网络信息安全技术、信息安全协议、P 2 P技术成为网络隐私安全保护的有效手段。
Data security technology, data security protocols and P2P technology are the effective measures for Online Privacy protection.
网络信息安全技术一般包括身份认证、授权控制、审计、数据保密和数据完整性等几个方面。
The network information security technique commonly includes authentication, authorization, audit, data privacy, data integrity and so on.
李东,男,1967年生,教授,主要研究领域为网络信息安全技术,并行计算,计算机系统结构,计算机图形学等。
LI Dong, born in 1967, professor. His research interests include computer network security, parallel computing, computer architecture, and computer graphics.
通过对IDMAS原型系统的分析与设计,对ID MAS有了更深刻的理解,并且证明了ID MAS在当前网络信息安全技术中的作用。
By IDMAS prototype realization, I have a more profound understanding of IDMAS, and proved that IDMAS in the current network information security technology in the role.
该协议涵盖企业安全,并呼吁支持信息技术服务,对新出现的网络威胁和网络入侵提高认识。
The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
研究提出海关信息系统及网络安全技术方案并组织实施。
To study and put forward technical plans for customs information system and network safety and organize implementation accordingly.;
阿联酋的监管官员称,黑莓的专用网络,和先进的加密技术使该手机经因特网发送的信息安全得过了头。
The UAE's regulators say the BlackBerry's proprietary network and tight encryption make messages the devices send over the Internet too secure.
他们能提供宽带技术传输信息,而且罗克韦尔的密码技术将保证网络信息传输的安全。
They would provide the broadband expertise to move that information and Rockwell's cryptographic solutions would ensure the information is secure as it moves across the network, Caslavka says.
与过去相比,信息技术的日趋复杂会让我们在保护企业网络安全的时候遇到更多的困难。
Compared with the past, the increasing complexity of information technology will make us more difficult to protect the security of enterprise network.
其他网络和信息设备安全技术要求等。
Other network and information equipment security technical requirement etc.
因此,网络安全技术的研究已成为现在计算机和通信界的一个热点,并且成为现在信息科学的一个重要研究领域。
Therefore, the research of Internet security technique has been one of focuses in the communication and an important research area of the information science.
仅在过去的五年里,像是健康信息技术、网络安全、地理空间系统这些新的职业领域在几十年前甚至不存在。
Just in the last five years, new careers in fields like health information technology, cyber security, geospatial systems, these are fields a decade ago didn't even exist.
计算机和互联网技术正在改变着人类社会的面貌,与之伴随而来的是信息和网络安全的问题。
The computer and Internet technology are changing the appearance of the human society; it is the question of information and online security with its one that followed.
随着信息时代的到来和网络技术的广泛应用,人们对安全性的要求越来越高。
With the information age arrival and network technology broad application, people's requirement for security is higher and higher.
随着计算机与网络技术的广泛应用,数据库安全技术已成为信息安全的重要研究领域。
With the proliferation of computer and network techniques, database security has become an important research area of information security.
随同着网络技术和多媒体技术的飞速发铺,如何维护多媒体信息和数字产品安全的题目已经成为世界各国极为关注的主要课题。
With the fast development of internet and multimedia, how to protect the information of multimedia and digital products has already been an important issue cared by all the countries in the world.
随着计算机信息技术与网络技术的迅猛发展,信息与网络的安全形势也日趋严峻和复杂化。
By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.
本文主要研究的内容是网络信息的探测技术和建立在信息探测基础上的安全评估方法。
The main research content of this paper is network information detection technology and network security evaluation method.
同时该系统采用相关网络安全技术,保证了执行任务过程中信息交互的安全性。
In addition, some related network security technologies are adopted so as to ensure the security of information exchanges during the implementation procedure.
进行信息网络安全技术和标准的研究,开发相应的安全产品,并从事安全服务工作。
To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.
而安全认证服务融合了上述服务中所采用的主要技术,逐渐成为保证网络信息安全的主要手段。
The service of secure certification merges main technology of above-mentioned service adopted to serve, become the main means to guarantee the network with safe information gradually.
在CATV网络上构建电子政务最关键的是要建立起安全的信息通道,安全的信息通道的建立必须借助于PKI技术。
The key one is the information passway setting up security to structure the electronic government in CATV network, safe information passway setting-up must be with the aid of PKI technology.
ERP系统中运用了先进的网络技术,也正因为如此,ERP系统中信息的安全问题也是ERP系统正确实施而必须解决的问题。
It is the advanced network technology in the ERP system, so the information security is important for the ERP system.
数字图书馆建设是包括数字技术、信息存储技术、数据库技术、网络安全技术在内的基础技术建设。
The construction of digital libraries base on digitalization technology, the storage technology of information, database technology, and net security technology.
计算机与网络是目前信息安全技术的主要研究对象。
Computer and network are the major research objects of the information security technology at present.
本课题是福建省重点科研项目《信息网络安全防护技术》(项目编号2001H103)的一部分。
Our work is a part of a key research project of Fujian province-Information Network Security Protection Techniques (No. 2001H103).
本课题是福建省重点科研项目《信息网络安全防护技术》(项目编号2001H103)的一部分。
Our work is a part of a key research project of Fujian province-Information Network Security Protection Techniques (No. 2001H103).
应用推荐