• By IDMAS prototype realization, I have a more profound understanding of IDMAS, and proved that IDMAS in the current network information security technology in the role.

    通过对IDMAS原型系统分析与设计,对ID MAS深刻的理解并且证明了ID MAS当前网络信息安全技术中的作用

    youdao

  • While the identity authentication technology are network security and information system security the first barrier, it is time network information security technology a very important research field.

    身份认证技术网络安全和信息系统安全一道屏障网络时代信息安全技术非常重要一个研究领域。

    youdao

  • The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.

    协议涵盖企业安全呼吁支持信息技术服务,对新出现网络威胁网络入侵提高认识

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务主要客户是美国情报和军事部门。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • Compared with the past, the increasing complexity of information technology will make us more difficult to protect the security of enterprise network.

    过去相比信息技术日趋复杂我们保护企业网络安全的时候遇到更多困难

    youdao

  • With the information age arrival and network technology broad application, people's requirement for security is higher and higher.

    随着信息时代到来网络技术的广泛应用人们安全性要求越来越高。

    youdao

  • By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.

    随着计算机信息技术网络技术迅猛发展信息与网络的安全形势日趋严峻和复杂化。

    youdao

  • To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.

    进行信息网络安全技术标准研究开发相应的安全产品从事安全服务工作

    youdao

  • The main research content of this paper is network information detection technology and network security evaluation method.

    本文主要研究内容网络信息探测技术建立在信息探测基础上的安全评估方法

    youdao

  • The key one is the information passway setting up security to structure the electronic government in CATV network, safe information passway setting-up must be with the aid of PKI technology.

    CATV网络上构建电子政务关键建立安全信息通道安全信息通道的建立必须借助于PKI技术

    youdao

  • It is the advanced network technology in the ERP system, so the information security is important for the ERP system.

    ERP系统中运用了先进网络技术,也正因为如此,ERP系统信息安全问题也是ERP系统正确实施而必须解决的问题。

    youdao

  • At last, the popular technology about computer network virus detection and information and network security is summarized.

    最后计算机网络病毒检测当前网络安全主流技术进行了分析。

    youdao

  • Nowadays, in the computer network environment, all the confidentiality, security, integrality, usability and nonrepudiation of the information must be resolved by encrypting technology.

    如今计算机网络环境下信息机密性安全性完整性可用性等特性,需要采用密码技术来解决

    youdao

  • This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.

    本文描述AT M网络中的信息安全可能受到的威胁、安全结构系统之间鉴别技术

    youdao

  • The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.

    通过设置密码蓝牙技术安全机制提供信息家电网络远程控制系统的安全保障

    youdao

  • P2P network technology offers information resource for people, it increases availability and robustness of P2P network, but brings new security problems of network too.

    P 2 P网络技术使人们享受信息资源增强网络可用性、健壮的同时,带来了新的网络安全问题

    youdao

  • Information Hiding is a new network security technology, it adopted the confidential information to other hidden vector to transmit this is not easily found by others.

    信息隐藏技术一门新的网络安全技术,通过保密信息隐藏其它载体传输这样等闲别人发现

    youdao

  • In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.

    本文网络安全病毒防护主机系统安全三方面对信息系统的安全进行分析实现技术进行了探讨

    youdao

  • With the wide application of computer and network technology on libraries, the security problem of the library information network becomes unavoidably more and more important.

    随着计算机网络技术广泛应用图书馆,使得图书馆信息网络安全问题成了不容回避重要课题。

    youdao

  • This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.

    课题现有网络通信技术数据库技术信息安全技术基础设计实现新型的安全即时通信系统。

    youdao

  • This paper give detail description of SI-MIS feature and relevant realization, key technology such as network data storage scheme and information security strategy are also included.

    本文详细描述具体功能结构的设计实现,包括网络数据存储方案信息安全实现关键技术

    youdao

  • The information security base are discussed, including security criteria, security expression model, system frame of the network security, some typical security technology.

    论述了信息安全基础:安全标准,安全表述模型网络安全体系结构几种典型安全技术。

    youdao

  • With the rapid development of the network technology, the security of network content becomes more and more important, even exceeds information security.

    随着网络技术飞速发展内容安全显得越来越重要甚至超过了信息安全。

    youdao

  • As the contrary of information recovery technology, the network attack technology is playing a most important role in the field of information security.

    作为信息安全防御技术对立面网络渗透技术信息安全领域里扮演重要角色

    youdao

  • Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.

    基于安全系统全面信息安全策略网络安全技术网络安全管理两个层次上研究内部网安全性

    youdao

  • The key technology of the network and information security prototype system is studied, the network and information security test platform is introduced, and the testing methods are explained.

    主要研究了网络信息安全原型系统中的关键技术介绍了网络与信息安全测试平台的组成,阐述测试方法

    youdao

  • As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.

    随着信息技术安全问题日益突出网络系统进行安全分析日益重要

    youdao

  • As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.

    随着信息技术安全问题日益突出网络系统进行安全分析日益重要

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定