It's hard to stay ahead of the game in network security when the landscape is constantly changing.
当形势不断变化时,在网络安全领域保持领先地位是困难的。
And explains the application of the active defense system and the passive defense system in network security.
阐述了主动防御系统与被动防御系统在网络安全中的应用。
Due to its essential role in network security, research on intrusion detection techniques is of great importance.
鉴于入侵检测技术对网络安全所起的重要作用,对入侵检测技术进行研究具有重要的意义。
But as there are still many problems in network security, so payment in network has much risk, which prevent the development of ec.
但是,由于网络安全还存在很多问题,网上支付有很大的风险,给电子商务的普及造成了一定的障碍。
Because the system has characteristics of easy implementation, fast rate and real time, it has wide application future in network security.
由于该系统具有硬件实现容易、处理速度快、实时性好、扩展能力强等优点,使得该系统在网络安全中具有广泛的应用前景。
Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.
访问控制技术是网络安全的一项基本技术,主要包括基于角色的访问控制和基于任务的访问控制等技术。
The capture of network data packets plays an important part in network security, which is helpful for our better analysis of network data flow.
网络数据包的捕获对于网络安全有着巨大的作用,为我们更好的分析网络中的数据流提供了帮助。
Therefore, identity authentication for visitors is more and more important and become one of the most significant techniques in network security field.
因此,对网络资源访问者的合法身份进行认证就变得非常的重要,身份认证技术已经成为网络系统安全中最重要的技术之一。
Through analysing apparel electronic-commerce security technique, a systematic structure and ways used of it in network security are educed in this paper.
探讨服装电子商务的安全技术问题,得出了服装电子商务的网络安全的体系结构及其使用方法。
As a new direction in network security, survivability is different from traditional network security, it gives a new way to research the network security.
网络可生存性是网络安全研究的新方向,它突破了传统的网络安全的概念,从新的角度对网络安全问题进行研究。
At the industrial level, to improve the level of industrial support, establish a good market environment, cultivate China's leading enterprises in network security.
在产业层面,提高产业化支撑水平,建立良好的市场环境,培育我国网络安全龙头企业。
Recently, network security situational awareness (NSSA) is becoming an emerging topic in network security domain, which generally reflects the status of network security.
网络安全态势感知是近年来一个新兴的网络安全研究课题,是对网络安全状况的一个整体反映。
Content filtering in network security is a new subject. This paper founds a complete content filtering model and implements the content filtering model in WWW proxy of TIS.
内容过滤是网络安全领域的新课题,文章建立了一个完整的内容过滤模型,并在TIS的WWW代理服务中实现了此内容过滤模型。
The model is applied in security evaluation work and the practice result proves that the model and algorithm do a good directive function in network security protection and management.
实践结果证明,应用该算法和模型实施的风险评估对被评估单位的网络安全防护和管理工作起到了良好的指导作用。
The experiments show that the improved learning algorithm of association rules in network security audits have better performance of automatic adaptive capacity, achieving the expected effect.
实验结果表明,改进的关联规则学习算法在网络安全审计的自适应能力上有较好表现,取得了预期效果。
In order to prevent and control illegal and harmful information to spread on Internet, it has become significant problem in network security field to filter the information spreading on Internet.
为了防止和控制非法,有害信息进行传播,对网络上传播的信息进行内容过滤已成为目前网络安全研究的重点问题。
In this paper, the component parts of P2DR are analysised through the method of time-measured. Also the necessity and availability of employing this method in network security analysis are emphasized.
本文运用时间计量的方法对P 2dr模型进行了量化分析,并强调了将这一方法运用到网络安全分析中的必要性和可行性。
How do you determine the level of security in your office network, even if you have a network administrator manning it?
我们又应该如何来判断办公网络的安全级别呢(尽管您可能有一个网络管理员在管理网络)?
In my day-to-day work, I have found that many users are frustrated by new security imperatives imposed by network managers.
在日常工作中,我发现许多用户因为网络管理人员实施的新的安全规则而倍受挫折。
Work with the people in your corporation responsible for network administration and security to resolve potential connectivity issues.
与您公司内负责网络管理和安全的人员协作,解决潜在的连接问题。
This paper analyzes packet capturing principle in detail combined with the structure and functions of the software and introduces its application in designing a network security and watch system.
文中结合该软件包的结构与功能对包捕获原理进行了详细的分析,并介绍了其在网络安全监控系统中的应用。
These encrypted service tickets (credentials) are only understood by the client and the server, so there is minimal security risk, even in the event that the ticket is intercepted from the network.
这些加密的服务标签(凭证)只有客户机和服务器能理解,所以即使标签在网络中被拦截,安全风险也很小。
Implementing a password policy can be time consuming when presenting the information in a clearer format for reporting to security managers, especially when dealing with a large enterprise network.
如果需要以更清楚的格式向安全经理报告信息,实现密码策略会非常费时间,尤其是在处理大型企业网络时。
There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.
同样,有网络和无线安全技能的人群以及那些具有认证信息系统安全专业证书的也备受青睐。
It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
The overall security of a network is only as strong as its weakest link, and in a mobile-commerce network the weakest link is the client-side device.
网络总体安全性的强度取决于其最薄弱的环节,而在移动商业网络中,最薄弱环节是客户机端设备。
In fact, in many cases, subversive network applications and some security methods will deliberately use non-standard ports.
事实上,大多数情况下一些破坏性网络应用和一些安全性方法会故意使用非标准端口。
In fact, in many cases, subversive network applications and some security methods will deliberately use non-standard ports.
事实上,大多数情况下一些破坏性网络应用和一些安全性方法会故意使用非标准端口。
应用推荐