• Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.

    网络安全目前信息系统应用重要研究方向如何确定用户身份控制用户对信息资源的访问,是其中的一个重要问题。

    youdao

  • As network processor become core hardware in the next generation network device. The research in this paper is security of network information transmission based-on network processor.

    因此网络处理器成为下一代网络设备核心硬件本文研究问题基于网络处理器网络信息传输安全性

    youdao

  • As network processor become core hardware in the next generation network device. The research in this paper is quality and security of network information transmission based-on network processor.

    因此网络处理器成为下一代网络设备核心硬件本文研究问题基于网络处理器网络服务质量网络信息传输安全性

    youdao

  • Based on the in-depth research of network communication and security technologies, this paper builds up a architectural model of cross-area logistics management system.

    论文深入研究网络通信技术安全技术基础上,构建了跨区域物流管理系统框架模型

    youdao

  • In recent years, the study on Internet worms has become one of the most active research topics in the field of network security and information security in the world.

    网络蠕虫研究已经成为近年国际上在网络安全和信息安全领域活跃研究方向之一

    youdao

  • In this paper, using SSL protocol we mainly research on the application of PKI in information security on network.

    PK I技术为基础,应用ssl协议研究PK I技术保障网络信息传输安全上的应用

    youdao

  • It can greatly promote the research on network security and improve the quality of network service.

    对于网络安全领域研究提升网络服务安全性都有重要的意义。

    youdao

  • The technique of intrusion detection based on data mining is a hot research to network security.

    基于数据挖掘入侵检测技术当前网络安全研究一个热点

    youdao

  • With the deep research on network security field and the extensive application of network service, the demand for network attack raw dataset is increasing.

    随着网络安全领域研究深入网络服务广泛应用人们网络攻击数据集需求量逐渐增大。

    youdao

  • Finally, Combined with the design of database system, the paper discusses the data integrity, and does some design and research on system security through information security and network security.

    最后论文结合数据库系统设计论述数据完整性信息安全和网络安全两个方面系统安全性进行了设计研究

    youdao

  • In the end, this paper envisages the other functions of the system as the next step of research focusing mainly on the network platform design, data security, data migration and so on.

    本文最后系统其他功能提出设想,作为下一步研究工作重点主要网络平台上的设计数据安全性、数据的移植性等。

    youdao

  • The research on the security policies of Bank business network system plays an important role in promoting new business, especially in Internet banking's business.

    保障网上银行安全,促进跨国银行业公平竞争,有必要制定有关网上银行业务管理国际统一规则

    youdao

  • Research on Communication Management of the Network Security Project;

    项目沟通管理关系着项目成败

    youdao

  • Research on Communication Management of the Network Security Project;

    项目沟通管理关系着项目成败

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定