We can provide technique security for customers, because we have a complete industry chain and a powerful technical fleet to control quality.
完整的产业链,雄厚的技术研发队伍, 使富凯公司能更精确的控制产品质量,为客户提供有力的技术保障。
This technique improved the security by separating the user information from the password data.
这项技术通过将用户信息与密码数据分离而提高了安全性。
This technique lets you can develop your JSF applications without considering security issues.
使用这项技术,可以在不用考虑安全问题的情况下开发JSF应用程序。
This is probably the most widely used technique for signing or encrypting messages with WS-Security, and it does have some advantages.
这是使用WS - Security进行消息签名或加密中最广泛使用的技术,而且它有一些优势。
This is the fundamental concept behind the privilege-separation security technique employed by qmail.
这就是被qmail使用的在其基础概念之后的权限分离安全技术。
The callback technique lets you use any verification technique you want as an extension of the Rampart security handling.
回调技术可以让您使用任何检查技巧来扩展Rampart安全处理。
The security technique described in this article is fairly simple, and so are the Acegi facilities used to implement it.
本文所述的安全技术非常的简单,所以 Acegi使用这些技术实现安全性。
Therefore, the research of Internet security technique has been one of focuses in the communication and an important research area of the information science.
因此,网络安全技术的研究已成为现在计算机和通信界的一个热点,并且成为现在信息科学的一个重要研究领域。
Host security is becoming an urgent problem that every computer user has to face. Host hole scanning technique is an important security technology to provide security guarantee for host.
主机安全正成为每一个计算机用户都面临的紧迫问题,主机漏洞扫描技术就是为主机安全提供保证的一项重要的安全技术。
An digital image watermark algorithm is proposed based on the synergetic neural network, combined with encryption technique, to guarantee its robustness and security.
为保证图像数字水印的鲁棒性和安全性,结合加密技术,提出了一种使用协同神经网络的图像数字水印算法。
Firstly, this method USES the continuation power flow (CPF) technique and both of static security and transient stability constraints are considered.
算法采用连续潮流(CPF)技术并考虑了系统的静态安全约束和暂态稳定约束。
The author introduce the structure, function, feature, main technique parameters and system operation condition of the main dam security monitor system of the Chengbihe reservoir.
介绍澄碧河水库大坝安全监测系统的结构、功能、特点,主要技术参数及系统运行情况;
Intrusion detection technique, which as a kind of solution of protecting network security, has been paid more and more attention by people.
入侵检测技术作为保护网络安全的一种解决方案,越来越受到人们的重视。
The SAR technique allows one to capture both sides of the market as the security fluctuates up and down over time.
特区技术允许一个捕捉双方市场的安全上下波动一段时间。
The category of the digital watermarking technique belongs to the information security area.
数字水印技术属于信息安全的范畴。
As a sort of security mechanism, Role Based Access Control (RBAC) technique has been one of the hotspots in current research.
基于角色的访问控制(RBAC)作为一种安全机制,是当前研究的热点之一。
Security control is a key technique problem of finance computerizing information system.
安全性控制是金融电子化信息系统的技术关键。
Digital signature is an important technique in security field, and blind digital signature differs from traditional signature in characteristics, which make it possible to apply electronic vote.
数字签名是安全领域中的一项重要技术,盲签名有着与传统签名不同的特性,这使得电子投票的应用成为可能。
Data encrypting and data underwrite are key technique of solving the problem of network security.
数据加密和数字签名是解决网格安全问题的关键技术。
Whether power network is rational or not is coming into being the long influence to technique capability, economy benefit, security, high quality and running.
电网结构合理与否,对电网的技术性能和经济效益以及安全、优质、经济、高效运行将产生长期的影响。
The key technique includes remote cooperation frame, database security coding and so on.
关键技术涉及远程协作网架构、数据库安全保密等。
The TEMPEST technique is a new subject in the information security field.
TEMPEST技术是信息安全领域的一个专门研究领域。
Various safety guard technologies emerge as the times require, and Virtual Private Network(VPN) technique with its practicability, security, simple and low cost acquired extensive application.
各种安全防范技术应运而生,其中虚拟专用网络(VPN)技术以其实用性、安全性和简单、低成本获得了广泛的应用。
BCH codes are a subset of the class of linear block codes that have good error correction capability. Information hiding is a new technique in information security field.
BCH纠错编码是线性分组码的一种,有较好的纠错能力,信息隐藏是近年来信息安全领域出现的新技术。
The network information security technique commonly includes authentication, authorization, audit, data privacy, data integrity and so on.
网络信息安全技术一般包括身份认证、授权控制、审计、数据保密和数据完整性等几个方面。
It is the important guarantee of forming current network security to instruction detection technique.
入侵检测技术是构成当今网络安全的重要保障。
Discussing the research method that resolve the adaptation of security system using distributed object technique and data mining.
探讨了利用分布式对象技术和数据挖掘技术来解决网络安全系统自适应性的研究思路。
Discussing the research method that resolve the adaptation of security system using distributed object technique and data mining.
探讨了利用分布式对象技术和数据挖掘技术来解决网络安全系统自适应性的研究思路。
应用推荐