Information systems security manager.
信息系统安全管理经理。
CISSP (Certified Information Systems Security Professional).
CISSP(信息系统安全认证专家)。
Strengthening information systems security control to protect key customers and our company's information confidentiality, integrity and availability.
强化资讯系统之安全控管措施,保护重要客户及本公司资料之机密性、完整性及可用性。
Finally, an illustrative instance is given to demonstrate its rationality and feasibility. Thus it may provide a new way for assessing information systems security.
实例分析表明,该方法合理有效,可为信息系统安全风险评估提供新思路。
There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.
同样,有网络和无线安全技能的人群以及那些具有认证信息系统安全专业证书的也备受青睐。
The company's information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.
该公司的信息安全团队几乎立即发现了攻击,并采取积极的行动来保护所有系统和数据。
The company’s information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.
该公司的信息安全团队几乎立即发现了攻击,并采取积极的行动来保护所有系统和数据。
Because there are many degrees of freedom and many different sources of this information, some users tend to overlook security issues and deploy systems that are not particularly secure.
这些信息有许多自由度和许多不同的来源,所以一些用户往往会忽视安全性问题,部署的系统不够安全。
Security breaches on systems that run intermediaries can result in serious security problems, like loss of secure information and message integrity, which will raise questions of trust.
运行中介体的系统上出现的安全性违规会导致严重的安全性问题,如丢失安全信息和消息完整性,这将引起信任问题。
WHO employs a range of technologies and security measures to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.
世界卫生组织采用一系列技术和安全措施以防范我们系统上所保存信息的丢失、滥用、未经授权的存取或公布、修改或损毁。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
Better security and lower risk by enabling an organization to identify and authenticate a user once, and then use that identity information across multiple systems, including external partners.
支持组织识别和验证用户一次,然后跨多个系统(包括外部合作伙伴)使用那个身份信息,从而提高安全性并降低风险。
The CIA triad is a widely used information assurance (ia) model that identifies confidentiality, integrity, and availability as the fundamental security characteristics of all information systems.
CIA三部曲是广泛使用的信息保证(Information Assurance,IA)模型,此模型将保密性、完整性和可用性定义为所有信息系统的基础安全特征。
The security controls presented align with NIST special publication 800-53 Revision 3, Recommended security controls for Federal Information Systems and organizations.
这份安全管理是基于NIST特殊发表刊物800-53Revision3,联邦信息系统和组织的安全管理建议。
The Auditing subsystem enables the systems administrator to record security-relevant information, which can be analyzed later to detect potential and actual violations of the system's security policy.
系统管理员可以通过审计系统记录与安全性相关的信息,以后可以分析这些信息,寻找违反和可能违反系统安全策略的地方。
The benefits of information security-protecting computer systems and networks-are inherently invisible: if threats have been averted, things work as normal.
信息安全的利益在于——保护计算机系统和网络——具有其余生俱来的的不可见属性:如果危险已经转移,则一切都会正常工作。
Just in the last five years, new careers in fields like health information technology, cyber security, geospatial systems, these are fields a decade ago didn't even exist.
仅在过去的五年里,像是健康信息技术、网络安全、地理空间系统这些新的职业领域在几十年前甚至不存在。
The information security in electric power systems becomes the important composing part of the producing, dealing and managing of electric power corporations.
电力系统信息安全已经成为电力企业生产、经营和管理的重要组成部分。
The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.
数据库是所有信息系统的核心,数据库的安全通常是指其中所存数据的安全,是网络安全、信息安全的重要组成部分。
Security of information security products – information security special product technology is a security product specifically developed to enhance the security of information systems.
信息安全专用产品安全——信息安全专用产品技术是专门为增强信息系统的安全性开发的安全产品。
At last, main intrusion methods and security compromization targeted at information systems are discussed.
最后,论述了在网络环境中主要采用入侵手段以及信息系统面临的主要安全威胁。
The security problem of XML data existed in logistic information systems. The application of the XML encryption, XML data signature and XKMS insure the security of logistic information.
当前物流信息系统中存在着XML数据安全的问题,根据XML加密、XML数字签名和XML密钥管理规范服务(XKMS)三种核心标准,在数据交换中确保XML数据的安全。
This paper delves into the depths of current hospital information systems and reveals disturbing but significant security problems in these systems.
本文深入到当前的医院信息系统内部,揭示出这些系统中令人不安的却又极其重要的安全问题。
For special information security systems, the paper states a class of interesting problems neglected before.
对于特殊信息安全系统而言,陈述了一类以前所忽略的有趣问题。
Users in different environments have different requirements for information security, so it's required that users can customize the levels of information security in their systems.
不同环境下的用户对于信息安全有着不同的需求,因此需要使系统中信息的安全性可以让用户定制。
Users in different environments have different requirements for information security, so it's required that users can customize the levels of information security in their systems.
不同环境下的用户对于信息安全有着不同的需求,因此需要使系统中信息的安全性可以让用户定制。
应用推荐