此场景经常用于所有组件都是内部组件、使用相同的安全性管理且属于受信任计算机群的情况。
This scenario is frequently used when all components are internal, under the same security management and part of the trusted computer base.
网络防御的另外一个重要的方面是提高计算机自身的安全性。
Another important component of cyber defense is to improve security on the computers themselves.
飞机失事没有碰撞的两千个黑盒子参数将通过计算机分析获得,将进一步提升航空线的安全性。
Two thousand black box parameters from planes that do not crash can be harvested via computer analysis to further increase airline safety.
风险、培训和文化:执行风险评估和容纳计算机及网络基础结构的设施的物理安全性评估。
Risk, training, and culture: Conduct risk assessment and physical security of your facility that houses the computer and network infrastructure.
通过利用UNIX处理文件系统和卷的方法可以提高计算机的安全性和性能。
UNIX's method of handling file systems and volumes provides you with an opportunity to improve your computers' security and performance.
从示例到实现,这里提供的对gdm的修改使您可以增强计算机的安全性。
Moving beyond examples and into implementation, the modifications to GDM presented here allow you to enhance the security of your computer.
不过,您也应该花一些时间来确保其他计算机(包括您的桌面系统)也具有合理的安全性。
However, you should also spend some time ensuring that other computers, including your desktop systems, are reasonably secure.
这些修改不会显著增强计算机的安全性,但是只尝试强力攻击标准端口22的一般脚本会失败,不会造成损害。
These changes don't substantially add to the security of your machine, but a common script that just tries brute force attacks at the standard port 22 will fail harmlessly.
美国在这方面,有着众多的法律,比如萨班斯法案,健康保险流通与责任法案以及其它的法律,它们都对存储在计算机系统中的数据的安全性有着相应的要求。
There are many laws in effect here in the United States such as Sarbanes-Oxley, HIPPA and many others that require data stored in computer systems to be secured.
每一领域都有其自己的术语,而计算机安全性领域中的术语则有些杂乱无章,其中充斥着首字母缩写词和易混淆的词。
Every field has its own terminology, and the computer security field is littered with acronyms and confusing words. These few definitions should help.
大概Google是在努力为用户提高计算机安全性——软件开发商一直就埋怨用户不遵守合适的安全措施。
Perhaps Google's trying to improve computer security for users — software vendors have been grousing about users not following proper security practices.
既然现在这些工具可由各种规模的企业—从全球企业到便携式计算机上的一个基于WebSphereMQ客户机的应用程序—访问,安全性模型就能适应架构变化的要求。
Now that those tools are accessible to every size shop — from global enterprises to a WebSphere MQ client-based application on a laptop — the security model can catch up to the architecture.
增强计算机安全性的最后一种方案是最激进的:关闭打开的端口,这会让任何攻击都无法攻破您的计算机。
The last scheme for adding security to your machine is the boldest one. You will close the open port making your machine virtually impregnable to any attack.
可以使用一些安全网络协议技术,例如IPSec,来保证网络上计算机间通信信道的安全性。
A secure network protocol technology such as IPSec might be used to secure the communication channel between computers on a network.
医疗设备像其它计算机系统一样,同样很容易出现安全漏洞,从而影响到设备的安全性和有效性。
Medical devices, like other computer systems, are also vulnerable to security breaches, which affect the security and effectiveness of the device.
当创建一个计算机网络,以满足大型企业的需求,技术人员必须保证效率、冗余性和安全性。
When creating a computer network to serve the needs of large organizations, technicians must insure efficiency, redundancy, and security.
Mayank的上一篇文章“使用LinuxLiveCD评估系统的安全性”介绍了LiveCD,还介绍了一些可帮助您评估计算机系统安全性的工具。
Mayank's previous article "assess system security using a Linux LiveCD" looked at LiveCDs that come with tools to help you assess your computer's security.
计算机网络的安全性已成为电力系统正常运行的关键。
The security of computer network has been the key factor of power system ' s proper operation.
本文第一章分析计算机网络的安全性,介绍保障计算机网络安全的基本技术,指出密码技术是网络安全技术的核心。
This article first analyzes the security of computer network, introduces basic technology that guarantee the security and emphasizes that cryptography is the core technology.
针对计算机病毒对计算机系统安全性的影响,给出保证计算机系统安全的措施具有现实意义。
In view of the computer virus influence on computer system security, it has real significance to develop measures to protect computer system safety.
计算机病毒是由一系列电脑程序组成的,它对计算机系统的安全性和完整性构成威胁。
Computer virus, whose essential component is a set of instructions, is one kind of threat to the security and integrity of computer system.
如今在计算机网络环境下信息的机密性、安全性、完整性、可用性等特性,都需要采用密码技术来解决。
Nowadays, in the computer network environment, all the confidentiality, security, integrality, usability and nonrepudiation of the information must be resolved by encrypting technology.
然后,讨论了模糊故障树分析在计算机联锁软件的安全性分析中的应用。
Then, applications of fuzzy fault tree analysis in safety analysis of computer interlocking software are discussed.
应急响应是维护计算机和网络系统动态安全性的关键问题。
Emergency Response is regarded as the key problem of dynamic security of computer and network systems.
激光针灸的有效性和安全性已被证实,而计算机辅助诊断技术也逐步在医学中得到应用。
The validity and security of the laser acupuncture has been confirmed, and computer aided diagnosis technology is gradually used in medicine.
描述了一种具有高网络资源利用率、具有用户移动性和安全性等特点的安全网络计算机系统。
This paper expatiates one kind of secure network computer system which characterizes high usage of network resources, excellent user mobility and security.
指挥自动化网络安全系统,基于信息存储、通信信道、计算机病毒及电磁辐射等安全性分析。
Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.
这种技术现已在铁路车站计算机联锁软件安全性测试评估平台中得以应用,文章分析了其应用效果。
The method and the technique now have been applied to the safety testing and assessment platform for railway signalling computer interlocking software and the results are analyzed in this paper.
这种技术现已在铁路车站计算机联锁软件安全性测试评估平台中得以应用,文章分析了其应用效果。
The method and the technique now have been applied to the safety testing and assessment platform for railway signalling computer interlocking software and the results are analyzed in this paper.
应用推荐