• Audit network access control and secure remote access systems.

    审计网络访问控制安全远程访问系统

    youdao

  • Network Access Control (NAC) is one of the hottest buzzwords in networking.

    网络接入控制(NAC)现在网络一个非常热门词。

    youdao

  • Authentication and network access control system verifies users legal identity and authorizes network resources access.

    身份认证网络访问控制验证用户合法身份授权网络资源的访问。

    youdao

  • Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.

    入网访问控制保证网络资源被非法使用, 是网络安全防范保护主要策略

    youdao

  • After analyzing the excessive filtering rules, a solution to increase the performance of network access control equipment is proposed.

    分析过量规则网络访问控制设备性能影响,讨论针对这问题的解决方法

    youdao

  • On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.

    基础上提出校园网安全方案重点介绍了网络访问控制端点安全保护、协议分析网络安全监控相关技术

    youdao

  • Central tools store user identity and access control information for the entire network in a single location and provide screens to manage it all.

    中央工具单一位置存储整个网络用户标识访问控制信息提供用于进行全面管理的界面

    youdao

  • The trusted device network approach provides an organization with a higher level of control over critical system access.

    信任硬件网络策略提供了一种可以更高效控制临界系统接入组织结构

    youdao

  • They are responsible for the control of user access to the network.

    他们责任控制用户网络访问

    youdao

  • Information gathered by social network applications needs to be protected by policies which control access to information.

    应该使用控制信息访问策略保护社交网络应用程序收集到的信息。

    youdao

  • Access control can be externalized to a network proxy instead of being performed within the local app.

    访问控制可以外化网络代理,不用再本地应用里执行

    youdao

  • For example, you need to control access to EJBs using a network-safe encrypted token.

    例如需要使用网络安全加密令牌控制ejb访问

    youdao

  • How do we ensure that all people, especially the poor, have access to the global network, have some control of the network, and can gain local benefits from being a part of the network?

    如何保证他们这个网络中占一席之地?也能作为这个网络中的一部分而得到地区性好处?

    youdao

  • Repeat the same process for a control channel adapter for redundancy, but do not select the Access External Network check box.

    对于冗余控制通道适配器重复相同过程但是选中AccessExternalNet work复选

    youdao

  • For example, it's hard to use correctly, root users can still escape from it, and it doesn't control network access at all.

    例如难以正确使用root用户还是可以从中脱离而且根本不去控制网络访问。

    youdao

  • In the center of the diagram in Figure 2 is Tivoli's WebSEAL product, which serves the role of a proxy and provides a security mechanism to control access to documents and Web objects in the network.

    2中心展示TivoliWebSEAL产品产品充当代理角色提供安全机制控制网络中的文档以及Web对象访问

    youdao

  • In the current network-centric business model it is becoming increasingly difficult to validate a person's identity, control access, and maintain integrity and privacy of data.

    当前以网络为中心业务模型中,验证个人身份控制访问维护数据完整性保密性变得越来越

    youdao

  • Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.

    可以通过策略实现安全措施(包括部分网络访问)控制服务质量

    youdao

  • It provides the first layer access control for network access.

    网络访问提供第一访问控制

    youdao

  • Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.

    网络安全目前信息系统应用重要研究方向如何确定用户身份控制用户对信息资源的访问,是其中的一个重要问题。

    youdao

  • It control what users can log on to the server and access control of the cyber source, user access time and network in which workstations.

    控制哪些用户能够登录服务器获取网络资源,控制用户入网时间在哪台工作站入网。

    youdao

  • At last, some key technologies of new generation Internet are discussed, such as access control, trustworthy route, quality of service, multi-homing and network management.

    互联网体系中的接入控制管理可信路由服务质量、多流传输、网络监测管理关键技术进行了研究探讨。

    youdao

  • By the analysis and test of the filter performance of the Internet access control Equitment AR2000, we research how it influence the efficiency and flux of the network.

    通过互联网访问控制设备AR 2000过滤性能分析测试研究网络效率流量影响

    youdao

  • This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.

    在对控制访问列表作用规则作了概括性介绍后,给出应用实例,具体分析了访问控制列表的使用方法,对于网络安全中的应用给了一些建议

    youdao

  • Media Access Control address is assigned to each network device identification number only.

    媒体访问控制地址分配每个网络设备的惟一识别

    youdao

  • Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.

    设置用户存取权限控制冗余备份恢复网络安全等多种安全策略共同建立有机的安全体系

    youdao

  • Based on the system requirement analysis, it designs the main function to finish the network contents access control.

    网络内容访问控制系统进行需求分析设计主要功能模块,完成基本的网络内容访问控制功能。

    youdao

  • Access control is an important component of network security, E-Govment in the protection of information integrity, confidentiality and availability play an important role.

    访问控制网络安全一个重要组成部分,保障电子政务信息完整性保密性可用性方面发挥着重要作用。

    youdao

  • Based on the safety requirement of network environment, the related access control has been researched in this dissertation.

    本文针对网络环境安全需求访问控制进行相关的研究。

    youdao

  • CORBA technique is used in network communication for remote access and control between central control station and monitoring instrument in isomeric environment.

    网络通信采用CORBA技术实现异构环境下中心控制监测仪之间远程访问控制。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定