在利用过程中,必须采取有效的安全保密措施。
We must take effective steps to keep it safe and secret during the utilization of electronic archives.
识别合法用户是计算机安全保密的一项重要内容。
It is one of the important contents to distinguish legal users in computer security and secrecy.
关键技术涉及远程协作网架构、数据库安全保密等。
The key technique includes remote cooperation frame, database security coding and so on.
严密的系统数据安全保密机制及授权管理,确保系统的正常运行。
The tight system data safety keeps secret the mechanism and the authorization managements, insuring normal movement of the system.
它支持多种网络安全协议,以满足商用密码应用中的数据安全保密的需求。
The data cipher card supports kinds of network protocols to satisfy the requirement of the application of commercial cryptology.
然而调查显示,去年一些银行的安全保密机制并不完善,导致客户们的帐户被非法入侵。
However, research published by Which? Last year found the security regimes of some Banks leave customers vulnerable to hacking.
实验结果表明系统在内部模型数小于10时识别精度高,达到安全保密的要求。
The experimental results show that the designed system has high identity precision when the interior model amount is less than 10 and can achieve the request of safety-secrecy.
用数据库加密方法实现数据库的安全保密时,密钥的分配和管理是主要难点之一。
When database encryption is used as a machanism for database security and privacy, one of the main problems is the distribution and management of cryptographic keys.
我现在正在做一个J2EE的OA项目,基于安全保密考虑,项目名称以下称为J2EEOA。
I do now is a J2EE OA project, based on security considerations, Project name hereinafter referred to as J2EEOA.
信息安全风险评估是保证信息系统安全保密的重要手段,是涉密信息系统风险管理的重要内容。
Information security risk assessment is an effective way to protect the security of secret-involved information system.
本文基于现有的通信网提出了一种智能化的平台实现统一消息业务的方案,探讨了安全保密问题。
Based on present communication network, this paper presents an intelligent platform to implement unified messaging service, with security discussed as well.
在日益严峻的信息安全形势下,军队院校已将信息安全保密教育作为提升人员军事素养的重要途径。
In the increasingly serious situation of information security, military universities have put information security education as the important way to promote personnel military literacy.
文章针对学科试题库安全与保密问题,提出了适用于学科试题库的安全保密系统,并证明了该系统的安全性。
This article analyzed problems of security and defense in subject test lib and then put forward a security and defense system of subject test lib, and proved security of this system.
阐述了基于C/S和B/S模式的企业管理信息系统的设计过程,如设计原则、系统结构、系统配置、系统功能设计、安全保密技术等。
The paper illustrater the design procedure of management information system based on C/S and B/S, including its design principle, system infrastructure, configuration, functions and securities.
这一点很重要,以确保象布莱尔一样有沟通天赋的不能逃避困境,”克莱格说。 他还解释了私人听证会只会在一个真正安全保密国家举行的原因。
This is important to ensure that as gifted a communicator as Blair is not allowed to slip off the hook, " Clegg said.
结果:本系统符合药品制剂质量检验管理的需要,具有较高的智能化功能和较强的可移植性、易扩展性及适应性,结构合理,标准规范,高效准确,安全保密。
Result: The system, which can be enlarged and transplanted, was reasonable, standard, high efficient, accurate, secure and fit to the requirements of the pharmaceutics quality test.
该马夫长负责确保密尔顿及其他来自同一养马场的赛马都能安全抵达。
The head groom is responsible for seeing that Milton and his stablemates travel safely.
安全、保密获取现代方法避孕可以而且应该是正确的——它是一种廉价的足够的干预是负担得起更加的普遍。
Safe and confidential access to modern methods of contraception can and should be a right — it is a cheap enough intervention to be affordable worldwide.
向一个远程客户端提供持久化数据访问可能会引起数据保密和安全问题。
The provision to access persistent data as resources by a remote client raises data privacy and security concerns.
我只是要说,通常情况下对安全系统的运作方式保密并不会提高安全,事实恰恰相反。
I'm just saying that in general, secrecy about how your security system works does not improve security, but rather usually the reverse.
加强信息安全和保密工作,完善信息网络管理。
We will intensify our information security and secrecy, and improve management of information networks.
不过,就像经历过不耐烦地等待一封邮件下载完成的人所告诉你的那样,对于数据速率、保密以及安全来说,还是依靠备用硬件更好些。
But as anyone who's ever waited impatiently for an E-mail to download can tell you, for data speed, security, and safety, it's better to stick with on-premise hardware.
受国家知识产权局委托,负责国家知识产权局系统的安全保卫、保密和防火工作;
to be responsible for the safety and security, secretes guarding and fire protection of the State Intellectual Property Right Office under its entrustment;
我们还涉及到如何限制“Pre -Windows 2000 CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
We have covered how we restrict read access to Active Directory to members of the Pre-Windows 2000 Compatibility access security group as well as marking non-system-base as confidential.
我们还涉及到如何限制“Pre-Windows 2000CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
We have covered how we restrict read access to Active Directory to members of the “Pre-Windows 2000 Compatibility Access” security group as well as marking non-system-base as confidential.
她申请的73项u.s.专利涵盖的范围从网络、Web、安全、保密、多媒体、无线、普遍设备到无线电频率ID。
Her 73 filed U.S. patents range from networking, Web, security, privacy, multimedia, wireless, pervasive devices, to radio frequency ID.
由于安全性要求规定必须对未授权的查看者保密支付方式(诸如信用卡或银行支票),对Payment元素加密就做到了这一点。
Since the security requirement dictates that the means of payment (such as credit card or bank check) must be hidden from unauthorized viewers, encrypting the payment element pays off.
另一个示例可以表述为:只允许某些人查看消息内所包含的信息,其中所涉及的内容可以链接到以前的关于安全性和保密性的讨论。
Another example may be an expression that only allows certain people to view the information contained within the message, which links back to the previous discussion about security and privacy.
另一个示例可以表述为:只允许某些人查看消息内所包含的信息,其中所涉及的内容可以链接到以前的关于安全性和保密性的讨论。
Another example may be an expression that only allows certain people to view the information contained within the message, which links back to the previous discussion about security and privacy.
应用推荐