology and difficult to understand for developers. This means that some general security and secure design expertise are required to fully take advantage of the CC and UMLsec. In addition, there is the problem of tracing security requirements and objectives into solution design, which is needed for proof of requirements fulfilment. This paper describes a security requirements engineering methodology called SecReq. SecReq combines three techniques: the CC, the heuristic requirements editor HeRA, and UMLsec. SecReq makes systematic use of the security engineering knowledge contained in the CC and UMLsec, as well as security-related heuristics in the HeRA tool. The integrated SecReq method supports early detection of security-related issues (HeRA), their systematic refinement guided by the CC, and the ability to trace security requirements into UML design models. A feedback loop helps reusing experience within SecReq and turns the approach into an iterative process for the secure system life-cycle, also in the presence of system evolution.  相似文献   

17.
本文从操作系统的安全功能出发,结合CC标准的测评原理,按照威胁、安全目的、系统安全功能组件和具体指标的顺序,提出一套系统安全测试的全面的指标体系,该指标可根据需要运用层次分析法进行定性或定量的风险评估。  相似文献   

18.
目前煤矿安全生产监控系统已在各大中小型煤矿中广泛应用,但是由于通讯网络还没有连接到上级管理部门,上级管理部门不能实时、准确地了解下属煤矿的实时安全信息,提出针对煤矿安全管理的方案和意见,有可能错过调度决策的有利时机,酿成重大事故。针对这个问题,我们运用计算机网络通讯技术、数据中间件等技术建立了煤矿和上级管理部门的连接,使上级管理部门能够直观、快速地了解下属的煤矿安全信息,为进一步进行管理、决策作出了有力的实时数据支持。  相似文献   

19.
A digital security breach, by which confidential information is leaked, does not only affect the agent whose system is infiltrated but is also detrimental to other agents socially connected to the infiltrated system. Although it has been argued that these externalities create incentives to underinvest in security, this presumption is challenged by the possibility of strategic adversaries that attack the least protected agents. In this paper we study a new model of security games in which agents share tokens of sensitive information in a network of contacts. The agents have the opportunity to invest in security to protect against an attack that can be either strategically or randomly targeted. We show that, in the presence of random attack, underinvestments always prevail at the Nash equilibrium in comparison with the social optimum. Instead, when the attack is strategic, either underinvestments or overinvestments are possible, depending on the network topology and on the characteristics of the process of the spreading of information. Actually, agents invest more in security than socially optimal when dependencies among agents are low (which can happen because the information network is sparsely connected or because the probability that information tokens are shared is small). These overinvestments pass on to underinvestments when information sharing is more likely (and therefore, when the risk brought by the attack is higher). In order to keep our analysis tractable, some of our results on strategic attacks make an assumption of homogeneity in the network, namely, that the network is vertex‐transitive. We complement these results with an analysis on star graphs (which are nonhomogeneous), which confirms that the essential lines of our findings can remain valid on general networks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号