• According to the design requirements of safety technology, the establishment of industrial control information security management platform.

    按照等级保护安全技术设计要求建立工业控制信息安全管理平台

    youdao

  • The information security guarantee system framework can be divided into the security management framework and the security technology framework.

    为了系统地、完整地构建企业信息安全保障体系,考虑技术体系管理体系共同构建。

    youdao

  • Corrigendum 1 - Information technologySecurity techniquesKey managementPart 2: Mechanisms using symmetric techniques.

    勘误表1 - - -信息技术- - -安全性技术- - -关键管理- - -第2部分:使用对称技术机制

    youdao

  • The measures in aspects of management, processes, technology, education and auditing etc were presented to establish a good information security system for a company through their organic combination.

    本文从管理流程技术教育审计方面出发,通过多项措施有机结合,企业打造一个良好信息安全体系

    youdao

  • In addition, this paper suggests the countermeasures in technology and management to remove the hidden danger in the hospitals information security system.

    管理技术角度出发,提出相应的解决方案,消除医院信息系统安全隐患

    youdao

  • Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.

    基于安全系统全面信息安全策略网络安全技术网络安全管理两个层次上研究内部网安全性

    youdao

  • In this paper, the threat to information security, information security technology and information security management of information security for the campus network, where explored.

    本文信息安全威胁、信息安全技术信息安全管理校园网信息安全进行探讨

    youdao

  • The factory did not regularly hold meetings that are attended by senior management to address information technology issues, including system security.

    工厂没有定期举行高级管理人员参加的会议解决信息技术问题包括系统的安全性。

    youdao

  • The company regularly holds meetings that are attended by senior management to address information technology issues, including system security.

    公司定期举办高级管理人员参加的会议解决信息技术问题包括系统的安全性。

    youdao

  • 1 - Information technologySecurity techniquesKey managementPart 2: Mechanisms using symmetric techniques.

    勘误表1 - - -信息技术- - -安全性技术- - -关键管理- - -第2部分:使用对称技术机制

    youdao

  • The open-architecture systems work seamlessly with about 30 technology partners, including video management, access control and physical security information management systems.

    开放式架构系统,且大约30个技术合作伙伴有着密切的合作,包括视频管理访问控制实体安全信息管理系统。

    youdao

  • Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technology.

    确定几种类型安全管理策略防御说明如何利用它们,以确保安全,业务应用信息技术

    youdao

  • Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technology.

    确定几种类型安全管理策略防御说明如何利用它们,以确保安全,业务应用信息技术

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定