Formulate and improve relevant information security and technology policy, industrial policy.
制定和完善相关信息安全的技术政策、产业政策。
This part's chapters contain a massive amount of information, reflecting the many aspects of digital security, and discussing the history as well as popular misconceptions for each technology.
本部分的章节包含大量信息,反映了数字安全的许多方面,并且对于每一个技术都讨论了其历史和普遍的误解。
The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.
该协议涵盖企业安全,并呼吁支持信息技术服务,对新出现的网络威胁和网络入侵提高认识。
The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S.Department of Homeland Security (DHS) and R.Chandrashekhar, Secretary, India Department of Information Technology.
美国国土安全部(DHS)副部长简霍尔·卢特和印度信息技术部部长坎德·拉赫·哈尔在新德里签署了这份谅解备忘录。
The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S. Department of Homeland Security (DHS) and R. Chandrashekhar, Secretary, India Department of Information Technology.
美国国土安全部(DHS)副部长简霍尔·卢特和印度信息技术部部长坎德·拉赫·哈尔在新德里签署了这份谅解备忘录。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
If you are (or were) already working in information technology, you can pursue career training specifically in information security through online degree and certification programs.
如果你现在正在(或曾经在)信息产业工作,你可以参加在线信息安全的培训,获得在线学位或证明。
By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.
随着计算机信息技术与网络技术的迅猛发展,信息与网络的安全形势也日趋严峻和复杂化。
The information security guarantee system framework can be divided into the security management framework and the security technology framework.
为了系统地、完整地构建企业信息安全保障体系,应考虑技术体系和管理体系共同构建。
The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology.
本文介绍的安全电子邮件系统通过信息安全技术对传统的电子邮件系统进行扩展和完善。
With the rapid development of information and communication technology, people attach more importance to the information security.
随着信息与通信技术的飞速发展,信息安全日益受到人们的重视。
Information technology product safety - information technology product safety is an additional security technology and mechanism for information technology products.
信息技术产品安全——信息技术产品安全是对信息技术产品附加相应的安全技术和机制。
The computer and Internet technology are changing the appearance of the human society; it is the question of information and online security with its one that followed.
计算机和互联网技术正在改变着人类社会的面貌,与之伴随而来的是信息和网络安全的问题。
Information security problem is one of the key problems in modern Internet. by active defending feature intrusion detection technology is widely recognized and applied.
在信息安全问题日益突出的互联网中,入侵检测技术以其主动防御的特性,得到越来越广泛的重视和应用。
The main research content of this paper is network information detection technology and network security evaluation method.
本文主要研究的内容是网络信息的探测技术和建立在信息探测基础上的安全评估方法。
To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.
进行信息网络安全技术和标准的研究,开发相应的安全产品,并从事安全服务工作。
Beginning with the current situation, classification and countermeasure of the information security, then we bring forward the VPN technology.
论文从安全问题的现状、分类和对策入手,提出VPN技术及用VPN技术实现安全通信。
With the information age arrival and network technology broad application, people's requirement for security is higher and higher.
随着信息时代的到来和网络技术的广泛应用,人们对安全性的要求越来越高。
Consider the effectiveness of the company's internal control system, including information technology security and control.
评价公司内部控制系统的有效性,包括信息技术安全和控制。
School of Computer: Computer Science and Technology, Information Security.
计算机学院:计算机科学与技术、信息安全。
With the rapid development of modern information technology, the information security plays a more and more important role.
随着现代信息技术的飞速发展,信息安全扮演着越来越重要的角色。
At last, the popular technology about computer network virus detection and information and network security is summarized.
最后,对计算机网络病毒的检测和当前网络安全的主流技术进行了分析。
In the information security technology research, two different points of view and directions have come into being.
反映在信息安全技术的研究上,形成两个完全不同的角度和方向。
Modem cryptological theory and cryptological technology are important basis of information security.
现代密码学理论和密码技术是信息安全的重要基础。
Intrusion-tolerance is a new information security technology and research approach.
容忍入侵是一种全新的信息安全技术与研究方法。
The author aims at presenting an overall technology framework and information security framework of campus Portal based on personalized service technology.
本文旨在提出一个基于个性化服务技术的校园门户总体技术框架和门户信息安全架构。
The author aims at presenting an overall technology framework and information security framework of campus Portal based on personalized service technology.
本文旨在提出一个基于个性化服务技术的校园门户总体技术框架和门户信息安全架构。
应用推荐