Key establishment is the central problem in communication and network security.
密钥建立是通信网络安全中的关键问题。
That means there will always be a need for computer and network security specialists.
这意味着计算机和网络安全专家总会有需求。
Computer system and network security are basis of security of distributed database system.
计算机系统和网络的安全是分布式数据库系统安全的基础。
Packet capture is the key technology of intrusion detection system and network security audit.
网络数据包捕获技术,是实现入侵检测、网络安全审计的关键技术。
Problems of design, usage, data transferring and network security of ActiveX control tool were discussed.
讨论了控件的设计使用、数据传输、网络安全的问题。
Attacking network means emerges endlessly and network security issues have become particularly important.
攻击网络的手段层出不穷,网络安全问题也变得尤为重要。
This paper details the conception of network security, the threat network facing and network security techniques.
给出了网络安全的概念,网络所面临的威胁,提出了解决网络安全的相关技术。
This is an advanced example and assumes familiarity with cryptography, inter-process communication, and network security.
这是一个高级示例,假定您熟悉加密、进程间通信和网络安全。
At last, the popular technology about computer network virus detection and information and network security is summarized.
最后,对计算机网络病毒的检测和当前网络安全的主流技术进行了分析。
Capture mechanism on network data packages is the basic analysis tools of network capability and network security systems.
数据包截获机制是网络性能分析工具和网络安全工具的实现基础。
The main research content of this paper is network information detection technology and network security evaluation method.
本文主要研究的内容是网络信息的探测技术和建立在信息探测基础上的安全评估方法。
Realizing the network topology clearly is very important for network's maintenance, devices' management and network security.
清楚的了解网络拓扑情况对网络维护、设备管理以及网络安全有着重要的意义。
The meeting will include not only the release of new content, but also a not to be missed, cloud, network and network security event.
本次会议将不仅包含新品的发布内容,同时更是一场“不容错过”的云端、网络和网络安全的盛会。
Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.
与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。
The buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area.
缓冲区溢出攻击是网络攻击事件中最常用的一种攻击方式,成为系统和网络安全中亟待解决的重要问题。
Unhealthy servers accounted for 66%, sub health servers accounted for more than 26%. Cloud lock to help users fix vulnerabilities and network security strategy.
不健康的服务器占比66%,亚健康服务器占比26%。云锁帮助用户及时修复了漏洞补丁及网络安全策略项。
Then, the author discusses them from four aspects: the configuration of server, information organization and resource storage, load balance, and network security.
接着从服务器配置技术、资源组织与存储技术、负载均衡技术和网络安全技术几个方面予以论述。
Unhealthy servers accounted for 66%, sub health servers accounted for more than 26%. Network anti G01 help users fix vulnerabilities and network security strategy.
不健康的服务器占比66%,亚健康服务器占比26%。网防g 01帮助用户及时修复了漏洞补丁及网络安全策略项。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
In view of the importance of information and network security, a method of Chinese information encryption, BMP image and text hiding and the decryption is put forward.
针对信息与网络安全的重要性及严峻性,提出了一种汉字信息加密、在BMP图像文件中隐藏、恢复及解密的方法。
Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.
加密卡可以为个人计算机系统、网络安全设备提供密码服务,以实现数据的安全存储和网络信息的保密通信。
Four key techniques of telemedicine system about are researched respectively, which are network protocols, multimedia database system, data compress and network security.
本文对远程医疗的四个关键技术——网络协议、多媒体数据库技术、数据压缩技术、网络安全分别进行了研究。
Abstract: this paper discussed four network security problems-network insecurity problems network security classification network security policy and network security measure.
文摘:从网络所面临的威胁、网络安全等级、网络安全策略和网络安全措施等四个方面,分析与探讨网络安全问题。
With the continuous development of Internet, Network Management and Network Security have been regarded as an important thing more and more, which people have to be considered.
网络管理及网络安全对任何网络都是必须考虑的,相应的这方面的设备也就成为当前研究的热点。
Then common reconfigurable computing platforms are introduced and also the application models of reconfigurable computing in areas such as signal processing and network security.
然后介绍了几种常见的可重构计算平台,以及可重构计算在信号处理、网络安全等领域的应用模型。
On the platform, the paper analyzes the component technology, middleware technology, data storage and backup technology, load balancing technology and network security technology.
在平台建设技术方面分析了构件技术、中间件技术、数据存储备份技术、负载均衡技术和网络安全技术及相应的标准。
On the platform, the paper analyzes the component technology, middleware technology, data storage and backup technology, load balancing technology and network security technology.
在平台建设技术方面分析了构件技术、中间件技术、数据存储备份技术、负载均衡技术和网络安全技术及相应的标准。
应用推荐