• This paper first proposes one inner-net information defense system based on the depth defense and elaborates in detail the system composition structure and each module function.

    提出一个基于深度防御思想内网信息防御系统阐述系统组成结构作用模块的作用。

    youdao

  • Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.

    深度防御可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵机器问题

    youdao

  • The strategic defense agreement between France and Kuwait covers exchange of information, assistance, training and equipment, and extends a previous accord signed Aug. 18, 1992.

    法国科威特之间战略防御协议涵盖了信息协助培训设备交流等范围,对1992年818签署协议进行了扩展

    youdao

  • Rajaratnam's defense will probably claim that whatever inside information he gleaned was just part of the mosaic of data to which he applied his skill as a trader.

    加拉特纳姆可能辩护声称无论得到什么样内幕信息,仅仅他所搜集的且有利于其作为一个商人进行交易马赛克数据一部分

    youdao

  • By gathering information into a digital view of the battlefield, MIDS provides greater situational awareness in combat for the U.S.Navy, Air Force, Army, Marine Corps, and for U.S. defense partners.

    通过收集信息数字视野呈现战场MIDS能为美国海军空军陆军海军陆战队以及美国防务合作伙伴提供增强的态势感知

    youdao

  • By gathering information into a digital view of the battlefield, MIDS provides greater situational awareness in combat for the U.S. Navy, Air Force, Army, Marine Corps, and for U.S. defense partners.

    通过收集信息数字视野呈现战场MIDS能为美国海军空军陆军海军陆战队以及美国防务合作伙伴提供增强的态势感知

    youdao

  • This program is managed by the U.S. AFRL Information Handling branch within the Information and Intelligence Exploitation Division as part of the AFRL Computer Defense Immune System (CDIS) initiative.

    这项计划美国AFRL信息情报开发分部信息处理部门管理,分部也参与了AFRL计算机防御免疫系统CDIS工作。

    youdao

  • DARPA officials plan to use the cyber range to test technology for the Global Information Grid, the Defense Department's network for warfighters and other personnel.

    DARPA官员计划网络范围全球信息栅格国防部作战人员其他人员网络测试技术

    youdao

  • By research, the asymmetric information in national defense scientific research was the important reason that drew down these problems.

    经过研究发现,科研工作中的信息对称造成这些问题重要原因

    youdao

  • This paper introduces the active defense policy based on risk assessment technology into safe protection of electric power information network.

    本文基于风险评估技术主动防御策略引入电力信息网络安全防护中。

    youdao

  • Repression is a defense or coping style that in-dividual adopt in order to avoid negative affects, is a trait keeping away from or avoiding threatening thought, im-pulse and information.

    压抑个体为了避免体验到消极情绪而采用防御机制应对方式,是一种远离回避威胁想法冲动信息的行为倾向或特质

    youdao

  • Negative defense will only lead to be attacked and only depending on sealing off the existed system leaks can't solve information security problems.

    消极防御只能被动挨打单纯依靠封堵现有系统漏洞不能根本上解决信息安全问题

    youdao

  • The Ballistic missile defense(BMD) system's detection and interception performance are studied. The Missile Defense system information countermeasures system and structure are given.

    美国弹道导弹防御系统能力进行了分析研究,提出了弹道导弹防御系统的信息攻防对抗体系结构。

    youdao

  • The core technology of information security lies in attack and defense, that is, attack technology and defense technology, only to master the attack technology in order to achieve better security.

    信息安全核心技术在于攻防”,即攻击技术防御技术,只有掌握攻击技术才能更好做到安全防御。

    youdao

  • Current information security defense for security issues of the storage appeared polarization.

    当前针对存储安全问题信息安全防御出现了两极分化

    youdao

  • Network trap, which protects the valuable resource of information by guiding the attacker to imitative and illusive information, is an available makeup of traditional network defense.

    网络诱骗技术传统网络防御手段有效补充通过将网络攻击者引向伪造的、虚假信息资源达到保护网络中真正有价值信息资源的目的。

    youdao

  • This thesis researches two technology measures of appling information assurance, they are Defense-in-Depth and Security Health Care.

    本文研究了实施信息保障两项技术措施纵深防御安全保健

    youdao

  • Information assurance emphases on the defense and restore between the whole life-cycle of the system.

    信息系统整个生命周期防御恢复

    youdao

  • This paper analyzes the common procedure of stealing information and accordingly represents the general design of a desktop defense system protecting information from being stolen.

    本文分析了通过网络窃取桌面信息一般流程,有针对性地提出防窃密桌面防御系统。

    youdao

  • Beacon towers were also built at fixed intervals for passing on military information. All these indicate the important role of the Great Wall in military defense.

    每隔一定距离就建造座烽火台,用来传递军情长城的整个军事防御体系一切都起着非常重要作用

    youdao

  • In the high technologic air-raid and anti air-raid confronting of information period, the importance of air defense C4ISR system that multiplies the combat effect can not be instead by anything.

    信息时代技术空袭空袭对抗作战行动中,防空c 4isr系统作为战斗效能倍增器作用不可替代。

    youdao

  • In the high technologic air-raid and anti air-raid confronting of information period, the importance of air defense C4ISR system that multiplies the combat effect can not be instead by anything.

    信息时代技术空袭空袭对抗作战行动中,防空c 4isr系统作为战斗效能倍增器作用不可替代。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定