• In this article, the security and recovery techniques are introduced, which are implemented on a network data base-IDMS.

    本文介绍网状型数据库idms上实现安全技术恢复数据库的过程。

    youdao

  • Can interlink with the other systems through web net and date-base system conveniently, can not only realize data sharing function, but also ensure the independent ability and security of the system.

    通过网络数据库系统方便其他系统互连,既能实现数据共享保证系统独立性安全性

    youdao

  • Authentication service is a base of implementation of security mobile AD hoc network, mobile users can exchange data communications securely between each other by certificate service.

    认证服务实现安全移动自组网基础,移动用户可以通过证书服务进行安全数据通信

    youdao

  • This paper deeply researches on EKE protocol and CAPTCHA on the base of the knowledge of Data Encryption and Information Security.

    本文主要掌握一定数据加密信息安全、身份认证等知识基础,对EKE协议CAPTCHA作了较为深入研究

    youdao

  • The developing instrument of the back end is Access2000 of Microsoft, the whole data base is related each other, makes the data base have relatively high integrality, Consistency and security.

    后端的开发工具Microsoft Access 2000,整个数据库相互关联使数据库具有较高完整性一致性安全性

    youdao

  • The former should make the function of application integrated and the usage is easy, the latter required a data-base with powerful consistency and integrality, and nice security.

    对于前者要求建立数据一致性完整性、数据安全性好的库。对于后者则要求应用程序功能完备,使用等特点。

    youdao

  • The former should make the function of application integrated and the usage is easy, the latter required a data-base with powerful consistency and integrality, and nice security.

    对于前者要求建立数据一致性完整性、数据安全性好的库。对于后者则要求应用程序功能完备,使用等特点。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定