• At last, the popular technology about computer network virus detection and information and network security is summarized.

    最后计算机网络病毒检测当前网络安全主流技术进行了分析。

    youdao

  • LSB steganography is easy to implement hiding much information. So, it is a hot area of research in the information and network security.

    LS B信息隐藏其隐藏信息量大、隐藏方法简单优点,成为信息安全领域研究一个热点

    youdao

  • In view of the importance of information and network security, a method of Chinese information encryption, BMP image and text hiding and the decryption is put forward.

    针对信息网络安全重要性及严峻性,提出了汉字信息加密、在BMP图像文件中隐藏恢复及解密的方法。

    youdao

  • Air equipments information integration technology is a synthesize technology which is capable of realizing air equipments information share basing on information and network security technology.

    航空装备体系信息一体化技术是以信息技术为基础,网络安全技术为保障,航空武器装备信息资源共享为目的一项综合高技术。

    youdao

  • The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.

    协议涵盖企业安全呼吁支持信息技术服务,对新出现网络威胁网络入侵提高认识

    youdao

  • There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.

    同样网络无线安全技能人群以及那些具有认证信息系统安全专业证书的也备受青睐

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务主要客户是美国情报和军事部门。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • To enable wireless network flexibility and ensure security, several initiatives have been launched such as the Wireless FreeNetwork Allocations and NodeDB.com (see Resources for more information).

    为了使无线网络能够具备灵活性确保安全已经发起了一些计划例如Wireless FreeNetwork Allocations NodeDB.com(参阅参考资料以获得更多信息)。

    youdao

  • Any requests for information by unknown persons need to be sent to a central network security location for verification and fulfillment.

    对于身份不明任何要求需要信息发送中央网络核查执行安全位置

    youdao

  • Here are some strengthen router security measures, to prevent the attack on the router itself, and prevent the network information from eavesdroppers.

    下面一些加强路由器安全的具体措施,用以阻止路由器本身攻击防范网络信息窃取

    youdao

  • The network information security into the network security and information security two levels.

    网络信息安全分为网络安全和信息安全两个层面

    youdao

  • Other network and information equipment security technical requirement etc.

    其他网络信息设备安全技术要求

    youdao

  • While network becomes part of life, network and information security also be comes one of the most-focused problems.

    网络日益成为人们生活一部分的同时,网络信息安全成为最为关注的问题之一

    youdao

  • Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.

    加密可以个人计算机系统网络安全设备提供密码服务实现数据的安全存储网络信息保密通信

    youdao

  • It becomes an important research project that how to use the service of the network and reduce the loss in the network information security.

    如何尽可能利用网络服务减少因网络信息安全方面损失一个很重要课题

    youdao

  • With the proliferation of computer and network techniques, database security has become an important research area of information security.

    随着计算机网络技术广泛应用,数据库安全技术成为信息安全重要研究领域

    youdao

  • By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.

    随着计算机信息技术网络技术迅猛发展信息与网络的安全形势日趋严峻和复杂化。

    youdao

  • As a result, the initiative to understand the information network security risks and effective protection, become a positive response.

    因而主动了解信息网络安全隐患加以有效防护成为积极应对之策

    youdao

  • Specifically, the wisdom of the city may encounter information security issues are divided into network security, system security, data security and integrated security.

    具体而言智慧城市可能遇到信息安全问题分为网络安全、系统安全、数据安全和综合安全。

    youdao

  • The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.

    数据库所有信息系统核心,数据库的安全通常其中所存数据的安全,是网络安全、信息安全的重要组成部分

    youdao

  • How to let readers to sufficiently use the information resource of digital library as well as ensure the security of information and network of digital library.

    如何读者充分利用数字化图书馆信息资源,又保证数字化图书馆的信息网络安全,就需要建立数字化图书馆信息安全保障体系。

    youdao

  • To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.

    进行信息网络安全技术标准研究开发相应的安全产品从事安全服务工作

    youdao

  • It can be said that the network information security is still a big proposition, the purpose and means of network attacks are becoming more diverse.

    可以说网络信息安全依然一个命题,网络攻击目的手段越来越多样化

    youdao

  • It can be said that the network information security is still a big proposition, the purpose and means of network attacks are becoming more diverse.

    可以说网络信息安全依然一个命题,网络攻击目的手段越来越多样化

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定