• Current information security defense for security issues of the storage appeared polarization.

    当前针对存储安全问题信息安全防御出现了两极分化

    youdao

  • Negative defense will only lead to be attacked and only depending on sealing off the existed system leaks can't solve information security problems.

    消极防御只能被动挨打单纯依靠封堵现有系统漏洞不能根本上解决信息安全问题

    youdao

  • The core technology of information security lies in attack and defense, that is, attack technology and defense technology, only to master the attack technology in order to achieve better security.

    信息安全核心技术在于攻防”,即攻击技术防御技术,只有掌握攻击技术才能更好做到安全防御。

    youdao

  • This thesis researches two technology measures of appling information assurance, they are Defense-in-Depth and Security Health Care.

    本文研究了实施信息保障两项技术措施纵深防御安全保健

    youdao

  • Information security not only requires a guarantee on technology and law, but also needs a line of moral defense.

    信息安全不仅需要技术法律层面保障而且需要构筑必要的道德防线。

    youdao

  • The first defense for the security of information on the network is ID authentication. A practical method of ID authentication is put forward to conquer the abuse of normal remote login mechanism.

    网络信息安全一道防线身份认证,文章基于一般远程登录机制弊端提出一种实用的身份认证方法

    youdao

  • The first defense for the security of information on the network is ID authentication. A practical method of ID authentication is put forward to conquer the abuse of normal remote login mechanism.

    网络信息安全一道防线身份认证,文章基于一般远程登录机制弊端提出一种实用的身份认证方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定