• Consider the effectiveness of the company's internal control system, including information technology security and control.

    评价公司内部控制系统有效性包括信息技术安全和控制。

    youdao

  • So how to ensure the inner network security has been very important in the research of the information technology security field.

    如何确保内网安全成为当前信息安全的一个重要研究领域

    youdao

  • As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.

    随着信息技术安全问题日益突出网络系统进行安全分析日益重要

    youdao

  • To the question, the paper presents a system evaluation method and software based on the evaluation Criteria for Information Technology Security (Common Criteria).

    针对这个问题,设计实现了基于信息技术安全性评估准则(通用标准)的系统评估方法软件

    youdao

  • "Each magstripe has three tracks of information," explains payments security expert Jeremy Gumbley, the chief technology officer of CreditCall, an electronic-payments company.

    电子支付公司CreditCall首席技术、支付安全专家杰里米·冈布利解释说:“每个磁条都信息轨迹。”

    youdao

  • This part's chapters contain a massive amount of information, reflecting the many aspects of digital security, and discussing the history as well as popular misconceptions for each technology.

    部分章节包含大量信息反映数字安全许多方面并且对于一个技术都讨论了其历史普遍误解

    youdao

  • The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.

    协议涵盖企业安全呼吁支持信息技术服务,对新出现网络威胁网络入侵提高认识

    youdao

  • Generally, developers don't expect the mobile cloud to be free from security threats any more than they expect that of any other information technology (it) model used to support business.

    通常开发人员认为移动免受安全威胁,就如同他们不认为其他任何信息技术(IT)模式支持业务一样。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务主要客户是美国情报和军事部门。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • If you are (or were) already working in information technology, you can pursue career training specifically in information security through online degree and certification programs.

    如果现在正在(曾经)信息产业工作,你可以参加在线信息安全培训,获得在线学位证明

    youdao

  • The Harris Sierra II? encryption technology provides the foundation for this level of information security.

    Harris公司的Sierra II加密技术信息安全水平奠定了基础

    youdao

  • The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S.Department of Homeland Security (DHS) and R.Chandrashekhar, Secretary, India Department of Information Technology.

    美国国土安全部(DHS)部长霍尔·卢特印度信息技术部部长坎德·拉赫·哈尔新德里签署这份谅解备忘录

    youdao

  • The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S. Department of Homeland Security (DHS) and R. Chandrashekhar, Secretary, India Department of Information Technology.

    美国国土安全部(DHS)部长霍尔·卢特和印度信息技术部部长坎德·拉赫·哈尔新德里签署这份谅解备忘录。

    youdao

  • The cyber security competition last Saturday was the fourth sponsored by the Neusoft Institute of Information Technology (NINT) in Guangdong.

    上周六广东东软信息技术学院(NINT)举办第四网络攻防大赛

    youdao

  • Compared with the past, the increasing complexity of information technology will make us more difficult to protect the security of enterprise network.

    过去相比信息技术日趋复杂我们保护企业网络安全的时候遇到更多困难

    youdao

  • Steganography is a new technology in the field of information security.

    隐写术信息安全领域一门新兴技术

    youdao

  • With the information age arrival and network technology broad application, people's requirement for security is higher and higher.

    随着信息时代到来网络技术的广泛应用人们安全性要求越来越高。

    youdao

  • According to the design requirements of safety technology, the establishment of industrial control information security management platform.

    按照等级保护安全技术设计要求建立工业控制信息安全管理平台

    youdao

  • By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.

    随着计算机信息技术网络技术迅猛发展信息与网络的安全形势日趋严峻和复杂化。

    youdao

  • Just in the last five years, new careers in fields like health information technology, cyber security, geospatial systems, these are fields a decade ago didn't even exist.

    过去年里像是健康信息技术网络安全地理空间系统这些新的职业领域几十年前甚至存在

    youdao

  • The information security guarantee system framework can be divided into the security management framework and the security technology framework.

    为了系统地、完整地构建企业信息安全保障体系,考虑技术体系管理体系共同构建。

    youdao

  • The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology.

    本文介绍安全电子邮件系统通过信息安全技术传统的电子邮件系统进行扩展完善。

    youdao

  • With the rapid development of information and communication technology, people attach more importance to the information security.

    随着信息通信技术飞速发展,信息安全日益受到人们的重视。

    youdao

  • With the rapid development of modern information technology, the information security plays a more and more important role.

    随着现代信息技术飞速发展,信息安全扮演越来越重要的角色。

    youdao

  • All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.

    这些导致企业无法成熟IT信息安全技术直接应用于工业控制系统信息安全保护

    youdao

  • All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.

    这些导致企业无法成熟IT信息安全技术直接应用于工业控制系统信息安全保护

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定