• Finally, the solution of access control in host-network security is given.

    最后主机网络安全访问控制给出了实现方案

    youdao

  • In this paper, architecture of host-network security is presented, and then some key technologies of host-network security is discussed.

    文章提出主机网络安全体系结构对其中关键技术了探讨

    youdao

  • Outside the host network (Intranet or extranet) are considered not to be trusted, so the application can run on the host and external services to set targeted strong security policy.

    主机以外网络(内部网外部网)认为是不可信任的,因此可以针对该主机运行具体应用对外提供的服务设定针对性很强的安全策略。

    youdao

  • The prototype system shows the project reinforces security of host system, and the resource usages is less, and it is applicable in secret network.

    方案对服务器系统安全有所加强,所占用主机资源网络资源较少适用于针对涉密网等高安全级别的可信系统中。

    youdao

  • Then, the security scan technologies based on host and network were further researched, and the contrast of these two technologies and then introduces the popular scanner were analyzed.

    然后深入研究基于网络安全扫描基于主机的安全扫描两技术分析了两种技术的对比,对两种技术中流行的安全扫描工具进行了研究。

    youdao

  • In the field of network security, the secure performance analysis assessment based host is becoming highlighting.

    计算机网络安全领域针对目标主机安全性能分析评估当前的研究热点

    youdao

  • The security of Internet information include two components: security of host computor and security of network.

    网络信息安全包括主机安全和网络安全部分。

    youdao

  • From the Angle of enterprise network, it includes security of connection, security of the network equipments and security of internal host computer.

    企业角度还可以分为接入点安全网络设备安全和内部主机安全。

    youdao

  • Analysis of the impact of service availability in the network attacks lead to abnormal changes in network traffic, based on a host of real-time network flow method to assess the security situation.

    分析影响服务可用性网络攻击导致网络流量异常改变基础,提出了一种主机网络实时流量安全状况评估方法

    youdao

  • Analysis of the impact of service availability in the network attacks lead to abnormal changes in network traffic, based on a host of real-time network flow method to assess the security situation.

    分析影响服务可用性网络攻击导致网络流量异常改变基础,提出了一种主机网络实时流量安全状况评估方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定