The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S.Department of Homeland Security (DHS) and R.Chandrashekhar, Secretary, India Department of Information Technology.
美国国土安全部(DHS)副部长简霍尔·卢特和印度信息技术部部长坎德·拉赫·哈尔在新德里签署了这份谅解备忘录。
The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S. Department of Homeland Security (DHS) and R. Chandrashekhar, Secretary, India Department of Information Technology.
美国国土安全部(DHS)副部长简霍尔·卢特和印度信息技术部部长坎德·拉赫·哈尔在新德里签署了这份谅解备忘录。
If you are (or were) already working in information technology, you can pursue career training specifically in information security through online degree and certification programs.
如果你现在正在(或曾经在)信息产业工作,你可以参加在线信息安全的培训,获得在线学位或证明。
The cyber security competition last Saturday was the fourth sponsored by the Neusoft Institute of Information Technology (NINT) in Guangdong.
上周六,广东东软信息技术学院(NINT)举办了第四届网络攻防大赛。
Steganography is a new technology in the field of information security.
隐写术是信息安全领域一门新兴的技术。
Just in the last five years, new careers in fields like health information technology, cyber security, geospatial systems, these are fields a decade ago didn't even exist.
仅在过去的五年里,像是健康信息技术、网络安全、地理空间系统这些新的职业领域在几十年前甚至不存在。
The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology.
本文介绍的安全电子邮件系统通过信息安全技术对传统的电子邮件系统进行扩展和完善。
Speaker Recognition (Voice Print Recognition) technology has been widely used in the information security domain due to its unique advantages.
说话人识别技术(声纹识别技术)以其独特优势在信息安全领域的应用逐渐增大。
The key one is the information passway setting up security to structure the electronic government in CATV network, safe information passway setting-up must be with the aid of PKI technology.
在CATV网络上构建电子政务最关键的是要建立起安全的信息通道,安全的信息通道的建立必须借助于PKI技术。
Information security problem is one of the key problems in modern Internet. by active defending feature intrusion detection technology is widely recognized and applied.
在信息安全问题日益突出的互联网中,入侵检测技术以其主动防御的特性,得到越来越广泛的重视和应用。
It is the advanced network technology in the ERP system, so the information security is important for the ERP system.
ERP系统中运用了先进的网络技术,也正因为如此,ERP系统中信息的安全问题也是ERP系统正确实施而必须解决的问题。
To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.
进行信息网络安全技术和标准的研究,开发相应的安全产品,并从事安全服务工作。
JCE is a new technology in recent information security area.
JCE是近几年来信息安全领域出现的新技术。
Nowadays, in the computer network environment, all the confidentiality, security, integrality, usability and nonrepudiation of the information must be resolved by encrypting technology.
如今在计算机网络环境下信息的机密性、安全性、完整性、可用性等特性,都需要采用密码技术来解决。
In the information security technology research, two different points of view and directions have come into being.
反映在信息安全技术的研究上,形成两个完全不同的角度和方向。
This paper discusses information security threats and cryptosystems, and describes standardizations, organizations, development and applications and export restriction in cryptologic technology field.
本文论述信息安全威胁和密码体制,描述密码技术领域的标准化、组织机构、开发应用和出口限制。
This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.
本文描述AT M网络中的信息安全、可能受到的威胁、安全结构和端系统之间的鉴别技术。
In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.
本文从网络安全、病毒防护、主机系统安全三方面对信息系统的安全进行分析,并对实现技术进行了探讨。
In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.
本文通过CORBA中间件技术,来实现基于策略的安全信息系统,从而解决这一棘手问题。
Cryptology is the kernel technology in the field of information security, it has extensive commercial prospect in many fields.
密码技术是信息安全领域的核心技术,在当今社会的许多领域都有着广泛的应用前景。
In order to work efficiently on the information security, the paper mainly concerns on filtering the documents of the short messages by applying the concept space technology.
为了实现该类信息的内容安全监控,论文主要研究了采用概念网技术来实现对短信息中不良文本的过滤。
In the information security, the status authentication technology holds the extremely important status, is the information security system first checkpoint.
在信息安全中,身份认证技术据有极其主要的位置,是信息安全体系的第一个关卡。
Digital watermarking is a new technology of information hiding and information security protection in digital age.
数字水印技术是数字化时代信息隐藏和信息安全保护的一种新型技术。
PKI is the latest information security technology in the world, and trust model is very important in PKI system.
PKI是目前国际上研究最热的信息安全技术。信任模型在PKI体系中占有重要地位。
The measures in aspects of management, processes, technology, education and auditing etc were presented to establish a good information security system for a company through their organic combination.
本文从管理、流程、技术、教育、审计等方面出发,通过对多项措施的有机结合,为企业打造一个良好的信息安全体系。
As the contrary of information recovery technology, the network attack technology is playing a most important role in the field of information security.
作为信息安全防御技术的对立面,网络渗透技术在信息安全领域里扮演着重要的角色。
In this paper, the threat to information security, information security technology and information security management of information security for the campus network, where explored.
本文就信息安全威胁、信息安全技术和信息安全管理对校园网的信息安全进行探讨。
In addition, this paper suggests the countermeasures in technology and management to remove the hidden danger in the hospitals information security system.
并从管理、技术角度出发,提出了相应的解决方案,以消除医院信息系统的安全隐患。
In addition, this paper suggests the countermeasures in technology and management to remove the hidden danger in the hospitals information security system.
并从管理、技术角度出发,提出了相应的解决方案,以消除医院信息系统的安全隐患。
应用推荐