• There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.

    同样网络无线安全技能人群以及那些具有认证信息系统安全专业证书的也备受青睐

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务主要客户是美国情报和军事部门。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • You're so preoccupied with configuring your file systems properly and ensuring the security of your systems that you might routinely forget that the N in NFS stands for network.

    专注合理配置文件系统确保系统安全性,因而可能经常忘记NFS中的N代表网络。

    youdao

  • Kerberos is a popular security mechanism used by systems for network authentication and secure transmission of data.

    Kerberos用于网络身份验证保护数据传输最流行安全机制

    youdao

  • However, network security is not only a technical problem but also a comprehensive systems engineering of security strategy, security technology and security management.

    然而网络系统安全问题不仅仅技术问题,而是安全策略、安全技术安全管理综合过程,是一项系统工程

    youdao

  • Review operational rules: review security practices, patches, and access points to network systems, applications, functions, and data.

    审视运营规则审核安全实践补丁以及网络系统应用功能数据控制访问

    youdao

  • The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.

    数据库所有信息系统核心,数据库的安全通常其中所存数据的安全,是网络安全、信息安全的重要组成部分

    youdao

  • Intrusion detection system is the key technologies to protect network systems security and is important way of network security, being a hot area of research and development.

    入侵检测系统保护网络系统安全关键技术重要手段,是网络安全领域研究热点

    youdao

  • Along with the wide application of computer and Internet, the security problem about systems or network becomes more and more important.

    随着计算机网络日益普及有关系统网络安全问题也日益突出

    youdao

  • Emergency Response is regarded as the key problem of dynamic security of computer and network systems.

    应急响应维护计算机网络系统动态安全性关键问题

    youdao

  • This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.

    本文描述AT M网络中的信息安全可能受到的威胁、安全结构系统之间鉴别技术

    youdao

  • To ensure systems security must think over network, operating system, application and operation demand etc in the synthetical information management systems of electric power corporations.

    电力企业综合信息管理系统中,必须网络操作系统应用程序业务需求各方面保证系统的安全

    youdao

  • In this major, you'll learn to calculate the security needs of computer and network systems.

    计算机系统安全专业学习计算计算机网络系统安全需求

    youdao

  • As the high performance computer network systems with reliability and security become increasingly important in the recent years, the computer network management system attracts more attentions.

    近年来,随着可靠安全高性能计算机网络系统变得越来越重要,计算机网络管理系统也得到更多关注。

    youdao

  • Software engineering, network and information security and information systems project management.

    研究方向为软件工程网络信息安全和信息系统项目管理

    youdao

  • In this paper, a scalable network vulnerability scanner system is presented, which can respond quickly to the latest discovered security holes, and greatly improve the defense capability of systems.

    提出一种可扩展网络弱点扫描系统能够在较短的时间内发现安全问题迅速做出反应极大地提高系统的安全防御能力

    youdao

  • To ensure systems security must think over network, operating system, application and operation demand etc in the synthetically information management systems of electric power corporations.

    电力企业综合信息管理系统中,必须网络操作系统应用程序业务需求各方面保证系统的安全

    youdao

  • Telecom infrastructure should fully consider the security of nodes, and improve the competence of future network by adding rapid restoring and emergency response systems to the network.

    电信基本建设考虑节点安全增加快速恢复应急保障设施等手段,增强未来网络生存能力

    youdao

  • But some network security systems cannot combine these technologies, cannot give attention to efficiency of system, and scarce of fine-granularity inner security management.

    现有的一些网络安全系统未能上述技术有机地加以结合,不能很好地兼顾系统执行效率,系统内部缺乏粒度的安全管理。

    youdao

  • Capture mechanism on network data packages is the basic analysis tools of network capability and network security systems.

    数据包截获机制网络性能分析工具网络安全工具实现基础

    youdao

  • Traditional ID authentication combines a user name and a password, which is not sufficient enough to assure the security of application systems in an environment full of hackers network attacks.

    传统身份认证只是一种用户口令的简单组合充满黑客和攻击网络环境下这种认证方式已经不能充分保证应用系统安全

    youdao

  • With the extensive applications of the network and other information technologies, the security of network systems has become critical.

    随着网络其它信息技术广泛应用,网络系统安全变得至关重要

    youdao

  • String matching is a classic research area in computer science and plays an important role in different kinds of network security systems.

    匹配计算机研究领域经典问题,是众多网络安全系统中的关键技术之一

    youdao

  • String matching is a classic research area in computer science and plays an important role in different kinds of network security systems.

    匹配计算机研究领域经典问题,是众多网络安全系统中的关键技术之一

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定