• Password technology is the key technology of information security.

    密码技术信息平安中的关键技术。

    youdao

  • Cryptography is an important technology of information security. It can guarantees information's confidentiality, integrality and authentication.

    密码学作为信息安全重要技术有效保障信息机密性完整性鉴别。

    youdao

  • According to the problems of information security, the solution and technology of information security are demonstrated, at the same time, the limitation is also put forward.

    针对信息安全存在种种问题,论述了现阶段信息安全问题的主要解决方法技术指出了这些方法和技术的局限性

    youdao

  • First, This paper discusses four E-business's demands for safety, then introduces technology of information security and how they meet demands of secure electronic transactions.

    首先阐述电子商务四个主要安全需求并就信息加密、数字签名、数字证书等信息安全技术的特点及其应用作了探讨。

    youdao

  • The core technology of information security lies in attack and defense, that is, attack technology and defense technology, only to master the attack technology in order to achieve better security.

    信息安全核心技术在于攻防”,即攻击技术防御技术,只有掌握攻击技术才能更好做到安全防御。

    youdao

  • "Each magstripe has three tracks of information," explains payments security expert Jeremy Gumbley, the chief technology officer of CreditCall, an electronic-payments company.

    电子支付公司CreditCall首席技术、支付安全专家杰里米·冈布利解释说:“每个磁条都信息轨迹。”

    youdao

  • Generally, developers don't expect the mobile cloud to be free from security threats any more than they expect that of any other information technology (it) model used to support business.

    通常开发人员认为移动免受安全威胁,就如同他们不认为其他任何信息技术(IT)模式支持业务一样。

    youdao

  • The Harris Sierra II? encryption technology provides the foundation for this level of information security.

    Harris公司的Sierra II加密技术信息安全水平奠定了基础

    youdao

  • This part's chapters contain a massive amount of information, reflecting the many aspects of digital security, and discussing the history as well as popular misconceptions for each technology.

    部分章节包含大量信息反映数字安全许多方面并且对于一个技术都讨论了其历史普遍误解

    youdao

  • The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.

    协议涵盖企业安全呼吁支持信息技术服务,对新出现网络威胁网络入侵提高认识

    youdao

  • The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S.Department of Homeland Security (DHS) and R.Chandrashekhar, Secretary, India Department of Information Technology.

    美国国土安全部(DHS)部长霍尔·卢特印度信息技术部部长坎德·拉赫·哈尔新德里签署这份谅解备忘录

    youdao

  • The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S. Department of Homeland Security (DHS) and R. Chandrashekhar, Secretary, India Department of Information Technology.

    美国国土安全部(DHS)部长霍尔·卢特和印度信息技术部部长坎德·拉赫·哈尔新德里签署这份谅解备忘录。

    youdao

  • The cyber security competition last Saturday was the fourth sponsored by the Neusoft Institute of Information Technology (NINT) in Guangdong.

    上周六广东东软信息技术学院(NINT)举办第四网络攻防大赛

    youdao

  • Compared with the past, the increasing complexity of information technology will make us more difficult to protect the security of enterprise network.

    过去相比信息技术日趋复杂我们保护企业网络安全的时候遇到更多困难

    youdao

  • By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.

    随着计算机信息技术网络技术迅猛发展信息与网络的安全形势日趋严峻和复杂化。

    youdao

  • Steganography is a new technology in the field of information security.

    隐写术信息安全领域一门新兴技术

    youdao

  • With the rapid development of information and communication technology, people attach more importance to the information security.

    随着信息通信技术飞速发展,信息安全日益受到人们的重视。

    youdao

  • All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.

    这些导致企业无法成熟IT信息安全技术直接应用于工业控制系统信息安全保护

    youdao

  • With the rapid development of modern information technology, the information security plays a more and more important role.

    随着现代信息技术飞速发展,信息安全扮演越来越重要的角色。

    youdao

  • According to the design requirements of safety technology, the establishment of industrial control information security management platform.

    按照等级保护安全技术设计要求建立工业控制信息安全管理平台

    youdao

  • The computer and Internet technology are changing the appearance of the human society; it is the question of information and online security with its one that followed.

    计算机互联网技术正在改变着人类社会面貌之伴随而来的信息网络安全问题

    youdao

  • The main research content of this paper is network information detection technology and network security evaluation method.

    本文主要研究内容网络信息探测技术建立在信息探测基础上的安全评估方法

    youdao

  • Security of information security productsinformation security special product technology is a security product specifically developed to enhance the security of information systems.

    信息安全专用产品安全——信息安全专用产品技术专门增强信息系统安全性开发安全产品。

    youdao

  • Following the big development of the pluralism and digitalization of the information, information security technology become more and more important.

    随着信息多元化数字化迅猛发展,信息安全技术显得越来越重要。

    youdao

  • Information security is a process of game, hacking technology MoGaoYiChe, protection technology on a high.

    信息安全防护一个博弈过程黑客攻击技术魔高一尺,防护技术就道高一丈。

    youdao

  • Consider the effectiveness of the company's internal control system, including information technology security and control.

    评价公司内部控制系统有效性包括信息技术安全和控制。

    youdao

  • Information security problem is one of the key problems in modern Internet. by active defending feature intrusion detection technology is widely recognized and applied.

    信息安全问题日益突出互联网中,入侵检测技术以其主动防御特性,得到越来越广泛的重视和应用。

    youdao

  • Therefore, technology is not an effective solution to the issues of information security.

    因此,只靠技术不能有效解决信息安全问题

    youdao

  • Meanwhile, it is easy to discover cryptograph by traditional encryption technology by attacker and it affects security of information.

    同时传统加密技术所得到的密文容易攻击者发现,影响信息的安全性

    youdao

  • The creation of a new university campus is being considered. Your requirement is to model the risk assessment of information technology (it) security for this proposed university.

    正在考虑创建一所新的大学校园你们任务大学信息技术(IT)安全性风险评估建立模型

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定