• And encryption technology is the core technology of the network security technology.

    加密技术则是网络安全技术中的核心技术。

    youdao

  • Intrusion Detection System, new domain of Network Security, is a core research area in dynamic Information Security, but it still has many problems, especially in self-completing and self-learning.

    入侵检测系统目前安全领域课题,是动态安全领域核心目前仍然存在很多问题特别是具有自适应能力、能自我学习的入侵检测系统还不完善。

    youdao

  • The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.

    数据库所有信息系统核心,数据库的安全通常其中所存数据的安全,是网络安全、信息安全的重要组成部分

    youdao

  • This article first analyzes the security of computer network, introduces basic technology that guarantee the security and emphasizes that cryptography is the core technology.

    本文第一章分析计算机网络安全性介绍保障计算机网络安全基本技术指出密码技术网络安全技术的核心

    youdao

  • But the direction of the most core technology, we still lack, for example, wireless sensor network technology, wireless instrumentation, function security technology, safety instrumentation systems.

    但是这些方向大部分核心技术我们依然欠缺比如无线传感网络技术、无线仪表功能安全技术、安全仪表系统

    youdao

  • An physical approach of network security based on PCI bus is proposed, the design scheme of the core component, PCI control card, is introduced, and realization of some key technologies is described.

    提出基于PCI总线网络安全一种物理实现方法详细介绍了核心部件PCI控制板卡设计方案描述了其中几个关键技术实现

    youdao

  • As network processor become core hardware in the next generation network device. The research in this paper is security of network information transmission based-on network processor.

    因此网络处理器成为下一代网络设备核心硬件本文研究问题基于网络处理器网络信息传输安全性

    youdao

  • File system is the core of the UNIX system. This paper gave a UNIX file security detect scheme based on distributed network.

    文件系统UNIX系统核心针对UNIX文件系统提出了基于分布式网络的UNIX文件安全检测方案

    youdao

  • As network processor become core hardware in the next generation network device. The research in this paper is quality and security of network information transmission based-on network processor.

    因此网络处理器成为下一代网络设备核心硬件本文研究问题基于网络处理器网络服务质量网络信息传输安全性

    youdao

  • It provides an overview of features and techniques available to service providers to help improve security by "hardening" the core network.

    概述服务提供商可以用来“加强核心网络帮助提高安全现有功能技术

    youdao

  • The Access Control is one of the core strategies of the network security, as well as a major component of information safety technology.

    保证网络安全核心策略之一也是信息安全技术的重要组成部分。

    youdao

  • Intrusion tolerant technology is the core of the third generation of network security in back of information protection, intrusion detection and fault tolerance technology.

    入侵容忍技术信息保护技术和入侵检测容错技术之后第三网络安全核心

    youdao

  • Intrusion detection technology is the core technology security audit is one of the important network security components.

    入侵检测技术安全审计中的核心技术之一,是网络安全防护重要组成部分

    youdao

  • IP Multimedia Subsystem (IMS) has been accepted as the core control platform of the 3g network. Its security problems are facing severe challenges now.

    IP多媒体子系统(IMS)作为3g网络核心控制平台安全问题面临着严峻挑战

    youdao

  • The network discovery module is developed directly by Core Security and as already said it USES the NMap OS fingerprinting database.

    模块开发网络安全和直接核心内容已经利用MA操作系统指纹数据库。

    youdao

  • Finally, basing on the core idea of improved association rule learning algorithms, this thesis designs and achieves simple models of network security audit.

    最后根据改进关联规则学习算法核心思想,对网络安全审计模型进行了设计给予实现

    youdao

  • The fourth chapter gives the security model in the network exam system, designs and implements the core algorithm of OTP, soft token and OTP authentication server.

    第四给出网络考试系统安全模型设计实现了OTP核心算法令牌以及OTP认证服务器

    youdao

  • The core issue of this security scheme is the design and implementation of a secure and efficient key management algorithm which can protect network against attacks.

    安全模型核心问题需要设计安全和高效密钥管理算法来抵御攻击,保证网络的安全性。

    youdao

  • To ensure core network's stability and security, service provisioning, new service deployment and security control are performed on the edge of the network

    业务升级或者业务增加、安全控制等等只须边缘层进行保证骨干网络稳定

    youdao

  • This decline was met with arguments in favor of building security into the technical system, both at its core, in the network elements themselves, and at its periphery, through "trusted computing."

    这种下降伴随着这样种争论通过“可信度计算”技术系统建立安全机制,不只是在核心——网络元素中,而且周边设备中。

    youdao

  • Information security is the basis of modern computer communication network, while modern cryptographic algorithm is also the core part of the information security.

    信息安全技术现代计算机通信网络基础现代密码算法又是信息安全最为核心的部分

    youdao

  • Information security is the basis of modern computer communication network, while modern cryptographic algorithm is also the core part of the information security.

    信息安全技术现代计算机通信网络基础现代密码算法又是信息安全最为核心的部分

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定