共查询到19条相似文献,搜索用时 185 毫秒
1.
制作帮助文件是应用程序设计中相当重要的一个环节,一个好的应用程序离不开在线帮助,这样使得那些不喜欢读用户手册的用户能借此知道程序的每—步是如何工作的,为了管理和显示帮助文件,Windows专门提供了帮助引擎Win-Help.exe,可见帮助系统的重要性。下面就简单介绍一下帮助文件的制作以及在VB应用程序中的调用。1帮助文件的制作 1)Help文档(*.rtf)的编写 Help文档是用rtf格式编写的(现在有些帮助系统是基干HTML的),利用Word(或其他支持rft格式的编辑器)可以方便的编写He… 相似文献
2.
本文提出了一种面向光盘文档库的数据组织方案(简称CBCD),并在此基础上实现了光盘文档库的生成系统和浏览系统。文档库生成系统以Internet上丰富的置标文档如SGML、HTML、XML等文档为数据源,通过转换生成光盘档库。同时利用在处理过程中可嵌入用户私有处理的功能来建立用户浏览和检索的支持机制。 相似文献
3.
本文介绍了多文档界面(MDI)在商业MIS框架生成系统(FGSM)中的应用。重点介绍了FGSM系统程序框架结构及其实现的关键技术。 相似文献
4.
用VC++的AppWizard生成基于文档/视(Doc/View)结构的MFC类库应用程序时,应用程序框架仅提供每一个文档模板对应一个菜单的自动支持。在实际应用中,有时需要在同一文档的不同视(View)中显示完全不同的菜单,由于AppWizard生成的应用程序不直接支持单一文档的多菜单资源,因此需要编程者在应用中添加必要的代码来实现。通过查阅VC++在线帮助文件和相应MFC类库源代码,发现可以利用MFC中一个未公开的虚成员函数CDocument::CetDefuhMnu()来实现同一文档的多个菜单的交替显示。1实现技术当AppWizard生成SDI或MDI应… 相似文献
5.
论述了从数据库设计文档自动生成关系型数据库结构代码的方法,详细介绍数据库结构自动生成方法的工作原理、工作过程及优点.对数据库设计文档的模板提出了原则性的要求和推荐的格式.详细描述了所开发的数据库结构自动生成工具的特点以及在项目开发中的应用情况.应用表明,该工具能大大提高工作效率,对开发MIS系统等类型的软件有很大帮助. 相似文献
6.
7.
UltraPDF是用来制作综合资料演示系统和网上相册的最好工具,它可以把HTML文件(包括其内含的多媒体素材)、PDF文件、JPG图片以及微软Office系统中的DOC(Word文档)、XLS(Execl文档)、PPT(Powerpoint文档)文件制作成一个漂亮的演示文档,既可作为宣传资料又可供朋友们分享,而且操作非常简单,你只需要准备好素材,做好构思,UltraPDF就能在几分钟内帮你把这些素材组织成一套生动的资料演示系统和漂亮的网上相册系统。 相似文献
8.
1大学英语六级考试难考证的自动生成(一页一张)邮件合并即Word97把来自“数据源”的有关信息加入“主文档”的邮件合并域中,以生成“主文档”的不同版本。邮件合并的过程分三步:(1)建立主文档(主文档包含对每个版本的合并文档都相同的文字和图形,如难考证的正文、格式,它在合并过程中保持不变);(2)建立数据源(数据源包含考生姓名、准考证号、考试地点等可变信息的文档);(3)完成主文档和数据源的合并(即把数据源中的信息插入到主文档中相应的域中)。下面来制作大学英语六级考试准考证:1)建立主文档单击“工具”“邮件… 相似文献
9.
10.
郑为 《CAD/CAM与制造业信息化》2000,(2)
SmarTeam提供工作组(Workgroup)和企业级(Enterprise)的PDM解决方案。不仅帮助设计工程师更有效地完成文档管理,版本管理和跟踪设计数据等任务,还帮助整个企业内部各部门间及时获取最新数据信息,并将CAD系统中生成的数据自动发送到相关的生产车间或采购部门,这样的操作都将作为工程师常规设计过程的一部分。内嵌式浏览能力SmarTeam中内嵌了多种文件格式的直接浏览功能。支持150多种CAD文件、办公自动化文件和光栅格式的浏览,如SolidWorks、AutoCAD、HPGL,M… 相似文献
11.
本文首先对安全评估标准CC(ISO/IEC15408)的辅助工具CC Toolbox作简单介绍,然后对CC Toolbox的工作流程和操作细节进行了介绍和讲解,最后对CC Toolbox提出了一 点改进设想。 相似文献
12.
