• Key establishment is the central problem in communication and network security.

    密钥建立通信网络安全中的关键问题

    youdao

  • That means there will always be a need for computer and network security specialists.

    意味着计算机网络安全专家总会有需求

    youdao

  • Computer system and network security are basis of security of distributed database system.

    计算机系统网络安全分布式数据库系统安全基础

    youdao

  • Packet capture is the key technology of intrusion detection system and network security audit.

    网络数据包捕获技术实现入侵检测网络安全审计关键技术

    youdao

  • Problems of design, usage, data transferring and network security of ActiveX control tool were discussed.

    讨论控件设计使用数据传输网络安全问题

    youdao

  • Attacking network means emerges endlessly and network security issues have become particularly important.

    攻击网络手段层出不穷,网络安全问题变得尤为重要。

    youdao

  • This paper details the conception of network security, the threat network facing and network security techniques.

    给出网络安全概念,网络所面临威胁,提出了解决网络安全的相关技术

    youdao

  • This is an advanced example and assumes familiarity with cryptography, inter-process communication, and network security.

    一个高级示例假定熟悉加密进程间通信网络安全

    youdao

  • At last, the popular technology about computer network virus detection and information and network security is summarized.

    最后计算机网络病毒检测当前网络安全主流技术进行了分析。

    youdao

  • Capture mechanism on network data packages is the basic analysis tools of network capability and network security systems.

    数据包截获机制网络性能分析工具网络安全工具实现基础

    youdao

  • The main research content of this paper is network information detection technology and network security evaluation method.

    本文主要研究内容网络信息探测技术建立在信息探测基础上的安全评估方法

    youdao

  • Realizing the network topology clearly is very important for network's maintenance, devices' management and network security.

    清楚了解网络拓扑情况网络维护设备管理以及网络安全有着重要的意义。

    youdao

  • The meeting will include not only the release of new content, but also a not to be missed, cloud, network and network security event.

    本次会议不仅包含新品发布内容,同时更是一场不容错过”的云端网络网络安全的盛会。

    youdao

  • Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.

    设置用户存取权限控制冗余备份恢复网络安全等多种安全策略共同建立有机的安全体系

    youdao

  • The buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area.

    缓冲区溢出攻击网络攻击事件常用的一种攻击方式,成为系统网络安全中亟待解决重要问题

    youdao

  • Unhealthy servers accounted for 66%, sub health servers accounted for more than 26%. Cloud lock to help users fix vulnerabilities and network security strategy.

    健康服务器66%,健康服务器占比26%。帮助用户及时修复了漏洞补丁网络安全策略项

    youdao

  • Then, the author discusses them from four aspects: the configuration of server, information organization and resource storage, load balance, and network security.

    接着服务器配置技术、资源组织存储技术、负载均衡技术网络安全技术几个方面予以论述

    youdao

  • Unhealthy servers accounted for 66%, sub health servers accounted for more than 26%. Network anti G01 help users fix vulnerabilities and network security strategy.

    健康服务器66%,健康服务器占比26%。g 01帮助用户及时修复了漏洞补丁网络安全策略项。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务主要客户是美国情报和军事部门。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • In view of the importance of information and network security, a method of Chinese information encryption, BMP image and text hiding and the decryption is put forward.

    针对信息网络安全重要性及严峻性,提出了汉字信息加密、在BMP图像文件中隐藏恢复及解密的方法。

    youdao

  • Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.

    加密可以个人计算机系统网络安全设备提供密码服务实现数据的安全存储网络信息保密通信

    youdao

  • Four key techniques of telemedicine system about are researched respectively, which are network protocols, multimedia database system, data compress and network security.

    本文远程医疗四个关键技术——网络协议多媒体数据库技术数据压缩技术、网络安全分别进行了研究。

    youdao

  • Abstract: this paper discussed four network security problems-network insecurity problems network security classification network security policy and network security measure.

    文摘:从网络所面临的威胁、网络安全等级、网络安全策略网络安全措施等四个方面,分析与探讨网络安全问题

    youdao

  • With the continuous development of Internet, Network Management and Network Security have been regarded as an important thing more and more, which people have to be considered.

    网络管理网络安全对任何网络是必须考虑,相应的方面的设备也就成为当前研究的热点。

    youdao

  • Then common reconfigurable computing platforms are introduced and also the application models of reconfigurable computing in areas such as signal processing and network security.

    然后介绍了几种常见重构计算平台以及可重构计算信号处理网络安全领域应用模型

    youdao

  • On the platform, the paper analyzes the component technology, middleware technology, data storage and backup technology, load balancing technology and network security technology.

    平台建设技术方面分析构件技术中间件技术、数据存储备份技术、负载均衡技术网络安全技术及相应的标准。

    youdao

  • On the platform, the paper analyzes the component technology, middleware technology, data storage and backup technology, load balancing technology and network security technology.

    平台建设技术方面分析构件技术中间件技术、数据存储备份技术、负载均衡技术网络安全技术及相应的标准。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定