蠕中病毒是一种小软件,它利用计算机网络和安全漏洞来进行自我复制。
A worm is a small piece of software that USES computer network and security holes to replicate itself.
混沌加密在计算机网络和安全通信方面的应用为解决信息安全问题开辟了一种新的研究途径。
Chaotic encryption applies a new research approach to solve security of information in computer network and security communication inaugurate.
同时,移动通信和计算机网络技术渗入到我们生活中的方方面面,各种应用不胜枚举,相关的安全问题也越来越受到人们的关注。
In addition, the technology of Mobile Communication and Computer Internet break into People's Daily life so that more and more people focus on the security problem.
最后,对计算机网络病毒的检测和当前网络安全的主流技术进行了分析。
At last, the popular technology about computer network virus detection and information and network security is summarized.
随着计算机网络和分布式计算机的普及和应用,网络安全正在变得越来越重要。
With the popularization and application of the computer network and distributed computer, the security of network becomes more and more important.
当创建一个计算机网络,以满足大型企业的需求,技术人员必须保证效率、冗余性和安全性。
When creating a computer network to serve the needs of large organizations, technicians must insure efficiency, redundancy, and security.
计算机网络是信息社会的基础,它能有效地实现资源共享,但资源共享和信息安全是一对矛盾体。
Computer network is the foundation of information society, which can be carried out for resource sharing, while information security and resource sharing are contradicted.
提出了计算机网络安全检测技术及其工作原理和逻辑结构,并对部分检测工具进行了详细探讨。
In this paper, logic architecture and work principle of security technologies of computer network are presented, and then some detection tools are discussed.
计算机网络有效地实现了资源共享,但资源共享和信息安全是一对矛盾体。
The computer network will realize the resource sharing effectively, but the resource-sharing and information security is a pair of contradictions.
从电子商务系统对计算机网络安全,商务交易安全性出发,在分析网络安全技术和交易安全技术的基础上,给出了一种保证电子商务安全的体系结构。
Starting from the computer network security and the commercial trade security, basing on the technology of network security and commerce security, this paper is presenting the security system model.
随着计算机网络应用日益普及和复杂性的不断增加,网络蠕虫严重威胁着网络安全。
With the rapid growth of computer application and increasing complexities, the Internet worms are seriously threat the net- work security.
网络管理是指对计算机网络的运行状况进行监测和控制,使其能够有效、可靠、安全、经济地提供服务。
Network management refers to the operation of computer networks to monitor and control the situation so that it can be efficient, reliable, safe and economical delivery of services.
随着计算机网络的迅猛发展,网络在为人们提供便利和带来效益的同时,也使人们面临着信息安全的巨大挑战。
With the fast development of computer network, network provides convenience and benefits for people, but it also makes people face to the challenge of information security.
探讨了采用DES和RSA混合加密方式来实现计算机网络通信中的信息安全的问题。
This paper discusses on the problem of realizing the information security of network communication by using DES and RSA hybrid encryption technology.
未来商业和通讯将越来越多地使用计算机网络,因此,网络安全越来越重要。
As commerce and communication in the future continue to move to computer networks, security will become more and more vital.
随着计算机网络技术和多媒体信息技术的飞速发展,信息安全问题也随之而来。
The rapid development of computer network technology and digital multi-media technology has brought about a slew of issues with regard to information security.
随着计算机网络的普及和应用的深入,网络安全日益重要,研制具有自主知识产权的安全以太网芯片迫在眉睫。
With the popularization and in-depth application of networks, the network security is more and more important Its urgent to develop a security Ethernet chip with IP.
该文对计算机网络安全存在的问题进行了深入探讨,并提出了对应的改进和防范措施。
In this paper, the computer network security problems are discussed thoroughly, and put forward the corresponding improvement and preventive measures.
入侵检测技术是对原有计算机网络安全机制的合理补充,它的应用极大地扩展了网络和系统安全的防御纵深。
Intrusion Detection technology is rational supplement of original computer network security system. The application of it considerably strengthens network and system security.
随着计算机网络技术的广泛应用,网络安全问题已不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。
With the extensive application of computer network technology, security problem could not be ignored. Computer network, as an open system, has to face up to various threats and attacks.
文章介绍了计算机网络系统IP层安全概况和入侵者对IP层常采用的入侵手段,以及为防止这种入侵所采取的措施。
This paper introduces IP layer security of computer system, incidences often use invading method to IP layer. In order to prevent the invading, should take the measure.
安全性分析研究工作需要把计算机网络与安全相关的系统资源和安全因素抽取出来建立一种面向安全性分析的安全模型。
The research of security analysis needed a systemic security analysis model that was from the system resource and security factor of computer network.
文章从计算机网络系统的硬件设施和软件资源两个方面论述了计算机网络安全的脆弱性和潜在威胁。
The fragility of a computer network and the potential threat to the safety of such a network are discussed in the light of the hardware and software resources of a computer network system.
针对计算机网络的自身特点及其常见错误的产生根源,将容错技术应用于网络的核心设备网络服务器中,以提高网络服务的可靠性和安全性。
Aiming at the characteristics of network and the root of failures, the paper applies the technology to network server as to improve security and reliability of network service.
操作系统的类型信息对于研究针对计算机网络的入侵行为和安全防护措施是非常重要的。
Information of OS types is very important to the research on intrusion behaviors against computer networks.
本文旨在分析计算机网络面临的威胁和存在的安全隐患,并提出防范技术,提高计算机网络安全。
This text aim is analyzing the threat and exists of safety face in the Compute network and put forward guarding against the technique, raising the Computer network safety.
本文分析和研究基层银行计算机网络安全体系的构建问题,研究成果可用于银行安全体系构建。
This article analyses and discuss the construction of the computer network security system for the basic branch of bank, in a bid to give advice to the other network security system builders.
计算机网络技术的普及和随之而来的安全威胁日渐突出,对计算机网络安全的研究也显得日益迫切。
The popularity of computer network technology and the attendant issue of network security makes computer network security become increasingly important.
随着计算机网络技术的广泛应用,网络安全问题已不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。
With the extensive application of computer network technology, security problem can not be ignored. Computer network, as an open system, has to face up to various threats and attacks.
随着计算机网络技术的广泛应用,网络安全问题已不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。
With the extensive application of computer network technology, security problem can not be ignored. Computer network, as an open system, has to face up to various threats and attacks.
应用推荐