The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.
该协议涵盖企业安全,并呼吁支持信息技术服务,对新出现的网络威胁和网络入侵提高认识。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
Network services requiring security and availability should benefit from this powerful operating system technology.
需要确保安全性和可用性的网络服务应该会受益于这种强大的操作系统技术。
And encryption technology is the core technology of the network security technology.
而加密技术则是网络安全技术中的核心技术。
However, network security is not only a technical problem but also a comprehensive systems engineering of security strategy, security technology and security management.
然而,网络系统安全问题不仅仅是技术的问题,而是安全策略、安全技术与安全管理的综合过程,是一项系统工程。
By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.
随着计算机信息技术与网络技术的迅猛发展,信息与网络的安全形势也日趋严峻和复杂化。
To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.
进行信息网络安全技术和标准的研究,开发相应的安全产品,并从事安全服务工作。
This article first analyzes the security of computer network, introduces basic technology that guarantee the security and emphasizes that cryptography is the core technology.
本文第一章分析计算机网络的安全性,介绍保障计算机网络安全的基本技术,指出密码技术是网络安全技术的核心。
With the development of network technology and application, network security becomes increasingly more important.
随着网络技术的飞速发展,网络安全问题日益突出。
The main research content of this paper is network information detection technology and network security evaluation method.
本文主要研究的内容是网络信息的探测技术和建立在信息探测基础上的安全评估方法。
With the information age arrival and network technology broad application, people's requirement for security is higher and higher.
随着信息时代的到来和网络技术的广泛应用,人们对安全性的要求越来越高。
At last, the popular technology about computer network virus detection and information and network security is summarized.
最后,对计算机网络病毒的检测和当前网络安全的主流技术进行了分析。
The users of network have to adopt active defend technology and deep, various means to protect network security.
网络使用者必须采用积极的防御技术和纵深的、多样的手段来保证网络的安全。
This paper first introduces the actuality of network security, intrusion detection technology and CORBA, then puts foward the structure of a distributed intrusion detection system based on CORBA.
本文首先简要介绍网络安全现状、入侵检测技术和CORBA 技术,然后给出应用CORBA建立的分布式入侵监测系统体系结构。
In auditing system about network security, the technology about information catching and reverting is a difficult problem. At the same time, it is also foundation problem.
信息捕捉与还原技术是网络安全技术中审计系统实施的一个难点,同时也是实现审计系统的基础。
The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.
通过设置密码和蓝牙技术的安全机制,提供了信息家电网络和远程控制系统的安全保障。
Some research point out, the majority of network security threatens from the system interior, so we are urgent need to use one kind of new measure and the technology safeguard the network security.
有研究指出,大部分的网络安全威胁来自系统内部,因此,我们迫切的需要采用一种新的措施和技术来保障网络的安全。
Identity authentication is an important aspect of network security technology and the basis of other security mechanisms.
身份认证是网络安全技术的一个重要方面,是其他安全机制的基础。
As a security technology, WLAN intrusion detection technology plays an important role in the security of the WLAN network and system.
WLAN入侵检测技术作为一项安全技术,在保证WLAN的网络和系统安全性上起着非常重要的作用。
This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.
本课题在现有的网络通信技术、数据库技术和信息安全技术的基础上设计并实现了新型的安全即时通信系统。
Meanwhile, the perfection of the standards management of security of network technology and equipment can also offer help for tracking down and punishing the crime of the network effectively.
同时,网络技术与设备的安全管理规范的完善还能够为侦破和处罚网络犯罪提供有效地帮助。
Firstly, in the paper I introduce network security problem and the method the network security aim at, network threaten, traditional network technology and the network security module.
本文首先讨论了网络安全问题及其对策,包括网络安全的目的,网络现存的威胁,传统的网络安全技术和网络安全模型。
Packet capture is the key technology of intrusion detection system and network security audit.
网络数据包捕获技术,是实现入侵检测、网络安全审计的关键技术。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
This article analyses the security problems of the Virtual Privat Network, introduces its main security technology and put forward the general principles and measures of the security design of VPN.
本文分析了虚拟专用网存在的安全问题,介绍了虚拟专用网的主要安全技术,提出了设计安全虚拟专用网的一般原则与步骤。
In the face of endless hacking technology and network viruses and Internet security technology needs further study.
面对层出不穷的网络入侵技术和网络病毒,网络安全技术需要进一步研究。
The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.
主要介绍网络安全准入控制系统组成及相关技术,并对该技术在铁路信息系统中如何应用加以探讨。
This paper describes the meaning of computer network security, the existence threat in computer network and enhance related technology initiatives of computer network security.
本文主要介绍了计算机网络安全的含义,计算机网络中所存在的威胁以及加强计算机网络系统安全的相关技术措施。
应用推荐