网络的安全日益引起人们的关注。
入侵检测以及安全日志审核。
伴随信息时代的到来,信息安全日益重要。
The security of information becomes more and more important along with Information Times arrives.
日志模块分为安全日志、调试日志和跟踪日志;
The log module is divided into safe record, debugging record and trace record.
系统对安全日志审核功能也提供了一定的支持。
And the system also provides certain support for the auditing function of security Log.
反过来,这意味着大量的安全日志中的审核条目。
This in turn means a lot of audit entries in the security logs.
美国对东亚能源安全日益关注,其原因引人深思。
The reason why the U. S. is paying increasing attention to the energy security in East Asia is worth thinking about.
跟着信息量的急剧增加,信息安全日益受到人们重视。
With the explosion of information, information security increasingly becomes evident.
此算法会导致安全日志填满,与密码无效的登录尝试。
This algorithm resulted in security logs filling up with "invalid password" logon attempts.
安全日志的分析可以检测可疑行为,并且允许管理员采取行动。
Analysis of the security logs can detect patterns of suspicious behavior, allowing the administrator to take action.
我们通过举办年度全公司安全日,正在加强我们的安全文化。
We are strengthening our safety culture by holding annual company-wide safety days.
以下是安全日志中的绝大部分事件,部分仅仅是域控制器的记录。
Most of the events below are in the Security log; many are only logged on the domain controller.
随着信息与通信技术的飞速发展,信息安全日益受到人们的重视。
With the rapid development of information and communication technology, people attach more importance to the information security.
随着计算机网络的飞速发展,网络安全日益成为不可忽视的问题。
With the development of internet, the security of network is something important for people to think about seriously.
随着计算机网络应用的日益广泛,网络安全日益成为人们关注的焦点。
Along with the computer network applied increasingly extensive, network security becomes a concern focus day by day.
危险作业工作许可证颁发,安全日检,JS A推动和承包商安全管理。
Work permits issue, safety daily inspection, JSA promotion and contractor safety management.
网络安全日志管理中心由转换模块、统计分析模块和策略再配置模块组成。
Network security log management center is made up of transform module, statistics analysis module, and policy reconfiguration module.
这一事件也应该被记录在系统中,还要给管理员发送邮件,将事件写入安全日志。
This event should also be logged in the system, either by sending an email to the administrator, writing the event to a security log, or both.
如果你总是习惯在截止日期前加一个安全日期,那么你的大多数项目都能如期完成。
If you always add a small security gap to your deadlines, most of your projects will be delivered before the agreed deadline.
随着互联网的飞速发展,网络入侵行为日益严重,网络安全日益成为人们关注的焦点。
With the quick development of the Internet, network intrusion behavior becomes more and more serious; network security becomes the focus which people pay attention to.
在信息安全日益严峻的形势下,单一的安全技术和产品已经不能完全满足用户的网络安全。
Since the situation of information security becomes increasingly severe, any single security technique or product cannot completely meet the requirements of users for the network security.
网络安全日益引起人们的重视,而利用缓冲区溢出进行攻击是黑客和病毒较为常用的手段。
Network security has been paid more attention to and hackers often take advantage of buffer overflow to attack other systems or spread virus.
在信息安全日益重要的今天,身份识别技术的研究成为计算机安全领域中的一个重要的研究内容。
Nowadays, authentication technique is becoming an important research content in computer system security field when information security is more important.
所设计的安全机制能够满足网管系统安全性所需要的授权与验证、保密性、完整性、安全日志等要求。
This security mechanism could satisfied all needs a network management system requests on security, such as authorization and verification, confidentiality, integrity and security log.
在比利时布鲁塞尔,欧洲委员会于4月27日组织了欧洲道路安全日,注重于酒精药物与交通、培训以及教育等主题。
In Brussels, Belgium, the European Commission is organizing a European Road Safety Day on 27 April, focusing on the themes of alcohol and drugs in traffic, training and education.
随着互联网技术的日新月异,网络受到了越来越多的各式各样的攻击,网络安全日益受到越来越大的重视。
With the development of Internet technology, network is imperiled by more and more various attacked. People pay more attention to network securities.
网络安全日益为人们所重视,其关键就是缓冲溢出问题,几乎所有的操作系统都避免不了缓冲溢出漏洞的威胁。
The network security takes day by day for the people, its key is the cushion overflow question, the nearly all operating sys- tem could not avoid the cushion overflow loophole threat.
网络安全日益为人们所重视,其关键就是缓冲溢出问题,几乎所有的操作系统都避免不了缓冲溢出漏洞的威胁。
The network security takes day by day for the people, its key is the cushion overflow question, the nearly all operating sys- tem could not avoid the cushion overflow loophole threat.
应用推荐