Data protection, including adding a security policy, can be done when creating the table or later by altering the table.
数据保护,包括添加安全策略,可以在创建表时进行,也可以在创建表之后通过修改表来实现。
Data protection is always a series of calculated risks, and even such technologies as snapshots, continuous data protection (CDP), replication, and RAID are not absolute guarantees of security.
数据保护是一系列计算出的风险,像快照、连续数据保护(CDP)、复制和RAID技术都无法提供绝对的安全保障。
Tape provides another technical differentiator from disk systems that addresses both security and data protection concerns: a completely offline copy of data.
磁带提供与磁盘系统不同的技术区别,离线备份能够解决安全和数据保护问题。
In a traditional desktop environment, user data is often stored on the device, leading to challenges about the security and protection of user private information and corporate intellectual property.
在传统的桌面环境中,用户数据常常存储在用户的设备上,这会在用户私有信息和公司智能资产的安全性方面造成问题。
To learn more about the current state of security perspectives between CISOs and CEOs, read the "Building the Business Case for Data Protection" report (see Resources).
如果您想要了解更多关于CISO与CEOs安全视角的当前状态的信息,那么您可以阅读“为数据保护构建业务用例”报告(参见参考资料)。
NetQin delivers mobile security services, including antivirus, anti-spam, privacy protection, data backup and restoration, and online virus scan, to 55 million users in more than 200 countries.
网秦提供移动安全服务,包括防病毒、防垃圾短信、隐私保护、数据备份恢复和在线病毒扫描等,目前在200多个国家有5500万用户。
All security features needed to provide an acceptable level of protection for hardware, software, and classified, sensitive, unclassified or critical data, material, or processes in the system.
用于对系统中硬件、软件、机密、敏感、不机密,或关键性的数据,材料或过程提供可接受的水平的保护的所有安全特性。
For the protection of personal information security in the big data environment, ma Huateng made four recommendations, including.
针对大数据环境下的个人信息安全保护问题,马化腾提出四项建议,包括。
The encryption and protection of data in the database is an important part of database security.
而对数据库中数据的加密保护,是数据库安全的重要内容。
It also includes the management objective of internal audit, which includes not only the audit IS protection of asset security and data integrity, but also the effectiveness of IS.
又包括内部审计的管理目标—即不仅包括被审计IS保护资产安全及数据完整,且包括IS的有效性目标。
The security of mobile agent systems lies in the protection of confidential data, the verification of mobile agents and mobile agent platforms.
移动代理安全性体现在移动代理机密数据的保护、移动代理和移动代理执行平台的验证等。
Personal information protection based on data security, the need for comprehensive management of laws, standards and norms.
个人信息保护以数据安全为基础,需要法律、标准规范等综合治理。
The paper discusses the state of existence of data in computer and the security problem in stored procedures, and carries out the exploration on data security and protection.
本文从各类数据在计算机中存在的状态以及在存储过程中的安全问题,对数据的安全性和保护性进行了论证。
Some literature named this technology of protection data and prevention of the illegal data accessing as the computer security or the system security technology.
有些文献将这些保护数据、阻挡非法数据访问的技术统称为计算机安全或系统安全技术。
Security measures are provided for personnel, user accounts, system policies, data protection, and virus prevention.
对人员、用户帐号、系统策略、数据保护、病毒防治制定了详细的安全措施。
It has brought us great convenience and a great number of information security problems as well. Such as information theft, copyright protection of multimedia data and image authentication.
它给人们带来种种便利的同时也带来了一系列的信息安全问题,比如信息窃取问题、多媒体信息的版权保护问题、信息篡改问题等。
The air interface security technologies for the protection of data confidentiality and data integrity in 3g are discussed.
讨论了第3代移动通信系统的空中接口安全保护技术,包括数据机密性保护、数据完整性保护。
NET applications generally need to restrict access to some portions of the Web site and provide other mechanisms for data protection and site security.
NET应用程序通常需要限制网站某部份的存取,并提供其他机制以保护资料和网站安全性。
If users are worried that they will be the next victim due to files or data leak, perhaps MSD Strongbox, a private documents and files manager with maximum security protection could be their solution.
如果用户担心他们会成为下一个受害者,由于文件或资料泄漏,可能默沙东斯特朗·博斯,私人文件和文件最大的安全保护管理器可以解决这些问题。
Data security in cloud storage is closely related to network security, the legal protection of data security urgently needs to be developed.
云存储中的数据安全与网络安全息息相关,数据安全的法律保护亟需制定。
The digital watermark technology is one kind of effective digital product copyright protection and the data security maintenance technology which appears in the recent ten years.
数字水印技术是近十年来出现的一种有效的数字产品版权保护和数据安全维护技术。
In order to keep data at rest from being accessed, stolen, or altered by unauthorized people, security measures such as data encryption and hierarchical password protection are commonly used.
为了防止静止数据被不法人士存取、窃取或修改,通常采取一些安全措施,如数据加密和分等级的口令保护。
This paper puts forward the safety problem of network information of our country through a group of data concerning online security, network intellectual property protection, and online crime.
文章从网络安全、网络知识产权保护、网络犯罪三个角度提出了我国网络信息安全存在的突出问题。
Data security technology, data security protocols and P2P technology are the effective measures for Online Privacy protection.
网络信息安全技术、信息安全协议、P 2 P技术成为网络隐私安全保护的有效手段。
The security of HIS is an increasingly critical factor in the safety and efficiency of daily operation and data protection.
但随之而来的信息安全问题正对医院的日常业务及各类数据造成严重威胁。
Describe the it security policies and procedures for password protection and to identify the abuse of improper access, tampering or the altering of business data.
描述信息技术保全政策和程序,对密码保护和识别滥用不当访问,篡改或改变业务数据的程序。
We are committed to protecting the privacy, confidentiality and security of your personal information by complying with applicable laws, including your local data protection legislation.
我们承诺遵守适用的法律,包括您的本地私隐保障法例,以保障您的个人资料的私隐、保密性及安全。
Intentional delete or accidental delete always leads to computer data loss. Data recovery plays an important role in information security protection.
恶意删除或数据误删现象时常发生,数据恢复的成败关系到信息的安全。
It can provide effective protection for digital media forgery, falsification, authentication, security and intactness by embedding a special mark (digital watermark) into the multimedia data.
它主要通过在媒体信息中嵌入标记信号(数字水印),为媒体信息在防伪、防篡改、认证、保障数据安全和完整性等方面提供有效的技术手段。
It can provide effective protection for digital media forgery, falsification, authentication, security and intactness by embedding a special mark (digital watermark) into the multimedia data.
它主要通过在媒体信息中嵌入标记信号(数字水印),为媒体信息在防伪、防篡改、认证、保障数据安全和完整性等方面提供有效的技术手段。
应用推荐