By IDMAS prototype realization, I have a more profound understanding of IDMAS, and proved that IDMAS in the current network information security technology in the role.
通过对IDMAS原型系统的分析与设计,对ID MAS有了更深刻的理解,并且证明了ID MAS在当前网络信息安全技术中的作用。
While the identity authentication technology are network security and information system security the first barrier, it is time network information security technology a very important research field.
而身份认证技术是网络安全和信息系统安全的第一道屏障,它是网络时代信息安全技术非常重要的一个研究领域。
The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.
该协议涵盖企业安全,并呼吁支持信息技术服务,对新出现的网络威胁和网络入侵提高认识。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
Compared with the past, the increasing complexity of information technology will make us more difficult to protect the security of enterprise network.
与过去相比,信息技术的日趋复杂会让我们在保护企业网络安全的时候遇到更多的困难。
With the information age arrival and network technology broad application, people's requirement for security is higher and higher.
随着信息时代的到来和网络技术的广泛应用,人们对安全性的要求越来越高。
By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.
随着计算机信息技术与网络技术的迅猛发展,信息与网络的安全形势也日趋严峻和复杂化。
To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.
进行信息网络安全技术和标准的研究,开发相应的安全产品,并从事安全服务工作。
The main research content of this paper is network information detection technology and network security evaluation method.
本文主要研究的内容是网络信息的探测技术和建立在信息探测基础上的安全评估方法。
The key one is the information passway setting up security to structure the electronic government in CATV network, safe information passway setting-up must be with the aid of PKI technology.
在CATV网络上构建电子政务最关键的是要建立起安全的信息通道,安全的信息通道的建立必须借助于PKI技术。
It is the advanced network technology in the ERP system, so the information security is important for the ERP system.
ERP系统中运用了先进的网络技术,也正因为如此,ERP系统中信息的安全问题也是ERP系统正确实施而必须解决的问题。
At last, the popular technology about computer network virus detection and information and network security is summarized.
最后,对计算机网络病毒的检测和当前网络安全的主流技术进行了分析。
Nowadays, in the computer network environment, all the confidentiality, security, integrality, usability and nonrepudiation of the information must be resolved by encrypting technology.
如今在计算机网络环境下信息的机密性、安全性、完整性、可用性等特性,都需要采用密码技术来解决。
This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.
本文描述AT M网络中的信息安全、可能受到的威胁、安全结构和端系统之间的鉴别技术。
The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.
通过设置密码和蓝牙技术的安全机制,提供了信息家电网络和远程控制系统的安全保障。
P2P network technology offers information resource for people, it increases availability and robustness of P2P network, but brings new security problems of network too.
P 2 P网络技术在使人们享受信息资源,增强网络可用性、健壮性的同时,也带来了新的网络安全问题。
Information Hiding is a new network security technology, it adopted the confidential information to other hidden vector to transmit this is not easily found by others.
信息隐藏技术是一门新的网络安全技术,它通过把保密信息隐藏到其它载体中来传输,这样不等闲被别人发现。
In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.
本文从网络安全、病毒防护、主机系统安全三方面对信息系统的安全进行分析,并对实现技术进行了探讨。
With the wide application of computer and network technology on libraries, the security problem of the library information network becomes unavoidably more and more important.
随着计算机及网络技术广泛应用于图书馆,使得图书馆信息网络安全问题成了不容回避的重要课题。
This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.
本课题在现有的网络通信技术、数据库技术和信息安全技术的基础上设计并实现了新型的安全即时通信系统。
This paper give detail description of SI-MIS feature and relevant realization, key technology such as network data storage scheme and information security strategy are also included.
本文详细描述了其具体功能结构的设计和实现,包括网络数据存储方案和信息安全实现等关键技术。
The information security base are discussed, including security criteria, security expression model, system frame of the network security, some typical security technology.
论述了信息安全基础:安全标准,安全表述模型,网络安全体系结构:几种典型的安全技术。
With the rapid development of the network technology, the security of network content becomes more and more important, even exceeds information security.
随着网络技术的飞速发展,内容安全显得越来越重要,甚至超过了信息安全。
As the contrary of information recovery technology, the network attack technology is playing a most important role in the field of information security.
作为信息安全防御技术的对立面,网络渗透技术在信息安全领域里扮演着重要的角色。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
The key technology of the network and information security prototype system is studied, the network and information security test platform is introduced, and the testing methods are explained.
主要研究了网络与信息安全原型系统中的关键技术,介绍了网络与信息安全测试平台的组成,阐述了测试方法。
As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.
随着信息技术安全问题的日益突出,对网络系统进行安全分析日益重要。
As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.
随着信息技术安全问题的日益突出,对网络系统进行安全分析日益重要。
应用推荐