Attacking network means emerges endlessly and network security issues have become particularly important.
攻击网络的手段层出不穷,网络安全问题也变得尤为重要。
This paper details the conception of network security, the threat network facing and network security techniques.
给出了网络安全的概念,网络所面临的威胁,提出了解决网络安全的相关技术。
This is an advanced example and assumes familiarity with cryptography, inter-process communication, and network security.
这是一个高级示例,假定您熟悉加密、进程间通信和网络安全。
At last, the popular technology about computer network virus detection and information and network security is summarized.
最后,对计算机网络病毒的检测和当前网络安全的主流技术进行了分析。
Capture mechanism on network data packages is the basic analysis tools of network capability and network security systems.
数据包截获机制是网络性能分析工具和网络安全工具的实现基础。
The main research content of this paper is network information detection technology and network security evaluation method.
本文主要研究的内容是网络信息的探测技术和建立在信息探测基础上的安全评估方法。
Realizing the network topology clearly is very important for network's maintenance, devices' management and network security.
清楚的了解网络拓扑情况对网络维护、设备管理以及网络安全有着重要的意义。
The meeting will include not only the release of new content, but also a not to be missed, cloud, network and network security event.
本次会议将不仅包含新品的发布内容,同时更是一场“不容错过”的云端、网络和网络安全的盛会。
Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.
与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。
The buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area.
缓冲区溢出攻击是网络攻击事件中最常用的一种攻击方式,成为系统和网络安全中亟待解决的重要问题。
Unhealthy servers accounted for 66%, sub health servers accounted for more than 26%. Cloud lock to help users fix vulnerabilities and network security strategy.
不健康的服务器占比66%,亚健康服务器占比26%。云锁帮助用户及时修复了漏洞补丁及网络安全策略项。
Then, the author discusses them from four aspects: the configuration of server, information organization and resource storage, load balance, and network security.
接着从服务器配置技术、资源组织与存储技术、负载均衡技术和网络安全技术几个方面予以论述。
Unhealthy servers accounted for 66%, sub health servers accounted for more than 26%. Network anti G01 help users fix vulnerabilities and network security strategy.
不健康的服务器占比66%,亚健康服务器占比26%。网防g 01帮助用户及时修复了漏洞补丁及网络安全策略项。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
In view of the importance of information and network security, a method of Chinese information encryption, BMP image and text hiding and the decryption is put forward.
针对信息与网络安全的重要性及严峻性,提出了一种汉字信息加密、在BMP图像文件中隐藏、恢复及解密的方法。
Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.
加密卡可以为个人计算机系统、网络安全设备提供密码服务,以实现数据的安全存储和网络信息的保密通信。
Four key techniques of telemedicine system about are researched respectively, which are network protocols, multimedia database system, data compress and network security.
本文对远程医疗的四个关键技术——网络协议、多媒体数据库技术、数据压缩技术、网络安全分别进行了研究。
With the rapid development of network technology, the network gradually penetrates into all aspects of life and work, and network security issues become increasingly serious.
随着网络技术的迅猛发展,网络逐渐深入到生活和工作的各个方面,随之而来的网络安全问题日益严峻。
Abstract: this paper discussed four network security problems-network insecurity problems network security classification network security policy and network security measure.
文摘:从网络所面临的威胁、网络安全等级、网络安全策略和网络安全措施等四个方面,分析与探讨网络安全问题。
With the continuous development of Internet, Network Management and Network Security have been regarded as an important thing more and more, which people have to be considered.
网络管理及网络安全对任何网络都是必须考虑的,相应的这方面的设备也就成为当前研究的热点。
Then common reconfigurable computing platforms are introduced and also the application models of reconfigurable computing in areas such as signal processing and network security.
然后介绍了几种常见的可重构计算平台,以及可重构计算在信号处理、网络安全等领域的应用模型。
On the platform, the paper analyzes the component technology, middleware technology, data storage and backup technology, load balancing technology and network security technology.
在平台建设技术方面分析了构件技术、中间件技术、数据存储备份技术、负载均衡技术和网络安全技术及相应的标准。
Especially its mobility support lays a foundation for personal communication. The difference from traditional networks makes user management and network security great challenges in WMSN.
因为它不同于传统网络,所以对用户接入管理和网络安全带来了新的质询。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
In this paper discusses mainly the possibility and means which make up harms to the network resources, and network security as well as policy, then introduces network security Architecture.
本文主要讨论了对网络资源构成危害的可能性及其手段等网络安全性问题,说明了网络安全体系结构及其技术。
This paper briefly expounds the management and maintenance of E-reading room from aspects of the rules and regulations, indoor environment, software and hardware, and network security, etc.
从规章制度、室内环境、软硬件、网络安全等方面简要阐述了对电子阅览室的管理和维护。
This paper briefly expounds the management and maintenance of E-reading room from aspects of the rules and regulations, indoor environment, software and hardware, and network security, etc.
从规章制度、室内环境、软硬件、网络安全等方面简要阐述了对电子阅览室的管理和维护。
应用推荐