First, that security depends on a combination of technology and policy; and second, that no system is ever totally secure.
第一,安全依赖于技术和政策的联合体。第二,永远没有完全安全的系统。
The purchase is designed to provide Thales with key technology bricks needed to offer a system of systems capability in maritime safety and security, a Thales spokesman said.
泰利斯公司发言人称,此次购买协议将为泰利斯公司提供关键技术基础,从而在海上安全和保卫方面提供系统之系统能力。
Network services requiring security and availability should benefit from this powerful operating system technology.
需要确保安全性和可用性的网络服务应该会受益于这种强大的操作系统技术。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
To appropriate hardware and software redundance technology and safety chunnel could improve the security of computer system.
采用硬件、软件冗余技术与安全输出通道,可极大地提高计算机系统的安全性能。
This paper make some study to relevant key technology of honeypot, have a certain and positive effect on better arrangement online security defence system.
本文对蜜罐中的相关关键技术做了一些研究,对于更好的布置网络安全防御体系起着一定积极作用。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
The information security guarantee system framework can be divided into the security management framework and the security technology framework.
为了系统地、完整地构建企业信息安全保障体系,应考虑技术体系和管理体系共同构建。
The principle of opening, integration, stability, and security of the system is strictly observed because of the adoption object-oriented technology and multi-language programming technology.
坚持系统的开放性、集成性、稳定性和安全性原则,采用了流行的面向对象技术及多种语言混合编程技术实现。
The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology.
本文介绍的安全电子邮件系统通过信息安全技术对传统的电子邮件系统进行扩展和完善。
The researching key point in the paper is the design and realization of the packet filter technology in individual security defense system.
本文研究的重点是个人安全防御系统中包过滤技术的设计与实现。
Technical constructions of technical prevention are: the use of RFID technology, perfect security system, and the introduction of functional music.
技术性预防方面的技术性建设主要有:运用RFID技术,完善安检制度,引入功能音乐等等。
Consider the effectiveness of the company's internal control system, including information technology security and control.
评价公司内部控制系统的有效性,包括信息技术安全和控制。
It is the advanced network technology in the ERP system, so the information security is important for the ERP system.
ERP系统中运用了先进的网络技术,也正因为如此,ERP系统中信息的安全问题也是ERP系统正确实施而必须解决的问题。
The campus network security system construction be discussed from technology and management in this article.
文章从技术和管理层面讨论了安全校园网系统的建设问题。
With the widely application of the computer network communication technology in the power secondary system, network security problems become more and more striking.
随着计算机网络通信技术在电力二次系统中的广泛应用,网络安全问题越来越突出。
Intrusion Detection System is the next generation of dynamic security technology.
入侵检测系统是新一代的动态安全防范技术。
The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.
通过设置密码和蓝牙技术的安全机制,提供了信息家电网络和远程控制系统的安全保障。
In the information security, the status authentication technology holds the extremely important status, is the information security system first checkpoint.
在信息安全中,身份认证技术据有极其主要的位置,是信息安全体系的第一个关卡。
Attestation technology is the key to security system of e-business.
电子商务安全系统的关键是认证技术。
Security early warning technology and the setting up of the system are described.
阐述了安全预警技术和重大危险源安全预警系统的建立。
The key technology of the network and information security prototype system is studied, the network and information security test platform is introduced, and the testing methods are explained.
主要研究了网络与信息安全原型系统中的关键技术,介绍了网络与信息安全测试平台的组成,阐述了测试方法。
In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.
本文通过CORBA中间件技术,来实现基于策略的安全信息系统,从而解决这一棘手问题。
But the capability of single security technology or security product (security component) is limited, which can only meet specific security need of system and network.
但是,单个安全技术或者安全产品(安全部件)的功能和性能都有其局限性,只能满足系统与网络特定的安全需求。
Some literature named this technology of protection data and prevention of the illegal data accessing as the computer security or the system security technology.
有些文献将这些保护数据、阻挡非法数据访问的技术统称为计算机安全或系统安全技术。
The software infrastructure and information security technology have been summarized to indicate the feasibility of this software system.
同时对软件构架,以及对信息传输安全性等关键技术作了总结,以表明系统实现的可行性。
As a security technology, WLAN intrusion detection technology plays an important role in the security of the WLAN network and system.
WLAN入侵检测技术作为一项安全技术,在保证WLAN的网络和系统安全性上起着非常重要的作用。
In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.
本文从网络安全、病毒防护、主机系统安全三方面对信息系统的安全进行分析,并对实现技术进行了探讨。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
应用推荐