Absrtact: The security of network is a hot problem now.
摘要:网络的安全性问题是一个比较热点的问题。
With the rapid development of network, the security of network is more and more serious.
计算机网络迅猛发展,网络安全问题日益严重。
Protect the security of network information, the enterprise should not shirk responsibility.
保护网络信息安全,企业的责任不应推脱。
At present, the security of network and information has been paid much attention prevalently.
目前,网络和信息安全已成为一个普遍关注的问题。
With the development of internet, the security of network is something important for people to think about seriously.
随着计算机网络的飞速发展,网络安全日益成为不可忽视的问题。
Once again, this is the practice of embedding security policy into the physical network design.
同样,这是将安全策略嵌入物理网络设计中的一种实践。
Security scans are an important part of the network security strategy for a company.
安全扫描是公司网络安全策略重要的一部分。
And encryption technology is the core technology of the network security technology.
而加密技术则是网络安全技术中的核心技术。
The unique function of IDS makes it play an irreplaceable role in network security system.
IDS独特的作用使它在网络安全体系中占有不可替代的地位。
Accompanied with the convenience from the network, it still caused the problem of information security.
伴随着网络带来的便利,网络同时为人类带来了信息安全的难题。
Computer system and network security are basis of security of distributed database system.
计算机系统和网络的安全是分布式数据库系统安全的基础。
Note: IACI is designed to help people solve the challenges of network security threat information.
注:IACI旨在帮助人们解决网络安全威胁信息方面的挑战。
With popularization and application of network, network security situation has become increasingly severe.
随着计算机网络的普及和广泛应用,网络安全形势变得日益严峻。
Router is a network system of main equipment, but also the forefront of network security.
路由器是网络系统的主要设备,也是网络安全的前沿关口。
With the development of network technology and application, network security becomes increasingly more important.
随着网络技术的飞速发展,网络安全问题日益突出。
The secret key management is a special security mechanism in the information security of computer network.
密钥管理是计算机网络信息安全中一项专门的安全机制。
Network security is a very broad scope of the problem.
网络安全性是一个涉及面很广泛的问题。
The form of network security framework is shown in figure 3.
网络安全的框架构成的表现形式如图3所示。
There have been examples of file sharing software bypassing a company's network security.
有例子文件共享软件绕过公司的网络安全。
No network of that name with that security setting was found.
未找到指定网络名与安全设置的网络。
This shows the counteracting property of network security.
这体现了网络安全的攻防对抗本质。
Finally, the design of the integrated test platform of the network security products is presented.
最后论文介绍了网络安全产品的集成测试平台,并给出了该平台框架的设计与实现方法。
Now, companies are competing to create stability and economic security of wide area network connectivity.
现在,企业正在竞相创建稳定、经济的安全广域网连接。
The method well solves the problem and strengthens security of campus network.
该方法有效地解决了该问题,加强了园区网的安全。
Information security is an inevitable problem of network application.
信息安全是网络应用不可避免的问题。
Information security is an inevitable problem of network application.
信息安全是网络应用不可避免的问题。
应用推荐