• Whether the security of operating system is determining directly safety of information, thus the control for in system resource use and file system safe become more and more important.

    操作系统安全与否直接决定着信息是否安全因而系统文件系统安全方面在系统资源使用方面的控制就变得越来越重要

    youdao

  • First, give a detailed introduction of RFID system and introduce the attacks and threats against information security and privacy in RFID system.

    首先介绍RFID系统组成、工作原理阐述了RFID系统中针对电子标签信息安全性隐私性威胁

    youdao

  • After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.

    信息系统第三测试完成业务单位完成信息系统安全等级保护备案测评整改工作

    youdao

  • The conformation, control method and the information treatment ability of a control system are crucial factors to the reliability, security and stability of the system.

    系统构成控制方式以及信息处理能力对于控制系统的可靠性安全性稳定性而言决定性因素

    youdao

  • The security of ERP information management system was considered firstly when the small and medium enterprises implemented ERP system.

    ERP信息管理系统软件安全性中小型企业实施ERP系统必须考虑的问题。

    youdao

  • With the expansion of the usable range of accounting information system and deepening of using degree, security of accounting information system has become a critical and urgent issue for enterprises.

    随着企业会计信息系统使用范围扩大使用程度加深,会计信息系统的安全性成为企业面临的一个关键紧迫问题

    youdao

  • This paper discusses the behave form and the system structure of information system and analyses the faced security risk of information system.

    本文论述了信息系统表现形态系统结构分析了信息系统面临安全风险

    youdao

  • The method can solve the question of the secret key security in larger system and provide a valuable guarantee system of information security.

    方法能够解决较大系统密钥安全性问题提供了一个安全可行信息安全保障体系

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • A lot of work has been done towards the higher security of information system, and many mature information system prototypes have been developed.

    长期以来,人们针对信息系统安全问题作了大量研究已经许多成熟的信息系统安全模型

    youdao

  • Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.

    数据完整性信息系统安全目标之一该文描述了一个时间相关数据库管理系统完整性策略模型

    youdao

  • This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.

    本文介绍了用户信息系统数据库安全性控制基本概念控制模型,以及在多用户信息系统中安全性控制的实现方法

    youdao

  • This introduces the designed of the residence district intelligentized system from three aspects: security defence system, material management system and information network system.

    安全防范子系统、物业管理子系统信息网络子系统三个方面介绍住宅小区智能化系统设计

    youdao

  • The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.

    操作系统安全信息系统安全基石访问控制则是操作系统安全机制重要内容。

    youdao

  • Data audit is one of the most important parts in information system audit, it has important significance to maintain the security and stability of information system.

    数据审计作为信息系统审计重要组成部分,对信息系统安全稳定具有十分重要的意义

    youdao

  • In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.

    本文网络安全病毒防护主机系统安全三方面对信息系统的安全进行分析实现技术进行了探讨

    youdao

  • Security measures of the enterprise information system data were discussed in this article on protecting data and system.

    保护数据和主机系统角度,阐述企业信息系统数据的安全保护措施

    youdao

  • The purpose of the project is analyzing the current status of the information system, finding the limitation, and constructing the security architecture for the information system.

    项目目标目前铁路信息系统现状进行分析找出安全方面的缺陷漏洞,并基础上构造铁路信息系统安全构架

    youdao

  • Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.

    传统信息系统安全风险评估系统运行维护环境出发,分析漏洞威胁

    youdao

  • To safeguard the information system of mobile communication, it is urgent to make effective, maneuverable and scientific security risk evaluation system.

    为了保障移动通信信息系统安全制定有效的操作性的、的安全风险评估体系当务之急。

    youdao

  • Platform system SecurityPlatform system security is the base of the platform security, and gives strongly support to platform information security.

    平台系统安全整个平台安全基础平台信息安全提供了有力支持

    youdao

  • It will greatly assure the national information system security to construct and normalize the national information on the basis of constructing the information system security frame.

    构建信息系统安全架构高度出发来全面构建和规范我国信息安全,有效保障我国的信息系统安全。

    youdao

  • This method can be used in other continuous chaotic system and the application of chaotic system in information security and secure communication field will be accelerated.

    该法应用其他连续混沌系统中,有助于加快混沌系统信息安全保密通信网络领域中的应用。

    youdao

  • The standardization of Unified ETC System will be involved with wireless communication, CPU IC, information security, system integration, testing etc.

    联网电子收费系统涉及无线通讯智能卡技术、信息安全、系统集成测试技术多个领域。

    youdao

  • In recent years, intrusion detection system (IDS), being the important part of the information security system, has gained extensive attentions.

    近年来,入侵检测系统IDS作为信息系统安全重要组成部分得到广泛重视

    youdao

  • From data of accountant to information system of accountant, the paper builds the security control system of corporation accountant in the circumstance of E-commerce.

    本文点(会计数据)面(会计信息系统)构建电子商务环境下企业会计安全控制体系

    youdao

  • The paper also presents the layout of security safeguard system of information system and discusses implement policy of security safeguard system of information system.

    本文还给出了信息系统安全保障体系规划方式构建信息系统安全保障体系实施策略

    youdao

  • The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.

    主要介绍网络安全准入控制系统组成相关技术技术铁路信息系统中如何应用加以探讨

    youdao

  • Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.

    信息安全风险评估信息系统安全工程重要组成部分,也是建立信息安全保障体系的基础

    youdao

  • This paper explicates that applying DEBUG program can effect hard dish backup and recover of information system; applying the recover method can improve security of micro computer system.

    阐述应用DEBUG系统程序硬盘系统区信息备份恢复方法,应用方法提高微机系统安全

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定