• The three technologies together with other many information security technologies provide a comprehensive security guarantee for information security of network.

    三大技术其它许多信息安全技术一起网络信息安全提供综合的安全保障

    youdao

  • This article briefs the hidden security threat for Information System of Manufacturing Enterprises, introduces main Information security Technologies, gives examples from the author's experience.

    阐述企业信息安全隐患主要安全技术阐述,结合本人工作的企业做案例分析。

    youdao

  • WHO employs a range of technologies and security measures to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.

    世界卫生组织采用一系列技术安全措施防范我们系统所保存信息丢失滥用未经授权存取公布修改损毁

    youdao

  • Unlike other outlets, we provide a high security anonymous drop box fortified by cutting-edge cryptographic information technologies.

    其他媒体不同的是,我们提供一个高度安全匿名泄密,这些信息箱绑定了尖端的加密信息技术

    youdao

  • In addition, some related network security technologies are adopted so as to ensure the security of information exchanges during the implementation procedure.

    同时该系统采用相关网络安全技术保证执行任务过程信息交互安全性

    youdao

  • With the extensive application of multimedia and network technologies, the security of multimedia information is focused more than ever before.

    随着多媒体技术网络技术广泛应用,多媒体信息内容安全保护倍受关注。

    youdao

  • With the widespread use of information and network technologies, information Security has become study focus.

    随着信息网络技术广泛应用,信息安全成为研究热点问题

    youdao

  • Program security is gradually becoming an active field in information security technology. It mainly includes program vulnerabilities analysis and program security protection technologies.

    程序安全信息安全研究一个重要方向主要研究程序缺陷分析安全保护技术等

    youdao

  • In this dissertation, we study the technologies and application of multimedia information security in the area of digital watermarking.

    论文主要探讨有关数字图像信息安全数字水印技术

    youdao

  • Security of information can be obtained by means of two essential technologies: encryption and authentication.

    实现信息安全需要采用两个基本手段:数据加密身份认证

    youdao

  • With the extensive applications of the network and other information technologies, the security of network systems has become critical.

    随着网络其它信息技术广泛应用,网络系统安全变得至关重要

    youdao

  • Core Security Technologies notified us that admin pages added by certain plugins could be viewed by unprivileged users, resulting in information being leaked.

    核心安全技术公司通知我们管理网页添加某些插件可以特权用户浏览导致信息泄漏

    youdao

  • Technologies of cryptography are the core of information security.

    密码技术信息安全核心技术

    youdao

  • The information security technology relates to a variety of areas, but the cryptogram technology is the core of all security technologies.

    尽管安全技术涉及范围十分广泛密码技术各种安全技术核心

    youdao

  • The security of network is closely related to the interests of our information society, and the technologies of the security of network are important roles in information technologies.

    网络安全密切关系信息社会各方面利益技术成为信息技术不可或缺的组成部分。

    youdao

  • We use a variety of systems and security technologies and procedures to protect your personal information from unauthorized access, use or disclosure.

    我们使用各种制度安全技术程序等措施保护个人信息不被未经授权的访问、使用泄漏。

    youdao

  • We use a variety of security technologies and procedures to protect your personal information will not be use or disclosure.

    我们使用各种安全技术程序保护个人信息使用泄漏

    youdao

  • We use a variety of security technologies and procedures to help protect your personal information from unauthorized access, use, or disclosure.

    我们使用安全技术程序保护个人资料,以防止未经授权的资料存取、使用公开

    youdao

  • Technologies of cryptography, especially encryption technologies are the core of information security.

    密码技术特别是加密技术信息安全技术核心

    youdao

  • Absrtact: Zero - knowledge proof has been one of the key technologies to be applied in identity authentication in the fields of information security.

    摘要知识证明已经成为信息安全领域身份认证关键技术之一

    youdao

  • Digital watermarking technologies have aroused board attention in academy and industry, because of their brand applications, and have been an advanced direction of information security.

    数字水印技术由于崭新应用前景已经受到学术界工业界广泛关注,成为信息安全技术的前沿方向

    youdao

  • Tencent has obtained patents relating to the technologies in various areas: instant messaging, e-commerce, online payment services, search engine, information security, gaming, and many more.

    腾讯在即时通信、电子商务在线支付搜索引擎信息安全以及游戏等方面都拥有了相当数量专利申请。

    youdao

  • The cryptography which is core of traditional information security and information hiding techniques are not mutually contradictory, competing technologies, but complementary.

    传统密码学为核心技术信息安全和信息隐藏技术不是互相矛盾互相竞争技术而是互补的。

    youdao

  • Research on the Theories and Key Technologies of Information System Security Evaluation;

    信息安全风险评估考察信息系统安全性个重要环节

    youdao

  • Research on the Theories and Key Technologies of Information System Security Evaluation;

    信息安全风险评估考察信息系统安全性个重要环节

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定