基于成本的垃圾信息防御的社区努力。
本文研究信息战对信息安全界的10种影响,斗胆提出信息防御战的10大原则。
The 10 aspects of effects of the Information Warfare (IW)on the Information Security(INFOSEC) World are studied and 10 Principles of the Info-Defensive Warfare are put forward.
提出一个基于深度防御思想的内网信息防御系统,阐述系统组成结构和各作用模块的作用。
This paper first proposes one inner-net information defense system based on the depth defense and elaborates in detail the system composition structure and each module function.
讨论了航母编队电子信息装备现状和防御能力,重点分析了其电子信息防御能力的薄弱环节。
The electron information equipment and defence abilities of the aircraft carrier fleet are discussed, and the weakness of electron information defence is mainly analyzed.
深度防御也可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵您的机器的问题。
Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.
法国和科威特之间的战略防御协议涵盖了信息,协助,培训和设备交流等范围,并对1992年8月18日签署的协议进行了扩展。
The strategic defense agreement between France and Kuwait covers exchange of information, assistance, training and equipment, and extends a previous accord signed Aug. 18, 1992.
有了这些信息,就可以检查这些漏洞并进行防御。
With this information in hand, you can then check these vulnerabilities and defend against them.
宙斯盾弹道导弹防御系统利用远程传感器预先提供的实时信息,由舰载SPY-1雷达捕捉入侵弹道导弹,并发射了一枚标准导弹进行拦截。
The Aegis BMD system fired a Standard Missile using real-time information from a remote sensor prior to the shipboard SPY-1 radar acquiring the inbound ballistic missile.
Lynn同时也反驳说美国的电子信息运作是防御性的,绝非进攻性的。
Mr Lynn said the Department of Defense Strategy for Operating in Cyberspace was defensive, countering earlier criticism that the strategy might be too aggressive.
在这种新型信息战中,进攻战术通常是机密的,但是防御方法是经常讨论、辩论和关注的课题。
In this new kind of information warfare, offensive tactics most often are classified, yet defensive approaches are the subjects of much discussion, debate, and attention.
这项计划由美国AFRL信息和情报开发分部的信息处理部门管理,该分部也参与了AFRL计算机防御免疫系统(CDIS)的工作。
This program is managed by the U.S. AFRL Information Handling branch within the Information and Intelligence Exploitation Division as part of the AFRL Computer Defense Immune System (CDIS) initiative.
同时实现这两层防御之后才能支持第三层防御:因为在运行构建时,会收到关于这些不匹配情况的诊断信息。
Together these two defenses allowed a third layer of defense in that, when running builds, we received warning diagnostics about such mismatches.
大家或许听说,信息安全专家也曾测试过公司的防御系统通过下面的方式,把一个感染病毒的U盘丢落一旁,看看是否有人由于好奇心去捡起它。
Security experts have also been known to test a company's defences by leaving infected USB sticks lying around and seeing whether anyone picks them up out of curiosity.
尤具价值的是SKYPE的聊天功能不仅加密而且只在信任的人中进行,所以是对付垃圾信息的最有效防御。
Of particular value is the fact that Skype chats are not only encrypted but work only between people who trust each other—the best possible defence against spam.
Jackson说,人们考虑过被数据跟踪的事,并考虑过保护个人信息不被网上营销公司侵犯,虽然这些公司本质上自己也没有任何防御措施。
People concerned about data tracking and protecting their personal data from being poached by online marketing firms are essentially defenseless as well, Jackson says.
如果你生活的周围没有医生,互联网可以提供如何防御疾病或如何养育孩子并使之健康的信息。
It provides health information on how to avoid diseases or raise healthy children if you don't live near a doctor.
故障诊断和产业强化:研发一种诊断计划以解决漏洞攻击,强化产业防御能力。Detica将在2011年欧洲信息安全会议上对这项服务进行展示。
Remediation and estate hardening: develops a remediation plan to address the vulnerabilities exploited and harden the estate against repeated attacks.
在信息安全问题日益突出的互联网中,入侵检测技术以其主动防御的特性,得到越来越广泛的重视和应用。
Information security problem is one of the key problems in modern Internet. by active defending feature intrusion detection technology is widely recognized and applied.
身份认证与访问控制是信息系统防御主动攻击的主要安全机制。
Identity authentication and access control are the major security mechanisms to defend active attack.
植物能够对光照做生物学‘计算’,利用光照的信息来建立自身防御系统抵抗当季的流行疾病。
So the plants perform a sort of biological light computation, using information contained in the light to immunize themselves against diseases that are prevalent during that season.
本文将基于风险评估技术的主动防御策略引入电力信息网络的安全防护中。
This paper introduces the active defense policy based on risk assessment technology into safe protection of electric power information network.
本文分析了通过网络窃取桌面信息的一般流程,有针对性地提出了一种防窃密桌面防御系统。
This paper analyzes the common procedure of stealing information and accordingly represents the general design of a desktop defense system protecting information from being stolen.
消极防御只能被动挨打,单纯依靠封堵现有的系统漏洞不能从根本上解决信息安全问题。
Negative defense will only lead to be attacked and only depending on sealing off the existed system leaks can't solve information security problems.
为了更好地研究心理战防御,需要首先对信息损伤的特点进行研究。
In order to research the defence of psychological warfare better, we need to understand what is characteristics of information trauma.
当前针对存储安全问题的信息安全防御出现了两极分化。
Current information security defense for security issues of the storage appeared polarization.
战术信息分发系统是末端防御防空导弹组网作战系统的重要组成部分,是末端防御防空导弹组网作战各系统实现互连、互通、互操作的关键。
Tactical Information Distributed System is a very important part of End Defense Air-Defense Missile Netting Operational System, and it is the key to realize the communication in the every part.
菲利普·科尔,华盛顿特区防御信息中心高级顾问说道,主要的障碍是如何承受摄像机和卫星电话的重量。
Philip Coyle, senior adviser with the Center for Defense Information in Washington D. C., said a major hurdle would be enabling the vehicles to carry the weight of cameras and microphones.
网络信息安全防御体系是近年来信息安全领域探讨的一个重要问题。
The network information security defensive system is a important problem in information security domain for recent years.
信息时代的到来需要计算机安全防护由被动防御转向主动,因此基于欺骗的网络安全策略日益受到重视。
Regaining the initiative of computer safe protection is required for Information Age. People pay more attention to network security tactics based on cheating technology.
信息时代的到来需要计算机安全防护由被动防御转向主动,因此基于欺骗的网络安全策略日益受到重视。
Regaining the initiative of computer safe protection is required for Information Age. People pay more attention to network security tactics based on cheating technology.
应用推荐