• F. Security audit engagements.

    安全审计业务。

    youdao

  • A model approach to security audit domain was proposed.

    介绍种基于图安全审计规划模型

    youdao

  • Firstly, the notion of distributed security audit system is introduced.

    首先阐述了分布式安全审计概念

    youdao

  • This paper is about how the web security audit work in the web security.

    本文着重分析网络安全审计如何网络安全中起作用的。

    youdao

  • While web security audit is an important part of the web security system.

    网络安全审计网络安全体系一个重要部分

    youdao

  • Thus it is meaningful to study and develop the network security audit system.

    研究开发网络安全审计系统具有重要的现实意义。

    youdao

  • Security audit technique is used to solve the security problems in the internal network.

    安全审计技术用来解决内部网络安全问题

    youdao

  • The model integrates one backup-restore and data mining module for the data of security audit.

    模型针对安全审计数据融合了一个备份恢复数据挖掘模块

    youdao

  • Packet capture is the key technology of intrusion detection system and network security audit.

    网络数据包捕获技术实现入侵检测网络安全审计关键技术

    youdao

  • In order to solve internal security problems, security audit system is proposed as a solution.

    为了解决内网安全问题,安全审计系统作为解决方案提出来

    youdao

  • More and more people pay attention to mail security audit, and the correlated work is carrying on.

    邮件安全审计越来越多的关注并且相关工作持续在进行。

    youdao

  • Working direction: network security management, design and analysis, network security audit, etc...

    工作方向网络安全相关管理设计分析,网络安全审计

    youdao

  • This security audit system mainly consists of three parts: data collection, data analysis and logging.

    本文安全审计系统主要数据采集、数据分析日志记录部分组成。

    youdao

  • Security audit catch more and more attentions. But most distributed security audit systems are immature.

    安全审计愈来愈受关注,但是大多数分布式安全审计系统仍不成熟。

    youdao

  • Security audit system deters the staff from doing illegal operations and guarantees the internal security.

    安全审计系统内部人员违规操作起到了威慑作用,保证内网安全。

    youdao

  • The research and application of network concentration security audit system is becoming the focus of world.

    网络集中安全审计系统研究应用已经成为国内外研究的热点。

    youdao

  • Working direction: security architecture specification, security architecture design, security audit, etc...

    工作方向安全架构规范制定、安全架构设计、安全审计

    youdao

  • Network security Audit is an important factor of security management, it record the action of user in this system.

    网络安全审计实现安全管理最重要的因素一个安全网络必须支持的功能特性。

    youdao

  • Intrusion detection technology is the core technology security audit is one of the important network security components.

    入侵检测技术安全审计中的核心技术之一,是网络安全防护重要组成部分

    youdao

  • In order to solve these problems, the dissertation works out a scheme of the network security audit based on data mining and realizes it.

    为了解决这些问题本文提出基于数据挖掘网络安全审计系统的方案加以实现。

    youdao

  • However, there are some problems in the process of network security audit such as low rate of accuracy, slow speed and poor self-adaptability.

    目前安全审计过程中普遍存在检测准确率、检测速度自适应性差等问题。

    youdao

  • The digital rights management security audit log descriptive model presents what will be recorded by digital rights management security audit log.

    数字权限管理安全审计日志记录的内容数字权限管理安全审计日志描述模型给出

    youdao

  • Through the tests and the analysis result, confirmed that the use of the data mining theory to the security audit analysis is feasible and effective.

    通过测试结果分析验证数据挖掘理论融入安全审计分析可行有效的。

    youdao

  • Application and data security make up of authentication, access control, security audit, data security, data integrality, data consistency and so on.

    其中应用数据安全主要包括身份认证访问控制、数据完整性保密性一致性和安全审计

    youdao

  • Finally, basing on the core idea of improved association rule learning algorithms, this thesis designs and achieves simple models of network security audit.

    最后根据改进关联规则学习算法核心思想,对网络安全审计模型进行了设计给予实现

    youdao

  • This paper studies related technologies and standards of security auditing, designs and implements a security audit system for various types of applications.

    本文通过研究安全审计相关技术标准设计实现了一个针对各类应用系统的安全审计系统

    youdao

  • Among the control challenges are insufficient security audit possibilities, and the fact that certification schemes and security metrics aren't adopted to cloud computing.

    控制方面的课题安全审计不足可能以及认证方式安全度量计算没有得到采用这样一个事实。

    youdao

  • Grid is different from the distributed system, it's sweeping and its configuration is more complex, so the demand to the log system and the security audit is also higher.

    网格不同于传统的分布式系统,网络规模大,结构更加复杂日志系统安全审计提出了更高要求

    youdao

  • Grid is different from the distributed system, it's sweeping and its configuration is more complex, so the demand to the log system and the security audit is also higher.

    网格不同于传统的分布式系统,网络规模大,结构更加复杂日志系统安全审计提出了更高要求

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定