• TEMPEST ATTACK threat on the computer information security is analyzed. The fundamental electromagnetic radiation models are set up.

    针对TEMPEST ATTACK计算机信息安全构成的威胁建立基本电磁辐射模型

    youdao

  • Many authorization models have been proposed to ensure information security of computer systems.

    人们已经提出了一些授权模型保证计算机系统信息安全

    youdao

  • Absrtact: access control is one solution of computer security, which have straight and nature features. Role - Based access control has most important influence among all access control models.

    摘要访问控制众多计算机安全解决方案中的种,是直观自然的一种方案。

    youdao

  • Absrtact: access control is one solution of computer security, which have straight and nature features. Role - Based access control has most important influence among all access control models.

    摘要访问控制众多计算机安全解决方案中的种,是直观自然的一种方案。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定