The Common Criteria for Information Technology Security Evaluation standard (CC) promises to replace scattered and often conflicting regional and national security standards. An emerging international standard, it is intended to support developers, evaluators and consumers of security products. The CC provides a framework to rate products by evaluation assurance level (EAL). Each EAL embodies a recommended set of assurance requirements: the higher the EAL, the more secure the product. You can use EALs to pick and choose which assurance requirements you want to satisfy. Think of the EALs as you would think of bandwidth or processor speed. Not everyone in your organization needs a dedicated T3 line or a 450 MHz desktop. Likewise, not every security product you use needs an EAL7 rating. The article shows how you, as a security products consumer, can use the CC to help determine if a given product meets your security needs. By rating different products according to their EALs, the CC can help you comparison shop and select an appropriately secure product. Further, the standard's international scope can help you integrate your system's security components with those in other countries-whether those components belong to customers, vendors, or other divisions of your own enterprise 相似文献
13.
安全Linux内核安全功能的设计与实现 总被引:12,自引:1,他引:11
CC标准是一个新的国际标准,由于缺乏可借鉴的范例,开发符合CC标准 的安全操作系统是一项挑战性的工作。借助一项研究实验结合中国安全保护等级划分准则等3条款,讨论了安全Linux内核安全功能在CC框架下的设计与实现问题,通过CC功能需求组件给出安全功能的定义,从系统结构和安全模型方面讨论安全功能的实现方法,并测算安全机制产生的性能负面影响。研究表明,中国国家标准的要求可以通过CC标准进行描述。最后,还指出了安全操作系统进一步的研究方向。 相似文献
14.
本从主要对协同OA系统信息安全评估及系统安全的建设模型进行深入探讨。文章从系统传输、数据存储、操作平台等方面对协同OA系统信息安全进行了评估、并给出了OA系统的安全体系模型架构以及实施系统信息安全的原则,希求在此基础上为企业的协同办公系统的建设和实施提出较好的解决方案。 相似文献
15.
The information security evaluation is an important part of information field. It is a general method to execute evaluation to the information security products under the instruction of Common Criteria (CC).A new method of information security evaluation, based on the combination of CC and Systems Security Engineering Capability Maturity Model (SSE-CMM),has been proposed in the paper. The basic idea of this method is using the reference of the security system engineer. Based on the experiment of a Target of Evaluation (TOE)in CC, the evaluation result of security assurance by this new method is proved to be more accurate, more comprehensive and more acceptable. 相似文献
16.
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec 总被引:1,自引:1,他引:0
Siv Hilde Houmb Shareeful Islam Eric Knauss Jan Jürjens Kurt Schneider 《Requirements Engineering》2010,15(1):63-93
Building secure systems is difficult for many reasons. This paper deals with two of the main challenges: (i) the lack of security expertise in development teams and (ii) the inadequacy of existing methodologies to support developers who are not security experts. The security standard ISO 14508 Common Criteria (CC) together with secure design techniques such as UMLsec can provide the security expertise, knowledge, and guidelines that are needed. However, security expertise and guidelines are not stated explicitly in the CC. They are rather phrased in security domain terminology and difficult to understand for developers. This means that some general security and secure design expertise are required to fully take advantage of the CC and UMLsec. In addition, there is the problem of tracing security requirements and objectives into solution design, which is needed for proof of requirements fulfilment. This paper describes a security requirements engineering methodology called SecReq. SecReq combines three techniques: the CC, the heuristic requirements editor HeRA, and UMLsec. SecReq makes systematic use of the security engineering knowledge contained in the CC and UMLsec, as well as security-related heuristics in the HeRA tool. The integrated SecReq method supports early detection of security-related issues (HeRA), their systematic refinement guided by the CC, and the ability to trace security requirements into UML design models. A feedback loop helps reusing experience within SecReq and turns the approach into an iterative process for the secure system life-cycle, also in the presence of system evolution. 相似文献
17.
18.
19.
A digital security breach, by which confidential information is leaked, does not only affect the agent whose system is infiltrated but is also detrimental to other agents socially connected to the infiltrated system. Although it has been argued that these externalities create incentives to underinvest in security, this presumption is challenged by the possibility of strategic adversaries that attack the least protected agents. In this paper we study a new model of security games in which agents share tokens of sensitive information in a network of contacts. The agents have the opportunity to invest in security to protect against an attack that can be either strategically or randomly targeted. We show that, in the presence of random attack, underinvestments always prevail at the Nash equilibrium in comparison with the social optimum. Instead, when the attack is strategic, either underinvestments or overinvestments are possible, depending on the network topology and on the characteristics of the process of the spreading of information. Actually, agents invest more in security than socially optimal when dependencies among agents are low (which can happen because the information network is sparsely connected or because the probability that information tokens are shared is small). These overinvestments pass on to underinvestments when information sharing is more likely (and therefore, when the risk brought by the attack is higher). In order to keep our analysis tractable, some of our results on strategic attacks make an assumption of homogeneity in the network, namely, that the network is vertex‐transitive. We complement these results with an analysis on star graphs (which are nonhomogeneous), which confirms that the essential lines of our findings can remain valid on general networks. 相似文献