It serves as the foundation for the improvement of computer security worldwide by sharing goals, ideas, and information.
通过观念和信息的分享来为计算机安全领域的进步打下基础。
Because of this, they're a treasure trove of personal information--and likely the next battleground for computer security.
正因为此,个人信息成为了无主之宝藏——就像电脑安全的下一处战场。
The benefits of information security-protecting computer systems and networks-are inherently invisible: if threats have been averted, things work as normal.
信息安全的利益在于——保护计算机系统和网络——具有其余生俱来的的不可见属性:如果危险已经转移,则一切都会正常工作。
By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.
随着计算机信息技术与网络技术的迅猛发展,信息与网络的安全形势也日趋严峻和复杂化。
With the proliferation of computer and network techniques, database security has become an important research area of information security.
随着计算机与网络技术的广泛应用,数据库安全技术已成为信息安全的重要研究领域。
School of Computer: Computer Science and Technology, Information Security.
计算机学院:计算机科学与技术、信息安全。
The computer and Internet technology are changing the appearance of the human society; it is the question of information and online security with its one that followed.
计算机和互联网技术正在改变着人类社会的面貌,与之伴随而来的是信息和网络安全的问题。
With the fast development of computer network, network provides convenience and benefits for people, but it also makes people face to the challenge of information security.
随着计算机网络的迅猛发展,网络在为人们提供便利和带来效益的同时,也使人们面临着信息安全的巨大挑战。
At last, the popular technology about computer network virus detection and information and network security is summarized.
最后,对计算机网络病毒的检测和当前网络安全的主流技术进行了分析。
Computer network is the foundation of information society, which can be carried out for resource sharing, while information security and resource sharing are contradicted.
计算机网络是信息社会的基础,它能有效地实现资源共享,但资源共享和信息安全是一对矛盾体。
Assist with information technology support and troubleshooting ensuring the highest level of computer performance, efficiency and security.
协助信息技术支持和排除故障的工作,确保计算机运行,效率和安全均达到最高水平。
Nowadays, in the computer network environment, all the confidentiality, security, integrality, usability and nonrepudiation of the information must be resolved by encrypting technology.
如今在计算机网络环境下信息的机密性、安全性、完整性、可用性等特性,都需要采用密码技术来解决。
Analyzing computer crime through forensics and anti-forensics, we should find out the origin of anti-forensics to protect national information network security and beat crime.
从取证与反取证两方面分析计算机犯罪的特征,研究反取证技术的根源,可有效地保护国家信息网络安全,打击犯罪。
Chaotic encryption applies a new research approach to solve security of information in computer network and security communication inaugurate.
混沌加密在计算机网络和安全通信方面的应用为解决信息安全问题开辟了一种新的研究途径。
It is an important course which will improve the professional computer developers consciousness and skills of information security.
“信息安全概论”课程教学培养计算机专业人员的信息安全意识和教授相关技术。
This article from the computer system of information on the importance of the issue of security, focused on the impact of computer information network security factors and preventive measures.
该文从论述计算机系统的信息安全问题的重要性出发,重点探讨了影响计算机信息网络安全的因素和防范对策。
At the same time, the article expounds the features of computer information network being attacked and invaded, security factors and other security precautionary measures.
还主要阐述计算机信息网络攻击和入侵的特点、安全因素以及其安全防范手段。
Studying the computer video information leakage's capture and re-emergence is the key components of TEMPEST, it is very important for assuring the computer information security.
研究计算机视频泄漏信息截获和复现是TEMPEST技术的重要部分,对保障计算机信息安全具有重要意义。
Computer and network are the major research objects of the information security technology at present.
计算机与网络是目前信息安全技术的主要研究对象。
Users - both regular staff and members of the information - often disable security features of their computers, because those features slow things down or make the computer more complicated to use.
包括正式员工及懂行的信息技术人员在内的计算机用户通常会关闭电脑安全功能,因为这些功能会让系统变慢,或是电脑更复杂难用。
Some standards and agreement about the network and information management were briefly showed and the main threaten of the computer information network security was discussed.
简要说明了网络与信息安全管理的一些标准和协议,讨论了网络信息安全所面临的主要威胁。
For a long time, the target computer was designed mainly to the pursuit of information processing and improve the function of lower production costs, and the emphasis on security issues is not enough.
长期以来,人们设计计算机的目标主要是追求信息处理功能的提高和生产成本的降低,而对于安全问题则重视不够。
The computer network will realize the resource sharing effectively, but the resource-sharing and information security is a pair of contradictions.
计算机网络有效地实现了资源共享,但资源共享和信息安全是一对矛盾体。
The threat of greater function is to steal, modify or delete the computer for storing confidential information, and thus on the user's personal privacy and information security pose a serious threat.
其威胁性更大的功能是可以窃取、修改或删除计算机中存储的机密信息,从而对用户的个人隐私以及信息安全构成严重的威胁。
With the wide application of computer and network technology on libraries, the security problem of the library information network becomes unavoidably more and more important.
随着计算机及网络技术广泛应用于图书馆,使得图书馆信息网络安全问题成了不容回避的重要课题。
Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.
指挥自动化网络安全系统,基于信息存储、通信信道、计算机病毒及电磁辐射等安全性分析。
However, due to the connatural frailty of the computer network, as well as the start of China's network and information technology was late, which causes the network security many potential threats.
然而,网络自身固有其脆弱性,并且中国的网络信息技术起步较晚,给网络安全带来诸多潜在的威胁。
But, by the opening and sharing of the computer network, information security has also become a growing issue in our society.
然而,盘算机网络所具有的开放性与共享性,使得信息安全题目也日益成为人们关注的焦点。
The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus.
本发明属于计算机信息安全处理系统,尤其属于一种外置式计算机硬盘数据加密方法及其装置。
The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus.
本发明属于计算机信息安全处理系统,尤其属于一种外置式计算机硬盘数据加密方法及其装置。
应用推荐