Consider the effectiveness of the company's internal control system, including information technology security and control.
评价公司内部控制系统的有效性,包括信息技术安全和控制。
So how to ensure the inner network security has been very important in the research of the information technology security field.
如何确保内网的安全成为当前信息安全的一个重要研究领域。
As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.
随着信息技术安全问题的日益突出,对网络系统进行安全分析日益重要。
To the question, the paper presents a system evaluation method and software based on the evaluation Criteria for Information Technology Security (Common Criteria).
针对这个问题,设计实现了基于信息技术安全性评估准则(通用标准)的系统评估方法和软件。
"Each magstripe has three tracks of information," explains payments security expert Jeremy Gumbley, the chief technology officer of CreditCall, an electronic-payments company.
电子支付公司CreditCall的首席技术官、支付安全专家杰里米·冈布利解释说:“每个磁条都有三条信息轨迹。”
This part's chapters contain a massive amount of information, reflecting the many aspects of digital security, and discussing the history as well as popular misconceptions for each technology.
本部分的章节包含大量信息,反映了数字安全的许多方面,并且对于每一个技术都讨论了其历史和普遍的误解。
The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.
该协议涵盖企业安全,并呼吁支持信息技术服务,对新出现的网络威胁和网络入侵提高认识。
Generally, developers don't expect the mobile cloud to be free from security threats any more than they expect that of any other information technology (it) model used to support business.
通常,开发人员不认为移动云能免受安全威胁,就如同他们不认为其他任何信息技术(IT)模式能支持业务一样。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
If you are (or were) already working in information technology, you can pursue career training specifically in information security through online degree and certification programs.
如果你现在正在(或曾经在)信息产业工作,你可以参加在线信息安全的培训,获得在线学位或证明。
The Harris Sierra II? encryption technology provides the foundation for this level of information security.
Harris公司的Sierra II加密技术为信息安全水平奠定了基础。
The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S.Department of Homeland Security (DHS) and R.Chandrashekhar, Secretary, India Department of Information Technology.
美国国土安全部(DHS)副部长简霍尔·卢特和印度信息技术部部长坎德·拉赫·哈尔在新德里签署了这份谅解备忘录。
The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S. Department of Homeland Security (DHS) and R. Chandrashekhar, Secretary, India Department of Information Technology.
美国国土安全部(DHS)副部长简霍尔·卢特和印度信息技术部部长坎德·拉赫·哈尔在新德里签署了这份谅解备忘录。
The cyber security competition last Saturday was the fourth sponsored by the Neusoft Institute of Information Technology (NINT) in Guangdong.
上周六,广东东软信息技术学院(NINT)举办了第四届网络攻防大赛。
Compared with the past, the increasing complexity of information technology will make us more difficult to protect the security of enterprise network.
与过去相比,信息技术的日趋复杂会让我们在保护企业网络安全的时候遇到更多的困难。
Steganography is a new technology in the field of information security.
隐写术是信息安全领域一门新兴的技术。
With the information age arrival and network technology broad application, people's requirement for security is higher and higher.
随着信息时代的到来和网络技术的广泛应用,人们对安全性的要求越来越高。
According to the design requirements of safety technology, the establishment of industrial control information security management platform.
按照等级保护安全技术设计要求,建立工业控制信息安全管理平台。
By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.
随着计算机信息技术与网络技术的迅猛发展,信息与网络的安全形势也日趋严峻和复杂化。
Just in the last five years, new careers in fields like health information technology, cyber security, geospatial systems, these are fields a decade ago didn't even exist.
仅在过去的五年里,像是健康信息技术、网络安全、地理空间系统这些新的职业领域在几十年前甚至不存在。
The information security guarantee system framework can be divided into the security management framework and the security technology framework.
为了系统地、完整地构建企业信息安全保障体系,应考虑技术体系和管理体系共同构建。
The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology.
本文介绍的安全电子邮件系统通过信息安全技术对传统的电子邮件系统进行扩展和完善。
With the rapid development of information and communication technology, people attach more importance to the information security.
随着信息与通信技术的飞速发展,信息安全日益受到人们的重视。
With the rapid development of modern information technology, the information security plays a more and more important role.
随着现代信息技术的飞速发展,信息安全扮演着越来越重要的角色。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
应用推荐