When configuring a secure environment, you must make sure that every component provides for appropriate authentication, authorization, and encryption of network traffic.
在配置安全环境时,您必须确保所有组件都能为网络通信提供相应的身份验证、授权和加密。
As a new and more secure network becomes widely adopted, the current Internet might end up as the bad neighborhood of cyberspace.
当这种更为安全的新网络被广为采用,现在的互联网可能最终被视作坏的网络空间而终结。
You can think of this as creating a secure trusted tunnel at the network layer.
您可以将这看作是在网络层创建安全的受信任隧道。
A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.
漏洞扫描器类似于其他类型的扫描器——例如,端口扫描器有助于保障端口上的网络和系统的安全。
Prior to the latest version of JPPF framework, there was no easy way to integrate JPPF in secure network environments, due to the inherent design of the communication layer.
由于JPPF框架通信层固有的设计,在其最新版本之前尚不存在任何简单的方式得以将JPPF集成到安全的网络环境中。
You should consult other sources of information to ensure your system is secure, or run it on a private network that provides a suitable level of protection.
您应当参考其他信息来源以确保您的系统安全,或者在提供适当保护的内部网络上运行它。
Think of this as creating a secure trusted tunnel at the network layer.
可以将这看作是在网络层上创建安全的可信隧道。
IT may make IT feel more secure, but not taking advantage of a faster, cheaper network that already exists for content delivery isn't going to save you any money.
这么做可能会让IT部门感到安全,但如果不利用快速、廉价的现有网络去提交内容,公司的成本不会降低。
It could result in more secure transfer of data over the Internet, as well as increased capacity of existing network pathways to handle more Web traffic.
这样一来可以让互联网中的数据更为安全的传输,并增加现有网络的流量吞吐能力。
To allow for ease of use, wireless Hosted Network also supports the concept of a secondary or user security key that is more user-friendly, but could be less secure.
为了便于使用,无线承载网络还支持“第二密钥”,也称作“用户安全密钥”,使用起来更加友好,但是安全性稍差。
As we secure the world's most dangerous weapons, we are fighting a war against afar-reaching network of hatred and violence.
在我们打击最具威胁的武器的时候,我们也在与一股恐怖、邪恶势力的巨大网络做斗争。
You'll need to secure it just like any other Web application, which brings us to the problem of network data.
如任何其他为我们带来网络数据问题的Web应用程序一样,您将需要使它安全。
Kerberos is a popular security mechanism used by systems for network authentication and secure transmission of data.
Kerberos是用于网络身份验证和保护数据传输的最流行的安全机制。
SSH, or Secure SHell, is a network protocol for remote administration of UNIX computers.
SSH或SecureSHell是用于远程管理UNIX计算机的一个网络协议。
The solutions in this article can help you perform simple to more advanced and secure network backups using open source tools that are part of nearly every Linux distribution.
本文中的解决方案可以让您使用开源工具执行从简单的到更高级而且安全的网络备份,几乎所有Linux发行版本都包含这些工具。
Secure Shell (SSH), as the name suggests, is a tool that provides a high degree of security and reliability to data as it is transferred across the network.
SecureShell (SSH),顾名思义,是一种为网络上传输的数据提供高度安全性和可靠性的工具。
Kerberos is a popular authentication mechanism that provides a secure means of authentication for network users, and it is supported by OpenSSH.
Kerberos是一种常用的身份验证机制,它为网络用户的身份验证提供了一种安全手段,并且OpenSSH提供了对Kerberos的支持。
SSL developed by the Netscape Corporation, is an industry-accepted standard for network transport of data over a secure channel.
由Netscape公司开发的SSL是为业界所接受的一个标准,用于确保在一条安全通道上对数据进行网络传输。
If you plan to define a bunch of WPARs, you'll need to secure in advance a group of available hostnames and IP addresses in your network.
如果您打算定义大量的WPAR,那么您将需要提前确保网络中存在一组可用的主机名和IP地址。
Kerberos, which provides a secure means of authentication for network users, is one of the most popular authentication mechanisms.
Kerberos为网络用户提供了一种安全的身份验证手段,是最流行的身份验证机制之一。
OpenSSH (OpenBSD Secure Shell) is a set of computer programs providing encrypted communication sessions over a computer network using the SSH protocol.
OpenSSH (OpenBSDSecureShell)是一组计算机程序,使用SSH协议通过网络提供加密通信会话。
Reducing the source consume, and prolonging the WSN lifecycle is becoming the chief target of WSN, which was based on the assurance of Network Secure Communication.
在保证网络安全通信的基础上,尽量减少网络的能源消耗、延长网络生命周期已经成为无线传感器网络通信的首要目标。
It is an urgent need for network secure communication to apply Chaos theory to the multimedia signals transmission, and it is one of most advanced and hot research topics internationally.
将混沌学理论应用于多媒体信号的保密通信是网络安全的迫切需要,也是当今世界的前沿课题和研究热点。
A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.
一个安全的认证协议能有效抵御恶意的攻击者对通信网进行的欺诈,保证通信网的安全运行。
The quantum communication network marries a variety of GHZ states to well establish the secure key distribution system employed in conjunction with the nodes and control centers.
这个量子密钥传输协议在通信节点和控制中心之间通过多个GHZ对构建安全的密码分配系统。
I have a really secure network of family and friends.
我有一个真正安全的家庭和朋友的人际网。
Research and implement one kind of secure transmission model based on active network.
文中研究并实现了一种主动网络下的安全传输模型。
The advanced features of the Cisco SRW208P can help you further secure the integrity of your network.
思科srw208p的先进功能可以帮助您进一步保护你的网络的完整性。
The advanced features of the Cisco SRW208P can help you further secure the integrity of your network.
思科srw208p的先进功能可以帮助您进一步保护你的网络的完整性。
应用推荐