• The result of the research is beneficial to the research and design of the information security system.

    研究结果对于信息安全系统研究设计具有一定参考价值。

    youdao

  • Therefore, how to set up an efficient modern information security system becomes a highlighted question increasingly.

    因此如何建立一个高效现代信息安全体系日益成为突出问题

    youdao

  • In recent years, intrusion detection system (IDS), being the important part of the information security system, has gained extensive attentions.

    近年来,入侵检测系统IDS作为信息系统安全重要组成部分得到广泛重视

    youdao

  • Have carried on research to its respect of forming etc, so as to ensure the full play on function of information security system of scientific research.

    构成等方面进行研究确保科研信息保障体系作用发挥

    youdao

  • In addition, this paper suggests the countermeasures in technology and management to remove the hidden danger in the hospitals information security system.

    管理技术角度出发,提出相应的解决方案,消除医院信息系统安全隐患

    youdao

  • In the information security, the status authentication technology holds the extremely important status, is the information security system first checkpoint.

    信息安全中,身份认证技术据有极其主要位置信息安全体系的第一个关卡。

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • OS was the bridge between hardware and upper layer software of which security is a very important component element of the whole information security system.

    操作系统链接计算机硬件上层软件用户的桥梁安全性计算机信息系统安全重要组成部分

    youdao

  • Last, the simulations of hardware and software show that the information security system based on chaos algorithm have high security level and high performance-value ratio.

    最后通过硬件软件仿真结果,表明了本文所设计的基于混沌算法信息安全系统能够较好的保障信息安全,系统的性价比较高。

    youdao

  • In an information world, they are to coexist for a long time as different component parts of the same information security system, giving play to their own strong points and superiority.

    信息社会中,它们作为同一信息保障体系不同组成部分发挥各自特点优势长期共存下去。

    youdao

  • Traditional information security system can only safeguard information transmitting process, but can't control the decoded media data. So it can't prevent the illegal copy of the private.

    信息安全技术采取密码学技术因控制信息传布入程,对于解码后的媒体数据却难以控制,因而无法阻止合法使用者的非法拷贝传布

    youdao

  • Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.

    差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,目前的信息安全系统构成严峻挑战。

    youdao

  • The measures in aspects of management, processes, technology, education and auditing etc were presented to establish a good information security system for a company through their organic combination.

    本文从管理流程技术教育审计方面出发,通过多项措施有机结合,企业打造一个良好信息安全体系

    youdao

  • In contrast, a system may require identifying information in order to handle matters such as security or quality of service.

    相比而言,为了处理诸如安全服务质量之类事情系统需要标识信息了。

    youdao

  • But security experts warn that attackers could use their foothold on the system to start stealing users' and customers' credit card Numbers and personal information.

    但是安全专家警告攻击者可以利用他们系统中的立足点偷窃用户客户信用卡账号个人信息。

    youdao

  • The server's security system validates the user against its security registry and obtains other security information about the user.

    服务器安全系统针对安全注册中心用户进行验证获得关于用户的安全信息

    youdao

  • You can also perform an audit after receiving information that would lead you to believe someone is trying to compromise the security of your system.

    可以使相信有人试图威胁系统安全信息后,执行审计

    youdao

  • For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.

    有关如何使用registrySYSTE m属性控制用户登录更多信息阅读AIX安全指南”和参考资料部分所列出文章

    youdao

  • To coordinate the building of state information security protection system;

    协调国家信息安全保障体系建设

    youdao

  • Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.

    同样如果系统侵入并受到破坏,那么数据库数据库访问信息存储正在运行Web服务器机器上会引发安全性问题

    youdao

  • The operating system confirms whether the bob/bobpsw combination is valid or not, and returns this information to the security plug-in.

    操作系统确认bob/bobpsw组合是否有效,把信息返回安全插件

    youdao

  • Using WS-Security, the credit card information can instead be sent in encrypted form that can be decrypted only by the banking system that issues the payment confirmation.

    使用WS-Security信用卡信息可以加密的格式传递,并且发出付款确认银行系统解密

    youdao

  • The Homeland Security Department wants information about the availability of a commercial electronic performance management system for its human resources functions.

    美国国土安全部需要了解商用电子绩效管理系统实用性用于人力资源管理。

    youdao

  • Delete important information or destroy data, improve system security, the password does not meet the requirements of computer networking in the block after repeated warnings.

    删除重要信息破坏数据提高系统安全行,密码符合要求计算机多次警告阻断连网

    youdao

  • Therefore, the lack of information security awareness training, to make up for deficiencies in the information system.

    所以单纯信息安全意识培训不足以弥补人信息系统中的缺陷。

    youdao

  • So the establishment of a complete information security training system is the trend of The Times.

    那么建立一个完整信息安全培训体系就是大势所趋了。

    youdao

  • Based on our systemic model of information security, we design an electronic seal system.

    基于我们提出信息安全模型设计电子印章系统

    youdao

  • Based on our systemic model of information security, we design an electronic seal system.

    基于我们提出信息安全模型设计电子印章系统

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定