• The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology.

    本文介绍安全电子邮件系统通过信息安全技术传统的电子邮件系统进行扩展完善。

    youdao

  • It is the advanced network technology in the ERP system, so the information security is important for the ERP system.

    ERP系统中运用了先进网络技术,也正因为如此,ERP系统信息安全问题也是ERP系统正确实施而必须解决的问题。

    youdao

  • In the information security, the status authentication technology holds the extremely important status, is the information security system first checkpoint.

    信息安全中,身份认证技术据有极其主要位置信息安全体系的第一个关卡。

    youdao

  • In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.

    本文网络安全病毒防护主机系统安全三方面对信息系统的安全进行分析实现技术进行了探讨

    youdao

  • The measures in aspects of management, processes, technology, education and auditing etc were presented to establish a good information security system for a company through their organic combination.

    本文从管理流程技术教育审计方面出发,通过多项措施有机结合,企业打造一个良好信息安全体系

    youdao

  • In auditing system about network security, the technology about information catching and reverting is a difficult problem. At the same time, it is also foundation problem.

    信息捕捉还原技术网络安全技术审计系统实施的一个难点同时也是实现审计系统的基础。

    youdao

  • In addition, this paper suggests the countermeasures in technology and management to remove the hidden danger in the hospitals information security system.

    管理技术角度出发,提出相应的解决方案,消除医院信息系统安全隐患

    youdao

  • PKI is the latest information security technology in the world, and trust model is very important in PKI system.

    PKI目前国际上研究最热信息安全技术信任模型PKI体系中占有重要地位。

    youdao

  • In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.

    本文通过CORBA中间件技术实现基于策略安全信息系统从而解决棘手问题。

    youdao

  • Analyzed and discussed in this paper are two survivable system models based on information redundant partition technology-high reliability model and high security model.

    分析讨论基于信息分散的两种可存活系统模型——可靠和高安全模型

    youdao

  • Grading protection is an important tenet in information security technology. This tenet is also applicable to the network disaster-tolerant system.

    等级保护信息安全技术重要原则之一,作为信息安全重要组成部分网络容灾系统同样遵循一原则。

    youdao

  • Disaster backup and recovery technology can efficiently ensure the information system to work normally when the disaster occurs, so it becomes a very important field in information security.

    灾难备份恢复技术能够充分保证灾难发生信息系统正常工作目前已成为信息安全领域一个备受瞩目的研究方向

    youdao

  • Research of Information Security Technology in Electric Power Information System;

    目前,电力系统信息主要厂站端和调度端之间传输。

    youdao

  • Research of Information Security Technology in Electric Power Information System;

    目前,电力系统信息主要厂站端和调度端之间传输。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定