• Information systems security manager.

    信息系统安全管理经理

    youdao

  • CISSP (Certified Information Systems Security Professional).

    CISSP(信息系统安全认证专家)。

    youdao

  • Strengthening information systems security control to protect key customers and our company's information confidentiality, integrity and availability.

    强化资讯系统安全控管措施保护重要客户公司资料之机密性、完整性可用性

    youdao

  • Finally, an illustrative instance is given to demonstrate its rationality and feasibility. Thus it may provide a new way for assessing information systems security.

    实例分析表明方法合理有效,信息系统安全风险评估提供思路

    youdao

  • There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.

    同样网络无线安全技能人群以及那些具有认证信息系统安全专业证书的也备受青睐

    youdao

  • The company's information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.

    公司信息安全团队几乎立即发现攻击采取积极行动保护所有系统数据

    youdao

  • The company’s information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.

    公司信息安全团队几乎立即发现攻击采取积极行动保护所有系统数据

    youdao

  • Because there are many degrees of freedom and many different sources of this information, some users tend to overlook security issues and deploy systems that are not particularly secure.

    这些信息许多自由度许多不同来源,所以一些用户往往忽视安全性问题部署系统不够安全

    youdao

  • Security breaches on systems that run intermediaries can result in serious security problems, like loss of secure information and message integrity, which will raise questions of trust.

    运行中介体系统出现的安全性违规导致严重的安全性问题丢失安全信息消息完整性引起信任问题

    youdao

  • WHO employs a range of technologies and security measures to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.

    世界卫生组织采用一系列技术安全措施防范我们系统所保存信息丢失滥用未经授权存取公布修改损毁

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务主要客户是美国情报和军事部门。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • Better security and lower risk by enabling an organization to identify and authenticate a user once, and then use that identity information across multiple systems, including external partners.

    支持组织识别验证用户一次然后多个系统(包括外部合作伙伴)使用那个身份信息,从而提高安全性降低风险

    youdao

  • The CIA triad is a widely used information assurance (ia) model that identifies confidentiality, integrity, and availability as the fundamental security characteristics of all information systems.

    CIA三部曲广泛使用信息保证(Information Assurance,IA)模型,此模型将保密性完整性可用性定义所有信息系统基础安全特征

    youdao

  • The security controls presented align with NIST special publication 800-53 Revision 3, Recommended security controls for Federal Information Systems and organizations.

    这份安全管理是基于NIST特殊发表刊物800-53Revision3联邦信息系统组织的安全管理建议

    youdao

  • The Auditing subsystem enables the systems administrator to record security-relevant information, which can be analyzed later to detect potential and actual violations of the system's security policy.

    系统管理员可以通过审计系统记录安全性相关信息以后可以分析这些信息,寻找违反可能违反系统安全策略的地方。

    youdao

  • The benefits of information security-protecting computer systems and networks-are inherently invisible: if threats have been averted, things work as normal.

    信息安全利益在于——保护计算机系统网络——具有其余生俱来的的不可见属性:如果危险已经转移,则一切都会正常工作

    youdao

  • Just in the last five years, new careers in fields like health information technology, cyber security, geospatial systems, these are fields a decade ago didn't even exist.

    过去年里像是健康信息技术网络安全地理空间系统这些新的职业领域几十年前甚至存在

    youdao

  • The information security in electric power systems becomes the important composing part of the producing, dealing and managing of electric power corporations.

    电力系统信息安全已经成为电力企业生产经营管理重要组成部分

    youdao

  • The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.

    数据库所有信息系统核心,数据库的安全通常其中所存数据的安全,是网络安全、信息安全的重要组成部分

    youdao

  • Security of information security productsinformation security special product technology is a security product specifically developed to enhance the security of information systems.

    信息安全专用产品安全——信息安全专用产品技术专门增强信息系统安全性开发安全产品。

    youdao

  • At last, main intrusion methods and security compromization targeted at information systems are discussed.

    最后论述了网络环境中主要采用入侵手段以及信息系统面临的主要安全威胁

    youdao

  • The security problem of XML data existed in logistic information systems. The application of the XML encryption, XML data signature and XKMS insure the security of logistic information.

    当前物流信息系统存在XML数据安全问题,根据XML加密、XML数字签名XML密钥管理规范服务(XKMS)三种核心标准,数据交换中确保XML数据的安全。

    youdao

  • This paper delves into the depths of current hospital information systems and reveals disturbing but significant security problems in these systems.

    本文深入当前医院信息系统内部,揭示出这些系统令人不安的极其重要安全问题

    youdao

  • For special information security systems, the paper states a class of interesting problems neglected before.

    对于特殊信息安全系统而言陈述了一类以前所忽略有趣问题

    youdao

  • Users in different environments have different requirements for information security, so it's required that users can customize the levels of information security in their systems.

    不同环境下用户对于信息安全有着不同的需求因此需要使系统信息的安全性可以让用户定制

    youdao

  • Users in different environments have different requirements for information security, so it's required that users can customize the levels of information security in their systems.

    不同环境下用户对于信息安全有着不同的需求因此需要使系统信息的安全性可以让用户定制

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定