Finally, Combined with the design of database system, the paper discusses the data integrity, and does some design and research on system security through information security and network security.
最后论文结合数据库系统的设计,论述了数据完整性,从信息安全和网络安全两个方面对系统安全性进行了设计与研究。
There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.
同样,有网络和无线安全技能的人群以及那些具有认证信息系统安全专业证书的也备受青睐。
The network information security into the network security and information security two levels.
网络信息安全分为网络安全和信息安全两个层面。
The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.
数据库是所有信息系统的核心,数据库的安全通常是指其中所存数据的安全,是网络安全、信息安全的重要组成部分。
With the proliferation of computer and network techniques, database security has become an important research area of information security.
随着计算机与网络技术的广泛应用,数据库安全技术已成为信息安全的重要研究领域。
Specifically, the wisdom of the city may encounter information security issues are divided into network security, system security, data security and integrated security.
具体而言,智慧城市可能遇到的信息安全问题分为网络安全、系统安全、数据安全和综合安全。
To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.
进行信息网络安全技术和标准的研究,开发相应的安全产品,并从事安全服务工作。
With more and more severe challenges of network security, information security has changed the track of history.
随着企业面临越来越严峻的网络安全挑战,信息安全问题已经改变了历史的轨迹。
Intrusion Detection System, new domain of Network Security, is a core research area in dynamic Information Security, but it still has many problems, especially in self-completing and self-learning.
入侵检测系统是目前安全领域较新课题,是动态安全领域的核心,但目前仍然存在很多问题,特别是具有自适应能力、能自我学习的入侵检测系统还不完善。
This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.
本文描述AT M网络中的信息安全、可能受到的威胁、安全结构和端系统之间的鉴别技术。
The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.
通过设置密码和蓝牙技术的安全机制,提供了信息家电网络和远程控制系统的安全保障。
In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.
本文从网络安全、病毒防护、主机系统安全三方面对信息系统的安全进行分析,并对实现技术进行了探讨。
This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.
本课题在现有的网络通信技术、数据库技术和信息安全技术的基础上设计并实现了新型的安全即时通信系统。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
This article from the computer system of information on the importance of the issue of security, focused on the impact of computer information network security factors and preventive measures.
该文从论述计算机系统的信息安全问题的重要性出发,重点探讨了影响计算机信息网络安全的因素和防范对策。
Conclusion Intranet security management system can effectively guarantee information security of hospital Intranet and greatly improve work efficiency of network maintenance personnel.
结论内网安全管理系统能够有效的保障医院内网信息安全和大幅提高网络维护人员的工作效率。
The information security switch mechanism adopts the method of hardware and software combination to realize the information switch, and ensures the security of network terminal information.
该信息数据安全交换机制采用软硬件结合的方法,实现了信息数据的快速交换,保障了网络终端信息数据的安全。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
This article mainly explains the problems that influence the information security in the teaching of network in universities, and the solution of defending to the problem of information security.
本文主要阐述高等学校网络教学过程中所遇到的信息安全问题,以及针对信息安全问题的防御解决方法。
In this paper, the threat to information security, information security technology and information security management of information security for the campus network, where explored.
本文就信息安全威胁、信息安全技术和信息安全管理对校园网的信息安全进行探讨。
Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.
指挥自动化网络安全系统,基于信息存储、通信信道、计算机病毒及电磁辐射等安全性分析。
Chaotic encryption applies a new research approach to solve security of information in computer network and security communication inaugurate.
混沌加密在计算机网络和安全通信方面的应用为解决信息安全问题开辟了一种新的研究途径。
The key technology of the network and information security prototype system is studied, the network and information security test platform is introduced, and the testing methods are explained.
主要研究了网络与信息安全原型系统中的关键技术,介绍了网络与信息安全测试平台的组成,阐述了测试方法。
This console integrates various network security infrastructure and information security software, can look up information about security and operate security resource quickly.
该平台将各种网络安全设施和信息安全软件整合在一起,能够快速查询安全信息和操控安全资源。
Based on the methods of network security counting and combined with the feature for wideband community information server, a security counting system is designed in this paper.
在现有网络安全计费方法的基础上,结合宽带社区信息服务的特点,设计一种基于社区信息服务的安全计费集成系统。
Zhang Futai, male, born in 1965, professor, PhD supervisor. His research interests include information security, network security and cryptography.
张福泰,男,1965年出生,教授,博士生导师,研究领域包括信息安全、网络安全、密码学。
Network security in sensor technology is that sensor getting information or image transmit in network to insure information's security and reliability in network.
传感技术中网络安全问题是由传感器获取的信息或图象通过计算机网络传输时产生的,以保证网上获取信息的安全、可靠。
With the rapid development of the network technology, the security of network content becomes more and more important, even exceeds information security.
随着网络技术的飞速发展,内容安全显得越来越重要,甚至超过了信息安全。
With the rapid development of the network technology, the security of network content becomes more and more important, even exceeds information security.
随着网络技术的飞速发展,内容安全显得越来越重要,甚至超过了信息安全。
应用推荐