Capture mechanism on network data packages is the basic analysis tools of network capability and network security systems.
数据包截获机制是网络性能分析工具和网络安全工具的实现基础。
String matching is a classic research area in computer science and plays an important role in different kinds of network security systems.
串匹配是计算机研究领域的一个经典问题,是众多网络安全系统中的关键技术之一。
But some network security systems cannot combine these technologies, cannot give attention to efficiency of system, and scarce of fine-granularity inner security management.
但现有的一些网络安全系统未能将上述技术有机地加以结合,不能很好地兼顾系统执行效率,对系统内部缺乏细粒度的安全管理。
For constructing network security systems, other measures preventing from being threaten and enhancing operators' quality are needed for the whole security plan in command automation system.
同时需在指挥自动化网络整体安全计划中加入其它防止威胁的措施,并加强人的素质教育。
This may result in systems placed in network segments with lower than required trust levels or vulnerable local security configurations.
这可能导致布置在网络中的系统需要的信任级别更低,或者会暴露本地的安全配置。
There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.
同样,有网络和无线安全技能的人群以及那些具有认证信息系统安全专业证书的也备受青睐。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
This article discusses the risks associated with systems using the same network security mechanism for multifactor or multi-layer authentication.
本文讨论使用相同的网络安全机制实现多因素或多层身份验证的风险。
You're so preoccupied with configuring your file systems properly and ensuring the security of your systems that you might routinely forget that the N in NFS stands for network.
您太过专注于合理配置文件系统和确保系统的安全性,因而可能经常忘记NFS中的N代表网络。
Kerberos is a popular security mechanism used by systems for network authentication and secure transmission of data.
Kerberos是用于网络身份验证和保护数据传输的最流行的安全机制。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
However, network security is not only a technical problem but also a comprehensive systems engineering of security strategy, security technology and security management.
然而,网络系统安全问题不仅仅是技术的问题,而是安全策略、安全技术与安全管理的综合过程,是一项系统工程。
The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.
数据库是所有信息系统的核心,数据库的安全通常是指其中所存数据的安全,是网络安全、信息安全的重要组成部分。
Review operational rules: review security practices, patches, and access points to network systems, applications, functions, and data.
审视运营规则:审核安全实践、补丁,以及到网络系统、应用、功能和数据的控制访问点。
Along with the wide application of computer and Internet, the security problem about systems or network becomes more and more important.
随着计算机和网络的日益普及,有关系统或网络的安全问题也日益突出。
Intrusion detection system is the key technologies to protect network systems security and is important way of network security, being a hot area of research and development.
入侵检测系统是保护网络系统安全的关键技术和重要手段,是网络安全领域的研究热点。
But the direction of the most core technology, we still lack, for example, wireless sensor network technology, wireless instrumentation, function security technology, safety instrumentation systems.
但是这些方向的大部分核心技术,我们依然欠缺,比如,无线传感网络技术、无线仪表、功能安全技术、安全仪表系统。
Emergency Response is regarded as the key problem of dynamic security of computer and network systems.
应急响应是维护计算机和网络系统动态安全性的关键问题。
This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.
本文描述AT M网络中的信息安全、可能受到的威胁、安全结构和端系统之间的鉴别技术。
To ensure systems security must think over network, operating system, application and operation demand etc in the synthetical information management systems of electric power corporations.
在电力企业的综合信息管理系统中,必须从网络、操作系统、应用程序和业务需求等各方面来保证系统的安全。
As the high performance computer network systems with reliability and security become increasingly important in the recent years, the computer network management system attracts more attentions.
近年来,随着可靠、安全的高性能计算机网络系统变得越来越重要,计算机网络管理系统也得到更多的关注。
In this major, you'll learn to calculate the security needs of computer and network systems.
计算机系统安全专业学习计算计算机和网络系统的安全需求。
In this paper, a scalable network vulnerability scanner system is presented, which can respond quickly to the latest discovered security holes, and greatly improve the defense capability of systems.
提出一种可扩展的网络弱点扫描系统能够在较短的时间内对新发现的安全问题迅速做出反应,极大地提高了系统的安全防御能力。
Software engineering, network and information security and information systems project management.
研究方向为软件工程、网络与信息安全和信息系统项目管理。
Software engineering, network and information security and information systems project management.
研究方向为软件工程、网络与信息安全和信息系统项目管理。
应用推荐