Engineering construction security information management is the important content of the security management of building-construction corporations.
工程建设安全信息管理是施工企业安全管理的重要内容。
The open-architecture systems work seamlessly with about 30 technology partners, including video management, access control and physical security information management systems.
开放式的架构系统,且与大约30个技术合作伙伴有着密切的合作,包括视频管理,访问控制和实体安全信息管理系统。
Then the security information management model in the SKJ2004 project is taken as an example to describe the implementation process of heterogeneous distributed database systems based on CORBA.
并以正在研发的数字矿井项目中的安全信息管理模块为例,介绍了基于CORBA的异构分布式数据库系统的实现方法。
Before examining how to use the security features of RFIDIC, this article reviews some background information on RFID data management.
在研究如何使用RFIDIC的安全特性之前,本文先回顾rfid数据管理的一些背景信息。
Security management process is needed to maintain the integrity of information and protect it assets.
需要安全性管理过程来维护信息的完整性并保护IT资产。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
Organize enterprise security management, it management, and risk management functions to promote efficient exchange of information and leverage corporate knowledge.
组织企业的安全管理,信息技术管理以及风险管理功能,以提高信息的有效交换及企业知识的提升。
While a company's brass must make information security a priority, security personnel also need to meet management half way by making their messages interesting and accessible, Amoroso says.
不仅公司的管理层要将信息安全视为头等要务,信息安全人员本身也要向管理层做出一些妥协,要尽量使自己传递的信息变得更加有趣易懂。
Tivoli Security Policy Manager - Provides a uniform point of administration of users, federation of user information, and privilege management.
TivoliSecurityPolicyManager——提供针对用户、用户信息联合和特权管理的统一管理点。
Information management is a huge topic that can involve discussions of content-management strategies, distributed access, federated security, and much more.
信息管理是一个庞大的主题,可涉及到有关内容管理策略、分布式访问、联合安全性等的讨论。
We will intensify our information security and secrecy, and improve management of information networks.
加强信息安全和保密工作,完善信息网络管理。
The Homeland Security Department wants information about the availability of a commercial electronic performance management system for its human resources functions.
美国国土安全部需要了解商用电子绩效管理系统的实用性,用于其人力资源管理。
In its settlement with BJ's, the FTC used its broad "fairness authority" to penalise bad information-security management.
美国联邦贸易委员会在与BJ的和解中,使用了他宽泛的“公证权威”用来惩罚信息安全管理不当的公司。
All personnel of the B. information security management organization shall be.
信息安全管理组织的所有人员应该为专职人员。
C. information security management organization should consider hiring outside experts.
信息安全管理组织应考虑聘请外部专家。
Directory Service can be applied to information publication, network device management, network application management, network security and so on.
目录服务可以应用于信息发布、网络设备管理、网络应用管理和网络安全等各个方面。
According to the design requirements of safety technology, the establishment of industrial control information security management platform.
按照等级保护安全技术设计要求,建立工业控制信息安全管理平台。
The information security management organization says the following statement is not true?
信息安全管理组织说法以下说法不正确的是?
With the continuous enhancing of the management of CATV network, the security of user data information becomes a focus of attention.
随着CAT V网络系统管理水平的不断提高,用户数据信息的安全性更为人们所关注。
The information security guarantee system framework can be divided into the security management framework and the security technology framework.
为了系统地、完整地构建企业信息安全保障体系,应考虑技术体系和管理体系共同构建。
The adoption of an information security management system is a strategic decision for an organization.
采用信息安全管理体系是组织的一项战略性决策。
Strengthen post financial management of information security needs have become increasingly prominent.
加强邮政金融信息安全管理的需求日益突出。
The secret key management is a special security mechanism in the information security of computer network.
密钥管理是计算机网络信息安全中一项专门的安全机制。
Corrigendum 1 - Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques.
勘误表1 - - -信息技术- - -安全性技术- - -关键管理- - -第2部分:使用对称技术机制。
Through the research, this article has the guiding role to the Shaangu information system safety control, and has reference to the manufacturing enterprise information system security management.
通过研究,本文对陕鼓信息系统安全管理有指导作用,对制造型企业信息系统安全管理有借鉴作用。
This International Standard has been prepared to provide requirements for establishing, implementing, maintaining and continually improving an information security management system.
本标准用于为建立、实施、保持和持续改进信息安全管理体系提供要求。
Security and Information Rights Management will become areas of key focus for those managing large ECM implementations.
对于大型ECM 部署,安全和权限管理将成为焦点,用户将要求 ECM 产品能很好地同他们企业现有的身份认证与权限管理机制集成。
A. information security management personnel should come from different departments.
信息安全管理组织人员应来自不同的部门。
A. information security management personnel should come from different departments.
信息安全管理组织人员应来自不同的部门。
应用推荐