The security strategy needs to address storage, messaging, and transport security.
这种安全性策略需要解决存储、消息和传输等方面的安全性。
Security scans are an important part of the network security strategy for a company.
安全扫描是公司网络安全策略重要的一部分。
Access control security strategy is to preserve the legality of the database users.
访问控制策略即保证数据库的访问者其身份的合法性。
At first, this paper analyzes the problems for current information system security strategy.
本文首先分析了当前信息系统安全策略存在的问题。
In addition against system security, it designs role-management solutions for security strategy.
此外针对系统安全问题,设计以角色管理的安全策略解决方案。
Finally the whole scheme design, security strategy design and program module are analyzed in detail.
最后详细分析了系统的整体方案设计和安全策略设计实现。
Network security is a system concept, effective security strategy or program development, is the primary objective of network information security.
网络安全是一个系统的概念,有效的安全策略或方案的制定,是网络信息安全的首要目标。
We should also create a security intelligence strategy that includes process centric risk management.
我们还应该创建安全智能策略,其中包含了以流程为中心的风险管理。
Without a unified strategy, developers re-implement custom security for each network application.
如果没有统一的策略,开发人员就要为每个网络应用程序重复实现定制的安全机制。
Security situation and any potential evacuation strategy.
安全形式及可能的撤离策略。
This strategy reflects our most solemn obligation: to protect the security of the American people.
这一战略体现我们最为严肃的职责:保卫美国人民的安全。
The dangers this strategy could pose for international security are even more apparent.
对于国际安全而言,这一策略造成的危险甚至更加明显。
For Apple, security is also a global marketing strategy.
对苹果来说,安全还是一项全球市场战略。
Security in natural gas supply and utilization is the key point of natural gas strategy.
天然气供应安全和使用安全是天然气战略的核心问题。
We have proposed two kinds of system security prevention strategy.
提出了两种系统安全防范的策略。
This strategy has features of little network cost and high security.
该策略具有较小的网络开销,较高的安全性等特点。
The first step for security system is to set up a reasonable security management strategy.
安全系统的第一步是制定一个合理的安全管理策略。
The first step for security system is to set up a reasonable security management strategy.
安全系统的第一步是制定一个合理的安全管理策略。
应用推荐