Syncing security information for remote service authentication and techniques to consistently brand and personalize applications are just a couple of examples of how best to use the bridge.
为远程服务验证同步安全信息,以及提供品牌一致的技术,以及打造个性化应用程序,这些仅仅演示了桥接的一部分最佳应用。
Michael Fricklas, Viacom's general counsel said: "We are investigating techniques, including anonymization, to enhance the security of information that will be produced."
Viacom的首席法律顾问Michael Fricklas说,“我们正在研究相关技术(包括匿名化处理)来增加将会生成的信息的安全性。”
With the proliferation of computer and network techniques, database security has become an important research area of information security.
随着计算机与网络技术的广泛应用,数据库安全技术已成为信息安全的重要研究领域。
According to the key techniques above, the paper designs system of network security evaluation based on information detection in chapter 3, and supplies method for the system realization.
基于前面的关键技术,第四章详细设计了基于信息探测的网络安全评估系统的方案并给出了具体实现的方法。
The digital signatures have many applications in a lot of field for it cannot be substituted by other techniques in information security, including authentication, data integrity, and non-repudiation.
数字签名技术在身份认证、数据完整性等方面具有其它技术所无法替代的作用,在信息安全领域得到广泛的应用。
Our work is a part of a key research project of Fujian province-Information Network Security Protection Techniques (No. 2001H103).
本课题是福建省重点科研项目《信息网络安全防护技术》(项目编号2001H103)的一部分。
The relative techniques are discussed and the suggestions for solving the security problems of the information systems are provided.
对相关技术问题进行了讨论,提出了解决信息系统安全问题的建议。
Steganography and steganalysis are of great significance to information security in that they become very important techniques on information war in the Internet age.
掩密及掩密分析技术已成为互联网时代信息战的重要手段,对于信息安全具有重要意义。
An efficient way to solve the problem of information content security is to introduce information content security Ontology (ICSO) into the systems and techniques.
为提高信息内容的安全性,将信息内容安全本体(ICSO)引入相关系统与技术。
We make use of various security software and techniques to ensure that any information you provide through our website will not be susceptible to unauthorised access.
我们大量使用最先进的安全软件和技术,这将保证您储存在标准写作公司的个人信息不会受到外界侵犯。
The cryptography which is core of traditional information security and information hiding techniques are not mutually contradictory, competing technologies, but complementary.
传统的以密码学为核心技术的信息安全和信息隐藏技术不是互相矛盾、互相竞争的技术,而是互补的。
The cryptography which is core of traditional information security and information hiding techniques are not mutually contradictory, competing technologies, but complementary.
传统的以密码学为核心技术的信息安全和信息隐藏技术不是互相矛盾、互相竞争的技术,而是互补的。
应用推荐