Password technology is the key technology of information security.
密码技术是信息平安中的关键技术。
Cryptography is an important technology of information security. It can guarantees information's confidentiality, integrality and authentication.
密码学作为信息安全的重要技术,能有效保障信息的机密性、完整性和鉴别。
According to the problems of information security, the solution and technology of information security are demonstrated, at the same time, the limitation is also put forward.
针对信息安全存在的种种问题,论述了现阶段信息安全问题的主要解决方法和技术,并指出了这些方法和技术的局限性。
First, This paper discusses four E-business's demands for safety, then introduces technology of information security and how they meet demands of secure electronic transactions.
首先阐述了电子商务的四个主要的安全需求,并就信息加密、数字签名、数字证书等信息安全技术的特点及其应用作了探讨。
The core technology of information security lies in attack and defense, that is, attack technology and defense technology, only to master the attack technology in order to achieve better security.
信息安全的核心技术在于“攻防”,即攻击技术和防御技术,只有掌握攻击技术才能更好做到安全防御。
"Each magstripe has three tracks of information," explains payments security expert Jeremy Gumbley, the chief technology officer of CreditCall, an electronic-payments company.
电子支付公司CreditCall的首席技术官、支付安全专家杰里米·冈布利解释说:“每个磁条都有三条信息轨迹。”
Generally, developers don't expect the mobile cloud to be free from security threats any more than they expect that of any other information technology (it) model used to support business.
通常,开发人员不认为移动云能免受安全威胁,就如同他们不认为其他任何信息技术(IT)模式能支持业务一样。
The Harris Sierra II? encryption technology provides the foundation for this level of information security.
Harris公司的Sierra II加密技术为信息安全水平奠定了基础。
This part's chapters contain a massive amount of information, reflecting the many aspects of digital security, and discussing the history as well as popular misconceptions for each technology.
本部分的章节包含大量信息,反映了数字安全的许多方面,并且对于每一个技术都讨论了其历史和普遍的误解。
The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.
该协议涵盖企业安全,并呼吁支持信息技术服务,对新出现的网络威胁和网络入侵提高认识。
The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S.Department of Homeland Security (DHS) and R.Chandrashekhar, Secretary, India Department of Information Technology.
美国国土安全部(DHS)副部长简霍尔·卢特和印度信息技术部部长坎德·拉赫·哈尔在新德里签署了这份谅解备忘录。
The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S. Department of Homeland Security (DHS) and R. Chandrashekhar, Secretary, India Department of Information Technology.
美国国土安全部(DHS)副部长简霍尔·卢特和印度信息技术部部长坎德·拉赫·哈尔在新德里签署了这份谅解备忘录。
The cyber security competition last Saturday was the fourth sponsored by the Neusoft Institute of Information Technology (NINT) in Guangdong.
上周六,广东东软信息技术学院(NINT)举办了第四届网络攻防大赛。
Compared with the past, the increasing complexity of information technology will make us more difficult to protect the security of enterprise network.
与过去相比,信息技术的日趋复杂会让我们在保护企业网络安全的时候遇到更多的困难。
By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.
随着计算机信息技术与网络技术的迅猛发展,信息与网络的安全形势也日趋严峻和复杂化。
Steganography is a new technology in the field of information security.
隐写术是信息安全领域一门新兴的技术。
With the rapid development of information and communication technology, people attach more importance to the information security.
随着信息与通信技术的飞速发展,信息安全日益受到人们的重视。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
With the rapid development of modern information technology, the information security plays a more and more important role.
随着现代信息技术的飞速发展,信息安全扮演着越来越重要的角色。
According to the design requirements of safety technology, the establishment of industrial control information security management platform.
按照等级保护安全技术设计要求,建立工业控制信息安全管理平台。
The computer and Internet technology are changing the appearance of the human society; it is the question of information and online security with its one that followed.
计算机和互联网技术正在改变着人类社会的面貌,与之伴随而来的是信息和网络安全的问题。
The main research content of this paper is network information detection technology and network security evaluation method.
本文主要研究的内容是网络信息的探测技术和建立在信息探测基础上的安全评估方法。
Security of information security products – information security special product technology is a security product specifically developed to enhance the security of information systems.
信息安全专用产品安全——信息安全专用产品技术是专门为增强信息系统的安全性开发的安全产品。
Following the big development of the pluralism and digitalization of the information, information security technology become more and more important.
随着信息的多元化、数字化的迅猛发展,信息安全技术显得越来越重要。
Information security is a process of game, hacking technology MoGaoYiChe, protection technology on a high.
信息安全防护是一个博弈过程,黑客攻击技术魔高一尺,防护技术就道高一丈。
Consider the effectiveness of the company's internal control system, including information technology security and control.
评价公司内部控制系统的有效性,包括信息技术安全和控制。
Information security problem is one of the key problems in modern Internet. by active defending feature intrusion detection technology is widely recognized and applied.
在信息安全问题日益突出的互联网中,入侵检测技术以其主动防御的特性,得到越来越广泛的重视和应用。
Therefore, technology is not an effective solution to the issues of information security.
因此,只靠技术是不能有效地解决信息安全问题的。
Meanwhile, it is easy to discover cryptograph by traditional encryption technology by attacker and it affects security of information.
同时,传统的加密技术所得到的密文容易被攻击者发现,影响了信息的安全性。
The creation of a new university campus is being considered. Your requirement is to model the risk assessment of information technology (it) security for this proposed university.
正在考虑创建一所新的大学校园,你们的任务是对这所大学的信息技术(IT)安全性的风险评估建立模型。
应用推荐