• It serves as the foundation for the improvement of computer security worldwide by sharing goals, ideas, and information.

    通过观念信息分享计算机安全领域进步打下基础

    youdao

  • Because of this, they're a treasure trove of personal information--and likely the next battleground for computer security.

    正因为个人信息成为了无主之宝藏——电脑安全一处战场

    youdao

  • The benefits of information security-protecting computer systems and networks-are inherently invisible: if threats have been averted, things work as normal.

    信息安全利益在于——保护计算机系统网络——具有其余生俱来的的不可见属性:如果危险已经转移,则一切都会正常工作

    youdao

  • By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.

    随着计算机信息技术网络技术迅猛发展信息与网络的安全形势日趋严峻和复杂化。

    youdao

  • With the proliferation of computer and network techniques, database security has become an important research area of information security.

    随着计算机网络技术广泛应用,数据库安全技术成为信息安全重要研究领域

    youdao

  • School of Computer: Computer Science and Technology, Information Security.

    计算机学院:计算机科学技术信息安全

    youdao

  • The computer and Internet technology are changing the appearance of the human society; it is the question of information and online security with its one that followed.

    计算机互联网技术正在改变着人类社会面貌之伴随而来的信息网络安全问题

    youdao

  • With the fast development of computer network, network provides convenience and benefits for people, but it also makes people face to the challenge of information security.

    随着计算机网络迅猛发展,网络在为人们提供便利带来效益的同时,使人们面临信息安全的巨大挑战

    youdao

  • At last, the popular technology about computer network virus detection and information and network security is summarized.

    最后计算机网络病毒检测当前网络安全主流技术进行了分析。

    youdao

  • Computer network is the foundation of information society, which can be carried out for resource sharing, while information security and resource sharing are contradicted.

    计算机网络信息社会基础有效地实现资源共享资源共享信息安全一对矛盾体。

    youdao

  • Assist with information technology support and troubleshooting ensuring the highest level of computer performance, efficiency and security.

    协助信息技术支持排除故障工作,确保计算机运行效率安全均达到最高水平

    youdao

  • Nowadays, in the computer network environment, all the confidentiality, security, integrality, usability and nonrepudiation of the information must be resolved by encrypting technology.

    如今计算机网络环境下信息机密性安全性完整性可用性等特性,需要采用密码技术来解决

    youdao

  • Analyzing computer crime through forensics and anti-forensics, we should find out the origin of anti-forensics to protect national information network security and beat crime.

    取证反取证两方面分析计算机犯罪特征,研究反取证技术的根源,可有效保护国家信息网络安全打击犯罪。

    youdao

  • Chaotic encryption applies a new research approach to solve security of information in computer network and security communication inaugurate.

    混沌加密计算机网络安全通信方面应用解决信息安全问题开辟一种新的研究途径

    youdao

  • It is an important course which will improve the professional computer developers consciousness and skills of information security.

    信息安全概论”课程教学培养计算机专业人员信息安全意识教授相关技术

    youdao

  • This article from the computer system of information on the importance of the issue of security, focused on the impact of computer information network security factors and preventive measures.

    该文论述计算机系统信息安全问题重要性出发,重点探讨影响计算机信息网络安全的因素防范对策

    youdao

  • At the same time, the article expounds the features of computer information network being attacked and invaded, security factors and other security precautionary measures.

    主要阐述计算机信息网络攻击入侵特点安全因素以及其安全防范手段

    youdao

  • Studying the computer video information leakage's capture and re-emergence is the key components of TEMPEST, it is very important for assuring the computer information security.

    研究计算机视频泄漏信息截获复现TEMPEST技术重要部分保障计算机信息安全具有重要意义。

    youdao

  • Computer and network are the major research objects of the information security technology at present.

    计算机网络目前信息安全技术主要研究对象

    youdao

  • Users - both regular staff and members of the information - often disable security features of their computers, because those features slow things down or make the computer more complicated to use.

    包括正式员工懂行信息技术人员在内的计算机用户通常会关闭电脑安全功能因为这些功能会让系统变或是电脑复杂难用。

    youdao

  • Some standards and agreement about the network and information management were briefly showed and the main threaten of the computer information network security was discussed.

    简要说明网络信息安全管理一些标准协议讨论了网络信息安全面临主要威胁

    youdao

  • For a long time, the target computer was designed mainly to the pursuit of information processing and improve the function of lower production costs, and the emphasis on security issues is not enough.

    长期以来,人们设计计算机目标主要追求信息处理功能提高生产成本降低对于安全问题则重视不够。

    youdao

  • The computer network will realize the resource sharing effectively, but the resource-sharing and information security is a pair of contradictions.

    计算机网络有效地实现资源共享资源共享信息安全一对矛盾体

    youdao

  • The threat of greater function is to steal, modify or delete the computer for storing confidential information, and thus on the user's personal privacy and information security pose a serious threat.

    威胁性更大功能可以窃取修改删除计算机中存储机密信息从而用户个人隐私以及信息安全构成严重威胁

    youdao

  • With the wide application of computer and network technology on libraries, the security problem of the library information network becomes unavoidably more and more important.

    随着计算机网络技术广泛应用图书馆,使得图书馆信息网络安全问题成了不容回避重要课题。

    youdao

  • Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.

    指挥自动化网络安全系统基于信息存储通信信道计算机病毒及电磁辐射安全性分析

    youdao

  • However, due to the connatural frailty of the computer network, as well as the start of China's network and information technology was late, which causes the network security many potential threats.

    然而网络自身固有脆弱性,并且中国网络信息技术起步网络安全带来诸多潜在威胁

    youdao

  • But, by the opening and sharing of the computer network, information security has also become a growing issue in our society.

    然而盘算机网络具有开放性共享性,使得信息安全题目日益成为人们关注焦点

    youdao

  • The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus.

    发明属于计算机信息安全处理系统尤其属于一种外置式计算机硬盘数据加密方法及其装置。

    youdao

  • The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus.

    发明属于计算机信息安全处理系统尤其属于一种外置式计算机硬盘数据加密方法及其装置。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定