安全模型是构造安全计算机系统的基础。
Security models lay the groundwork on which the secure computer systems are found.
随着EFI的普及,这将在实现安全计算机系统上具有较好的应用前景。
With the popularity of EFI, this model has a good prospect in achieving security on computer system.
信息安全的利益在于——保护计算机系统和网络——具有其余生俱来的的不可见属性:如果危险已经转移,则一切都会正常工作。
The benefits of information security-protecting computer systems and networks-are inherently invisible: if threats have been averted, things work as normal.
不过,建立一个完全安全、值得信赖的基于“云”的系统或者实际上其它类型的计算机系统是不可能的。
But building a totally secure and reliable cloud-based system, or indeed any other kind of computer system, is impossible.
美国在这方面,有着众多的法律,比如萨班斯法案,健康保险流通与责任法案以及其它的法律,它们都对存储在计算机系统中的数据的安全性有着相应的要求。
There are many laws in effect here in the United States such as Sarbanes-Oxley, HIPPA and many others that require data stored in computer systems to be secured.
权限管理问题一直是计算机系统安全研究和应用的热点之一。
Privilege management is always an important problem of computer system security researches and applications.
采用硬件、软件冗余技术与安全输出通道,可极大地提高计算机系统的安全性能。
To appropriate hardware and software redundance technology and safety chunnel could improve the security of computer system.
Mayank的上一篇文章“使用LinuxLiveCD评估系统的安全性”介绍了LiveCD,还介绍了一些可帮助您评估计算机系统安全性的工具。
Mayank's previous article "assess system security using a Linux LiveCD" looked at LiveCDs that come with tools to help you assess your computer's security.
含有计算机病毒,可能危害计算机系统安全的。
因此,对主机日志的安全保护直接关系到计算机系统的安全。
So, Log's security on host is directly related to the security of computer systems.
医疗设备像其它计算机系统一样,同样很容易出现安全漏洞,从而影响到设备的安全性和有效性。
Medical devices, like other computer systems, are also vulnerable to security breaches, which affect the security and effectiveness of the device.
有关结果对计算机系统的振动安全分析和评估是有益的探讨。
The result obtained provides a useful exploration on the safety analysis and estimation of the computer system under the condition of vibration.
本文讨论了计算机系统的安全问题,重点放在分布式系统和网络的安全方面。
The problem of computer system security is discussed with emphasis on distributed system and computer network security in this paper.
计算机系统和网络的安全是分布式数据库系统安全的基础。
Computer system and network security are basis of security of distributed database system.
加密卡可以为个人计算机系统、网络安全设备提供密码服务,以实现数据的安全存储和网络信息的保密通信。
Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.
针对计算机病毒对计算机系统安全性的影响,给出保证计算机系统安全的措施具有现实意义。
In view of the computer virus influence on computer system security, it has real significance to develop measures to protect computer system safety.
计算机病毒是危极计算机系统安全与完整的一种威胁。
A computer virus is one kind of threat to the security and integrity of computer systems.
计算机病毒是由一系列电脑程序组成的,它对计算机系统的安全性和完整性构成威胁。
Computer virus, whose essential component is a set of instructions, is one kind of threat to the security and integrity of computer system.
该模型以透明计算机系统为基础,利用透明计算技术对计算机内部的安全问题进行控制。
To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.
目前,病毒已成为困扰计算机系统安全和计算机应用的重要问题。
At present, the virus has become the puzzle computer system security and the computer application important question.
桌面安全2010弹出,恶意软件的缩写,是为了不入侵或破坏用户的计算机系统知道该软件。
Security 2010 pop-up, short for malicious software, is the software designed to invade or destroy computer system without the users' knowing.
人们已经提出了一些授权模型,以保证计算机系统的信息安全。
Many authorization models have been proposed to ensure information security of computer systems.
分析了注册表的作用、组成与结构,并就注册表对计算机系统的维护、性能和安全作了一定的探讨。
Analysis the function, composition and structure of registry, and study it about computer system maintenance, performance and security.
你需要配置本地安全策略设置,当你更改计算机系统时要求用户名和密码。
You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.
安全专家不断设计新方法,用以保护计算机系统免于未经授权之人的访问。
Security experts are constantly devising ways to protect computer systems from access by unauthorized persons.
作为网络安全研究的基础,计算机系统脆弱性的发现和应对等相关工作始终是网络安全研究的焦点之一。
As the foundation of the study on network security, how to discover and handle computer system vulnerabilities have always been one of the focuses of the field.
计算机系统安全专业学习计算计算机和网络系统的安全需求。
In this major, you'll learn to calculate the security needs of computer and network systems.
描述了一种具有高网络资源利用率、具有用户移动性和安全性等特点的安全网络计算机系统。
This paper expatiates one kind of secure network computer system which characterizes high usage of network resources, excellent user mobility and security.
描述了一种具有高网络资源利用率、具有用户移动性和安全性等特点的安全网络计算机系统。
This paper expatiates one kind of secure network computer system which characterizes high usage of network resources, excellent user mobility and security.
应用推荐