Application Settings are controlled by the network security policy.
通过网络安全策略控制程序设置。
The detail of security threaten in computer network is given in this article, and analyzes the network security policy.
介绍了计算机网络当前所面临的安全威胁,对网络安全策略做了分析。
The United States Congress held a hearing on the Russian intervention in U. S. elections, which may be the direction of future network security policy.
美国国会就俄罗斯干涉美国选举举行听证会,这可能是未来网络安全政策的导向。
Abstract: this paper discussed four network security problems-network insecurity problems network security classification network security policy and network security measure.
文摘:从网络所面临的威胁、网络安全等级、网络安全策略和网络安全措施等四个方面,分析与探讨网络安全问题。
Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.
访问控制策略是网络安全策略的重要组成部分,基于角色访问控制策略以其方便有效的特点日益受到人们的关注。
The research and its application of the mechanism provide theoretical foundation and guideline for the study of the prevention techniques against the malicious code and the network security policy.
通过对恶意代码机理研究和实践,为恶意代码防范技术研究和网络安全策略研究提供理论基础和指导依据。
Once again, this is the practice of embedding security policy into the physical network design.
同样,这是将安全策略嵌入物理网络设计中的一种实践。
Implementing a password policy can be time consuming when presenting the information in a clearer format for reporting to security managers, especially when dealing with a large enterprise network.
如果需要以更清楚的格式向安全经理报告信息,实现密码策略会非常费时间,尤其是在处理大型企业网络时。
Network security auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions.
网络安全审计深入覆盖了商业和开源工具的使用,以协助审计和验证安全策略的假设。
Outside the host network (Intranet or extranet) are considered not to be trusted, so the application can run on the host and external services to set targeted strong security policy.
该主机以外的网络(内部网或外部网)都认为是不可信任的,因此可以针对该主机上运行的具体应用和对外提供的服务来设定针对性很强的安全策略。
Network policy support includes LAN-based Class of Service and Quality of Service, advanced security and automated network management.
网络政策支持包括基于LAN的服务种类和服务质量、先进的安全性和自动的网络管理。
In this paper discusses mainly the possibility and means which make up harms to the network resources, and network security as well as policy, then introduces network security Architecture.
本文主要讨论了对网络资源构成危害的可能性及其手段等网络安全性问题,说明了网络安全体系结构及其技术。
Work on setting up a "three-dimensional" security network is to be stepped up under a national policy package aimed at eradicating potential deadly attacks.
国家一项政策指出,将加强建立“立体化社会安全防控网”的工作,旨在消除潜在致命袭击。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
Therefore it is necessary to understand the network threats toe-commerce, and adopt the corresponding security policy to guarantee e-commerce run normally continuously, stably and correctly.
因此必须了解电子商务所受到的网络威胁,并采取相应的安全策略来保证电子商务系统的正常、连续、稳定、正确地运行。
Network security log management center is made up of transform module, statistics analysis module, and policy reconfiguration module.
网络安全日志管理中心由转换模块、统计分析模块和策略再配置模块组成。
The real capacity and existing problems of General Packet Radio Service (GPRS) network are analyzed and its construction principle, planning scheme and security policy are discussed.
文章分析了当前GPRS网的实际容量和存在的主要问题,探讨了GPRS核心网建设规划方案和安全策略。
The modern enterprise network security protection common security issues and their implications, explore ways to solve these problems of network security, provides network-based security policy.
现代企业网络安全防护常见的安全问题及其影响,探讨解决这些网络安全问题的方法,提供了基于网络内部的安全策略。
Intrusion Detection system (IDS) is an activity based network security system. As the logical supplement of usual passive policy, it is the important part of whole security system.
入侵检测系统(IDS)是一种基于主动策略的网络安全系统,是对常用的被动策略的逻辑补偿,是网络安全系统中的重要组成部分。
The security of Gold Insurance System is discussed in detail and the security policy of network platform is studied with emphasis according to the security requirements.
论文根据金保系统的安全需求,对其安全性进行了深入的探讨,并重点研究了网络平台的安全策略。
To be meaningful, a custom permission must be added to the security policy on the computer (or computers, in the case of a network) where the application using the permission runs.
若要让自订使用权限具有意义,必须在使用这个使用权限的应用程序执行时所在的电脑(如果是网路,可能有多部电脑)上,将它加入安全性原则。
If the assembly or document location is on a network share, the local (User level) security policy update is not enough to allow the solution to run.
如果组件或文件位置是在网路共用上,则本机(使用者层级)安全性原则更新不足以允许执行方案。
Network access management should ensure that terminals pass the security examination. Once terminals 'healthy condition does not meet the security policy, it should be restricted and repaired.
安全的接入管理应该能够确保用户在接入时满足终端安全策略的要求即通过健康体检,并且一旦出现健康状况不满足安全策略时即被限制访问和要求修复。
However, the campus network has some problems, such as no reasonable management mode and flexible accounting policy. The security and stabilization are weak.
同时,校园网也存在不少问题,诸如缺乏合理的管理模式,缺乏灵活的计费策略,以及网络的安全及稳定得不到保障。
SNMP network monitoring analysis of business conditions, the implementation of security policy, real-time monitoring network devices, servers, etc., to ensure network operations performance.
SNMP监控与分析企业的网络情况,实施安全策略,实时监控网络设备、服务器等,保证网络的运行状态和性能。
SNMP network monitoring analysis of business conditions, the implementation of security policy, real-time monitoring network devices, servers, etc., to ensure network operations performance.
SNMP监控与分析企业的网络情况,实施安全策略,实时监控网络设备、服务器等,保证网络的运行状态和性能。
应用推荐