• The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S.Department of Homeland Security (DHS) and R.Chandrashekhar, Secretary, India Department of Information Technology.

    美国国土安全部(DHS)部长霍尔·卢特印度信息技术部部长坎德·拉赫·哈尔新德里签署这份谅解备忘录

    youdao

  • The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S. Department of Homeland Security (DHS) and R. Chandrashekhar, Secretary, India Department of Information Technology.

    美国国土安全部(DHS)部长霍尔·卢特和印度信息技术部部长坎德·拉赫·哈尔新德里签署这份谅解备忘录。

    youdao

  • If you are (or were) already working in information technology, you can pursue career training specifically in information security through online degree and certification programs.

    如果现在正在(曾经)信息产业工作,你可以参加在线信息安全培训,获得在线学位证明

    youdao

  • The cyber security competition last Saturday was the fourth sponsored by the Neusoft Institute of Information Technology (NINT) in Guangdong.

    上周六广东东软信息技术学院(NINT)举办第四网络攻防大赛

    youdao

  • Steganography is a new technology in the field of information security.

    隐写术信息安全领域一门新兴技术

    youdao

  • Just in the last five years, new careers in fields like health information technology, cyber security, geospatial systems, these are fields a decade ago didn't even exist.

    过去年里像是健康信息技术网络安全地理空间系统这些新的职业领域几十年前甚至存在

    youdao

  • The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology.

    本文介绍安全电子邮件系统通过信息安全技术传统的电子邮件系统进行扩展完善。

    youdao

  • Speaker Recognition (Voice Print Recognition) technology has been widely used in the information security domain due to its unique advantages.

    说话人识别技术(识别技术)独特优势信息安全领域的应用逐渐增大。

    youdao

  • The key one is the information passway setting up security to structure the electronic government in CATV network, safe information passway setting-up must be with the aid of PKI technology.

    CATV网络上构建电子政务关键建立安全信息通道安全信息通道的建立必须借助于PKI技术

    youdao

  • Information security problem is one of the key problems in modern Internet. by active defending feature intrusion detection technology is widely recognized and applied.

    信息安全问题日益突出互联网中,入侵检测技术以其主动防御特性,得到越来越广泛的重视和应用。

    youdao

  • It is the advanced network technology in the ERP system, so the information security is important for the ERP system.

    ERP系统中运用了先进网络技术,也正因为如此,ERP系统信息安全问题也是ERP系统正确实施而必须解决的问题。

    youdao

  • To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.

    进行信息网络安全技术标准研究开发相应的安全产品从事安全服务工作

    youdao

  • JCE is a new technology in recent information security area.

    JCE近几年信息安全领域出现的技术

    youdao

  • Nowadays, in the computer network environment, all the confidentiality, security, integrality, usability and nonrepudiation of the information must be resolved by encrypting technology.

    如今计算机网络环境下信息机密性安全性完整性可用性等特性,需要采用密码技术来解决

    youdao

  • In the information security technology research, two different points of view and directions have come into being.

    反映信息安全技术研究上,形成两个完全不同角度方向

    youdao

  • This paper discusses information security threats and cryptosystems, and describes standardizations, organizations, development and applications and export restriction in cryptologic technology field.

    本文论述信息安全威胁密码体制,描述密码技术领域标准化组织机构开发应用出口限制

    youdao

  • This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.

    本文描述AT M网络中的信息安全可能受到的威胁、安全结构系统之间鉴别技术

    youdao

  • In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.

    本文网络安全病毒防护主机系统安全三方面对信息系统的安全进行分析实现技术进行了探讨

    youdao

  • In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.

    本文通过CORBA中间件技术实现基于策略安全信息系统从而解决棘手问题。

    youdao

  • Cryptology is the kernel technology in the field of information security, it has extensive commercial prospect in many fields.

    密码技术信息安全领域核心技术,当今社会许多领域有着广泛应用前景。

    youdao

  • In order to work efficiently on the information security, the paper mainly concerns on filtering the documents of the short messages by applying the concept space technology.

    为了实现该类信息内容安全监控论文主要研究采用概念技术来实现信息不良文本过滤

    youdao

  • In the information security, the status authentication technology holds the extremely important status, is the information security system first checkpoint.

    信息安全中,身份认证技术据有极其主要位置信息安全体系的第一个关卡。

    youdao

  • Digital watermarking is a new technology of information hiding and information security protection in digital age.

    数字水印技术数字化时代信息隐藏信息安全保护一种新型技术

    youdao

  • PKI is the latest information security technology in the world, and trust model is very important in PKI system.

    PKI目前国际上研究最热信息安全技术信任模型PKI体系中占有重要地位。

    youdao

  • The measures in aspects of management, processes, technology, education and auditing etc were presented to establish a good information security system for a company through their organic combination.

    本文从管理流程技术教育审计方面出发,通过多项措施有机结合,企业打造一个良好信息安全体系

    youdao

  • As the contrary of information recovery technology, the network attack technology is playing a most important role in the field of information security.

    作为信息安全防御技术对立面网络渗透技术信息安全领域里扮演重要角色

    youdao

  • In this paper, the threat to information security, information security technology and information security management of information security for the campus network, where explored.

    本文信息安全威胁、信息安全技术信息安全管理校园网信息安全进行探讨

    youdao

  • In addition, this paper suggests the countermeasures in technology and management to remove the hidden danger in the hospitals information security system.

    管理技术角度出发,提出相应的解决方案,消除医院信息系统安全隐患

    youdao

  • In addition, this paper suggests the countermeasures in technology and management to remove the hidden danger in the hospitals information security system.

    管理技术角度出发,提出相应的解决方案,消除医院信息系统安全隐患

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定