• Syncing security information for remote service authentication and techniques to consistently brand and personalize applications are just a couple of examples of how best to use the bridge.

    远程服务验证同步安全信息以及提供品牌一致技术,以及打造个性化应用程序,这些仅仅演示桥接一部分最佳应用。

    youdao

  • Michael Fricklas, Viacom's general counsel said: "We are investigating techniques, including anonymization, to enhance the security of information that will be produced."

    Viacom首席法律顾问Michael Fricklas,“我们正在研究相关技术包括匿名化处理)增加会生成的信息安全性。”

    youdao

  • With the proliferation of computer and network techniques, database security has become an important research area of information security.

    随着计算机网络技术广泛应用,数据库安全技术成为信息安全重要研究领域

    youdao

  • According to the key techniques above, the paper designs system of network security evaluation based on information detection in chapter 3, and supplies method for the system realization.

    基于前面关键技术,第四详细设计基于信息探测网络安全评估系统的方案给出了具体实现的方法

    youdao

  • The digital signatures have many applications in a lot of field for it cannot be substituted by other techniques in information security, including authentication, data integrity, and non-repudiation.

    数字签名技术身份认证、数据完整性等方面具有其它技术无法替代作用,在信息安全领域得到广泛的应用

    youdao

  • Our work is a part of a key research project of Fujian province-Information Network Security Protection Techniques (No. 2001H103).

    课题福建省重点科研项目《信息网络安全防护技术》(项目编号2001H103一部分

    youdao

  • The relative techniques are discussed and the suggestions for solving the security problems of the information systems are provided.

    相关技术问题进行了讨论,提出解决信息系统安全问题建议。

    youdao

  • Steganography and steganalysis are of great significance to information security in that they become very important techniques on information war in the Internet age.

    密分析技术成为互联网时代信息战重要手段,对于信息安全具有重要意义

    youdao

  • An efficient way to solve the problem of information content security is to introduce information content security Ontology (ICSO) into the systems and techniques.

    为提高信息内容安全性信息内容安全本体(ICSO)引入相关系统技术

    youdao

  • We make use of various security software and techniques to ensure that any information you provide through our website will not be susceptible to unauthorised access.

    我们大量使用最先进安全软件技术,这保证储存在标准写作公司的个人信息不会受到外界侵犯。

    youdao

  • The cryptography which is core of traditional information security and information hiding techniques are not mutually contradictory, competing technologies, but complementary.

    传统密码学为核心技术信息安全和信息隐藏技术不是互相矛盾互相竞争技术而是互补的。

    youdao

  • The cryptography which is core of traditional information security and information hiding techniques are not mutually contradictory, competing technologies, but complementary.

    传统密码学为核心技术信息安全和信息隐藏技术不是互相矛盾互相竞争技术而是互补的。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定