The study looked at practices like backing up data, using password protection, and running virus scans, and ranked 35 big cities across the U.S. based on its survey.
此研究涉及的调查项目包括数据备份,用户密码保护以及运行病毒扫描,根据其调查结果对美国35个大城市进行了排名。
Strict data-protection laws prevented Brockmann from carrying out his own version of the mobile-phone study in Germany, where he was based until recently.
严格的数据保护法规使得布洛克曼无法在德国开展他新一轮关于手机的研究,而直到最近,他的研究主要都是在那儿进行。
Based on it, this article puts forward a reservation - layer protection data and sensitivity prediction system software, and raises a sensitivity prediction model through multiple - statistics.
在此基础上设计储层保护数据库及敏感预测系统软件,并通过多元统计回归分析提出了储层敏感性预测模型。
Based on the analysis of a typical stator ground fault and its recording data, the protection action is proved to be correct.
通过对一次典型的定子接地故障情况和保护录波数据分析,证明了保护动作行为的正确性。
Based on the theory of graded protection, information domain of SCAL information network are divided as well according to the different safety grade of different data.
基于等级保护的思路,按照不同数据的不同安全等级,给出了川航信息网络的信息域划分方法。
Guangzhou relay protection information management system is constructed based on the dispatch data web and dispatch centre-control integrative data platform.
广州继电保护信息管理系统,是基于电力调度数据网和电力调度集控一体化数据平台而构建的。
Moreover, to lower maintenance efforts, the technique of network harddisk recovery card is adopted in implementing data protection, copy and recovery based on networks.
采取网络硬盘还原卡,实现了硬盘数据保护及网络对拷,达到了减少维护工作量的目的。
This paper focuses on the audio watermarking for copyright protection which embeds the binary image data into the time domain of the audio signal based on the spread-spectrum technique.
本文只讨论用于版权保护的,利用扩频技术在时域嵌入二进制图像数据的音频水印技术。
In order to use cryptographic techniques to avoid the lack of data protection, this paper proposes a new watermark algorithm based on block statistics.
针对密码技术在数据保护方面的不足,提出一种新的数字水印算法——基于分块统计的水印嵌入算法。
Personal information protection based on data security, the need for comprehensive management of laws, standards and norms.
个人信息保护以数据安全为基础,需要法律、标准规范等综合治理。
The thesis presents the design and realization of a data synchronous acquisition system in integrated protection based on FPGA and digital frequency multiplying technique.
本论文的任务是设计并实现基于FPGA及数字倍频技术的集成保护中数据同步采集系统。
An intelligent printer card is designed to reduce the main CPUs working load of digital bus protection, which is based on80386EX and used to implement the tasks of printing data processing and print.
为减轻微机母线主保护CPU的工作负荷,开发一个以80386ex为核心的智能打印板完成数据处理及打印任务。
In earlier version, authentication and key management protocol is called Privacy key management (PKM); and data protection protocols include two solutions based on DES-CBC and AES-CCM.
早期规范中的认证与密钥管理协议为保密密钥,管理(PKM),数据保密机制包含基于DES -CBC和AES - CCM的两个解决方案。
This article is based on the space resource data from the cultural relic protection information data and establishes the systematic framework combining GIS technology.
以文物保护信息资源数据中的空间资源数据为基础,结合GIS技术进行了系统的结构搭建。
If you choose SQL authentication, the connection strings are encrypted, using Data Protection API (DPAPI), based on your user credentials.
如果选择SQL身份验证,将使用数据保护API (DPAPI)基于您的用户凭据对连接字符串进行加密。
A corporate corrosion data management and evaluation system has been established based upon the corrosion conditions and protection requirements of the equipment in Dushanzi Petrochemical Company.
结合中国石油独山子石化分公司(以下简称公司)设备腐蚀与防护的现状和需要,建立了石化公司腐蚀数据管理及评价系统。
Unusual sampling data will cause incorrect action of microprocessor-based protection, which needs some reasonable countermeasures.
采样数据异常可能会导致微机保护的不正确动作,需要采取恰当的应对措施。
A protection scheme of mobile agents based on obfuscated agent data variables and time checking technology is presented in this paper.
提出一种基于迷乱代理数据变量和时间核查技术的移动代理保护方案,同时给出获得时间核查技术中主要数据的方法。
Based on the encryption method, a pirate tracing scheme is proposed for the copyright protection of digital data.
根据所提的加密算法,给出了一种适用于数字数据版权盗版跟踪方案。
Based on the encryption method, a pirate tracing scheme is proposed for the copyright protection of digital data.
根据所提的加密算法,给出了一种适用于数字数据版权盗版跟踪方案。
应用推荐