通过观念和信息的分享来为计算机安全领域的进步打下基础。
It serves as the foundation for the improvement of computer security worldwide by sharing goals, ideas, and information.
信息安全的利益在于——保护计算机系统和网络——具有其余生俱来的的不可见属性:如果危险已经转移,则一切都会正常工作。
The benefits of information security-protecting computer systems and networks-are inherently invisible: if threats have been averted, things work as normal.
OpenSSH是一个重要工具,它可以保护计算机之间的通信和信息传输的安全。
OpenSSH is an important tool that keeps the communication and transfer of information between machines secure.
是的,我认为美国、英国以及其他大部分西方国家搞信息安全的目的是为了保护计算机和通信网络。
Yes. I think the way that the United States, the United Kingdom, and most other Western countries use it is for defense of computers and communications networks.
因此,网络安全技术的研究已成为现在计算机和通信界的一个热点,并且成为现在信息科学的一个重要研究领域。
Therefore, the research of Internet security technique has been one of focuses in the communication and an important research area of the information science.
加密卡可以为个人计算机系统、网络安全设备提供密码服务,以实现数据的安全存储和网络信息的保密通信。
Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.
随着计算机信息技术与网络技术的迅猛发展,信息与网络的安全形势也日趋严峻和复杂化。
By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.
计算机和互联网技术正在改变着人类社会的面貌,与之伴随而来的是信息和网络安全的问题。
The computer and Internet technology are changing the appearance of the human society; it is the question of information and online security with its one that followed.
随着计算机网络的迅猛发展,网络在为人们提供便利和带来效益的同时,也使人们面临着信息安全的巨大挑战。
With the fast development of computer network, network provides convenience and benefits for people, but it also makes people face to the challenge of information security.
计算机网络有效地实现了资源共享,但资源共享和信息安全是一对矛盾体。
The computer network will realize the resource sharing effectively, but the resource-sharing and information security is a pair of contradictions.
长期以来,人们设计计算机的目标主要是追求信息处理功能的提高和生产成本的降低,而对于安全问题则重视不够。
For a long time, the target computer was designed mainly to the pursuit of information processing and improve the function of lower production costs, and the emphasis on security issues is not enough.
本文根据笔者面向计算机专业硕士生开设密码学选修课的实践,探讨了密码学课程的教学组织和信息安全教育。
Based on our practice on graduate students' elective course of cryptography, we probe into its teaching organization and information security education in this paper.
计算机网络是信息社会的基础,它能有效地实现资源共享,但资源共享和信息安全是一对矛盾体。
Computer network is the foundation of information society, which can be carried out for resource sharing, while information security and resource sharing are contradicted.
探讨了采用DES和RSA混合加密方式来实现计算机网络通信中的信息安全的问题。
This paper discusses on the problem of realizing the information security of network communication by using DES and RSA hybrid encryption technology.
“信息安全概论”课程教学培养计算机专业人员的信息安全意识和教授相关技术。
It is an important course which will improve the professional computer developers consciousness and skills of information security.
协助信息技术支持和排除故障的工作,确保计算机运行,效率和安全均达到最高水平。
Assist with information technology support and troubleshooting ensuring the highest level of computer performance, efficiency and security.
针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。
The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
该文从论述计算机系统的信息安全问题的重要性出发,重点探讨了影响计算机信息网络安全的因素和防范对策。
This article from the computer system of information on the importance of the issue of security, focused on the impact of computer information network security factors and preventive measures.
混沌加密在计算机网络和安全通信方面的应用为解决信息安全问题开辟了一种新的研究途径。
Chaotic encryption applies a new research approach to solve security of information in computer network and security communication inaugurate.
随着计算机和互联网的飞速发展,信息安全问题越来越受到关注。
With the rapid development of computer technology and Internet, information security is given more and more attention.
还主要阐述计算机信息网络攻击和入侵的特点、安全因素以及其安全防范手段。
At the same time, the article expounds the features of computer information network being attacked and invaded, security factors and other security precautionary measures.
研究计算机视频泄漏信息截获和复现是TEMPEST技术的重要部分,对保障计算机信息安全具有重要意义。
Studying the computer video information leakage's capture and re-emergence is the key components of TEMPEST, it is very important for assuring the computer information security.
电子商务安全从整体上可分为计算机信息系统安全和商务交易安全两大类。
The electronic commerce safety can be divided into two major type: the computer information system safety and The electronic commerce business safety from the whole to trade.
操作系统的类型信息对于研究针对计算机网络的入侵行为和安全防护措施是非常重要的。
Information of OS types is very important to the research on intrusion behaviors against computer networks.
随着计算机和互联网的飞速发展,信息安全问题越来越受到关注。
With the rapid development of computers and the Internet, information security has received increasing attention.
描述配置文件的语法,并提供有关计算机配置文件、应用程序配置文件和安全配置文件的信息。
Describes the syntax of configuration files and provides information about machine, application, and security configuration files.
市主管部门应当监督、指导计算机应用单位建立和完善计算机信息系统安全保障体系。
The municipal competent authority shall supervise and instruct the application unit to set up and perfect the safeguard system of computer information system.
市主管部门应当监督、指导计算机应用单位建立和完善计算机信息系统安全保障体系。
The municipal competent authority shall supervise and instruct the application unit to set up and perfect the safeguard system of computer information system.
应用推荐