GB/T 33008.1-2016 Translated English of Chinese Standard (GBT 33008.1-2016, GB/T33008.1-2016, GBT33008.1-2016): This Standard specifies the terms and definitions, product specifications, requirements, test methods, inspection rules, marking, packaging, transportation and storage, product accompanying documents of plate-type flue gas DeNOx catalysts. This Standard is applicable for vanadium and titanium NH3 selective catalytic reduction plate-type flue gas DeNOx catalyst [Buy--download True-PDF in 3-second: https://play.google.com/books > Sign in > This BOOK > "3-dots" > Export > Save as "*.pdf"]https://www.chinesestandard.net, 2016/09/24 - 47 ページ This part of GB/T 33008 specifies the network security requirements of the programmable logic controller (PLC) system, including the network security requirements that the PLC communicates directly or indirectly with other systems. This part applies to engineering design party, equipment manufacturers, system integrators, users, and evaluation and certification institutes. |
この書籍内から
検索結果6-10 / 43
6 ページ
このページの内容は閲覧が制限されています.
このページの内容は閲覧が制限されています.
7 ページ
書籍の閲覧制限を超えています.
書籍の閲覧制限を超えています.
8 ページ
書籍の閲覧制限を超えています.
書籍の閲覧制限を超えています.
9 ページ
書籍の閲覧制限を超えています.
書籍の閲覧制限を超えています.
10 ページ
書籍の閲覧制限を超えています.
書籍の閲覧制限を超えています.
多く使われている語句
accepted area boundaries assets audit log audit records Backup Beijing Capability level communication load Confidentiality protection control measures control objectives controller shall provide cryptographic denial of service design and development Emergency power supply Ensure equipment functions GB/T identification and authentication Implement information processing facilities input integrity The PLC malicious code management The PLC mechanisms to protect mobile code mobile devices monitor network and security network security management network security policy network security risk network security technical Non-repudiation operation organization password PLC system network portable and mobile Product System User Programmable logic controller provide the ability Public key infrastructure requirement enhancement risk assessment risk treatment security configuration security incidents Security management requirements security technical requirements session ID software processes storage system network security system requirements system shall provide System User supplier Table B.1 continued Technical vulnerability Technology Unique identification untrusted networks user identifier user person User supplier integrator verify