The three technologies together with other many information security technologies provide a comprehensive security guarantee for information security of network.
这三大技术及其它许多信息安全技术一起为网络的信息安全提供了综合的安全保障。
This article briefs the hidden security threat for Information System of Manufacturing Enterprises, introduces main Information security Technologies, gives examples from the author's experience.
阐述企业信息安全隐患及主要安全技术的阐述,结合本人工作的企业做案例分析。
WHO employs a range of technologies and security measures to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.
世界卫生组织采用一系列技术和安全措施以防范我们系统上所保存信息的丢失、滥用、未经授权的存取或公布、修改或损毁。
Unlike other outlets, we provide a high security anonymous drop box fortified by cutting-edge cryptographic information technologies.
和其他媒体不同的是,我们提供一个高度安全的匿名泄密箱,这些信息箱绑定了尖端的加密信息技术。
In addition, some related network security technologies are adopted so as to ensure the security of information exchanges during the implementation procedure.
同时该系统采用相关网络安全技术,保证了执行任务过程中信息交互的安全性。
With the extensive application of multimedia and network technologies, the security of multimedia information is focused more than ever before.
随着多媒体技术和网络技术的广泛应用,多媒体信息内容的安全保护倍受关注。
With the widespread use of information and network technologies, information Security has become study focus.
随着信息和网络技术的广泛应用,信息安全己成为研究的热点问题。
Program security is gradually becoming an active field in information security technology. It mainly includes program vulnerabilities analysis and program security protection technologies.
程序安全是信息安全研究的一个重要方向,主要研究程序缺陷分析和安全保护技术等。
In this dissertation, we study the technologies and application of multimedia information security in the area of digital watermarking.
本论文主要探讨有关数字图像信息安全的数字水印技术。
Security of information can be obtained by means of two essential technologies: encryption and authentication.
为实现信息安全,需要采用两个基本手段:数据加密和身份认证。
With the extensive applications of the network and other information technologies, the security of network systems has become critical.
随着网络和其它信息技术的广泛应用,网络系统的安全变得至关重要。
Core Security Technologies notified us that admin pages added by certain plugins could be viewed by unprivileged users, resulting in information being leaked.
核心安全技术公司通知我们,管理网页添加某些插件可以被无特权的用户浏览,导致信息泄漏。
Technologies of cryptography are the core of information security.
密码技术是信息安全的核心技术。
The information security technology relates to a variety of areas, but the cryptogram technology is the core of all security technologies.
尽管安全技术涉及的范围十分广泛,但密码技术是各种安全技术的核心。
The security of network is closely related to the interests of our information society, and the technologies of the security of network are important roles in information technologies.
网络安全密切关系到信息社会各方面的利益,其技术也成为信息技术中不可或缺的组成部分。
We use a variety of systems and security technologies and procedures to protect your personal information from unauthorized access, use or disclosure.
我们使用各种制度、安全技术和程序等措施来保护您的个人信息不被未经授权的访问、使用或泄漏。
We use a variety of security technologies and procedures to protect your personal information will not be use or disclosure.
我们使用各种安全技术和程序来保护您的个人信息不被使用或泄漏。
We use a variety of security technologies and procedures to help protect your personal information from unauthorized access, use, or disclosure.
我们使用安全技术和程序来保护个人资料,以防止未经授权的资料存取、使用或公开。
Technologies of cryptography, especially encryption technologies are the core of information security.
密码技术,特别是加密技术是信息安全技术的核心。
Absrtact: Zero - knowledge proof has been one of the key technologies to be applied in identity authentication in the fields of information security.
摘要:零知识证明已经成为信息安全领域身份认证的关键技术之一。
Digital watermarking technologies have aroused board attention in academy and industry, because of their brand applications, and have been an advanced direction of information security.
数字水印技术,由于其崭新的应用前景,已经受到学术界和工业界的广泛关注,成为了信息安全技术的前沿方向。
Tencent has obtained patents relating to the technologies in various areas: instant messaging, e-commerce, online payment services, search engine, information security, gaming, and many more.
腾讯在即时通信、电子商务、在线支付、搜索引擎、信息安全以及游戏等方面都拥有了相当数量的专利申请。
The cryptography which is core of traditional information security and information hiding techniques are not mutually contradictory, competing technologies, but complementary.
传统的以密码学为核心技术的信息安全和信息隐藏技术不是互相矛盾、互相竞争的技术,而是互补的。
Research on the Theories and Key Technologies of Information System Security Evaluation;
信息安全风险评估是考察信息系统安全性的一个重要环节。
Research on the Theories and Key Technologies of Information System Security Evaluation;
信息安全风险评估是考察信息系统安全性的一个重要环节。
应用推荐