安全防护技术是列控系统的重要环节。
Safety protection technique is the most important segment of train control system.
随着互联网的飞速发展,网络攻击和安全防护技术日益受到关注。
With the rapid development of Internet, the technology of network attack and safety protection have been paid attention more and more.
文中简要描述安全防护技术内容,讨论了两种典型的安全防护模型。
The paper briefly introduces the safety protection technique, and then, discusses two typical models of safety protection.
入侵检测作为一种积极主动的安全防护技术,对它的研究倍受重视。
As an active technology of security, intrusion detection is the focus of lots of recent researches.
介绍了该次爆破的爆破方案选择、爆破参数、安全防护技术及爆破效果。
The selection of blasting program, blasting parameters, safety protection measures and blasting effectiveness is introduced.
对网络产品进行攻击测技术就是一种主动地行之有效的网络安全防护技术。
Attacking technology of examining to the networking products is a kind of effectual network safe protection technology on one's own initiative.
入侵检测作为一种主动的安全防护技术。提供对内部攻击、外部攻击和误操作的实时保护。
As an active intrusion detection security protection technology, intrusion detection provides internal attacks and external attacks and misuse of the real-time protection.
入侵检测技术作为一种主动的安全防护技术,成为未来网络安全研究中不可缺少的一部分。
Intrusion detection as a proactive security protection technology has become a part of the future network security study.
研究操作系统的安全防护技术,预测分析操作系统的安全行为,是操作系统安全的重要内容。
To study the protection technology and predict and analyze the behaviors of an operating system is the important content of the security of the operating system.
本课题是福建省重点科研项目《信息网络安全防护技术》(项目编号2001H103)的一部分。
Our work is a part of a key research project of Fujian province-Information Network Security Protection Techniques (No. 2001H103).
本文介绍近年来军用激光安全防护技术的新进展,并对激光防护器材的某些特性进行了较详细的叙述。
This paper introduces the new progresses of safe protection technique for military laser in recent years. Some properties of laser protective devices are described in detail.
对于当前混合型攻击层出不穷的安全威胁,传统的基于单一设备的网络安全防护技术己显得无能为力了。
For the current mixed-type attacks on an endless stream of security threats, traditional network security based on a single device protection technology has become powerless.
本文将基于风险评估技术的主动防御策略引入电力信息网络的安全防护中。
This paper introduces the active defense policy based on risk assessment technology into safe protection of electric power information network.
信息安全防护是一个博弈过程,黑客攻击技术魔高一尺,防护技术就道高一丈。
Information security is a process of game, hacking technology MoGaoYiChe, protection technology on a high.
从不同方面讨论了计算机的安全技术,并针对校园网给出了相应的安全防护措施,可以有效地提高校园网的安全性。
This article discusses the safety technique of the computer in different aspects, Can be taken some protective measures aiming at the campus network, raising the safety of the campus network.
同时,还对爆破技术设计和安全防护措施做了简要的介绍。
At the same time, the blasting design and safe protection measures were briefly presented.
最后,结合校园网的实际,根据现有设备条件,运用VLAN技术、NAT技术、路由器访问列表以及流量监控实现了对校园网的基本安全防护。
Lastly, along with campus fact and equipment, using technology of VLAN, NAT, router access-list and network traffic flow monitoring system, we carry out basic security defense of campus network.
描述了低温对人体引起的有关生物效应,生物组织的低温冷藏技术和冷冻手术治疗等技术,以及与这些技术有关的装置及安全防护。
The biological effect of low temperature on the human body, the techniques of cryopreservation and cryosurgery, the related devices and the safe protection are described.
通过介绍液氮注排的工艺技术、安全防护,总结了其技术特点及与其它工艺的联作技术。
According to introduction of its tech and security shelter, its feature and combined tech with others is summarized.
介绍了近年来国内外在电网设施安全防护方面取得的新进展,以及达克罗技术和达克罗涂层、富锌涂料和纳米技术的应用等。
The corrosion protection researches for electric grid system are introduced, including Dacro technology and Dacro coating, zinc-rich coating and application of nano-technology.
介绍了石化企业空分装置安全防护的重要性,技术要求和应注意的问题。
An introduction is given to the importance and technical requirements of accident prevention design for air separation plant in petrochemical industries and some problems to be recognized.
安全区是该公司安全防护中的中介产品的衍生工具,以一个更低的价格提供了建筑设计研究技术。
Secure Zone is a mid-range derivative of the company's Secure Fence, offering its ARaD technology at a lower price.
入侵检测技术是安全审计中的核心技术之一,是网络安全防护的重要组成部分。
Intrusion detection technology is the core technology security audit is one of the important network security components.
木马利用HTTP隧道技术打破网络安全防护设备,给网络安全造成了严重白勺威胁。
Some Trojans use HTTP tunnel to pass through a variety of network security devices, which will pose a serious threat to current network security.
木马利用HTTP隧道技术打破网络安全防护设备,给网络安全造成了严重白勺威胁。
Some Trojans use HTTP tunnel to pass through a variety of network security devices, which will pose a serious threat to current network security.
应用推荐