Meanwhile, these important information network systems face the threat attacked in invasion, and the loophole of operating systems and applications is the foundation of attack implemented by attacker.
与此同时,这些重要的信息网络系统面临入侵攻击的威胁,而操作系统和应用服务程序的漏洞正是攻击者实施攻击的基础。
There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.
同样,有网络和无线安全技能的人群以及那些具有认证信息系统安全专业证书的也备受青睐。
In addition, managing systems can set information and parameters on the agent, but this is usually only used to change the network configuration.
此外,管理系统可以设置代理上的信息和参数,但是这通常仅用于更改网络配置。
Military commanders depend on a complex network of command and Control (C2) systems to provide critical information to support decision making.
军事指挥人员依赖一种指挥控制(C2)系统的复杂网络,提供关键信息来支持决策制定。
WHO, and its partner the Health Metrics Network, focus on improving health information systems and the ability of countries to track major causes of death.
世卫组织及其合作伙伴卫生计量系统网络致力于改善卫生信息系统和增强国家了解重大死亡原因的能力。
Network integration kit to bring GMR to the Warfighter Information Network-Tactical Increment 1 Joint Network Node systems.
网络集成工具包:为GMR提供战术级作战人员信息网增量1联合网络节点系统。
Only "changed" information is sent across the network and passed through extensive transformation processes, thus lessening the burden on the network and systems performing manipulation.
仅通过网络发送“更改的”信息,并对其进行进一步的转换处理,从而减少了网络和执行相关操作的系统的负担。
Most employees work outside the corporate network, and systems that house secret proprietary information, such as source code, are strictly guarded.
大部分员工工作于企业网络之外,掌管秘密的专利信息如源代码的系统会受到严格的保护。
Services include system of systems engineering and integration, network and interoperability engineering, architecture development and information assurance.
服务内容包括系统工程和集成、网络工程和互操作性、体系研发和信息保障系统。
In addition to radios, the matrix can test the underlying network aspects for network operations, network management systems and information assurance capabilities.
除了无线电之外,矩阵可以为网络运营、网络管理系统和信息保障等测试基础网络能力。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
For the new contract, Dell Perot Systems will continue to provide network operations, desktop services, email, information assurance, telephones, and connectivity to long-haul communications.
根据新的合同,戴尔perot系统公司将继续提供网络运营、桌面服务、电子邮件、信息安全保障、电话和长途通信。
Network interfaces, routers and bridges, server computers, rack systems, and blades may be regularly polled to return status information in response to SNMP Get requests.
网络接口、路由器和桥接、服务器计算机、货架系统、刀片服务器可能被定期轮询,返回状态信息以响应SNMPGet请求。
Provisioning. Adds new users to network operating system directories and application server directories, both inside an enterprise and outside at partner information systems.
准备(provisioning)—将新用户添加到企业内部信息系统和外部合作伙伴信息系统的网络操作系统目录和应用程序服务器目录中。
PM DSC-E is part of the Network Service Center Project Management Office, an organization of the Army Program Executive Office, Enterprise Information Systems.
PMDSC - E是网络服务中心项目管理办公室的一部分,是企业信息系统下陆军计划执行办公室的一个组织。
The GIG aims to achieve information superiority in a network-centric environment by enabling various systems and messaging-based Web services to interoperate with each other in parallel.
GIG的目标是在以网络为中心的环境中获得信息优势,使各种系统和基于消息传递的Web服务能够以并行方式进行互操作。
The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.
数据库是所有信息系统的核心,数据库的安全通常是指其中所存数据的安全,是网络安全、信息安全的重要组成部分。
The threat is critical. Attackers get access to an internal bank's network and critical information systems.
这种威胁十分严重。罪犯可以入侵银行的内部网络以及重要的信息系统。
Therefore, it can be applied to information published, network equipment management, network application management and network safety systems.
因此,可以广泛应用于信息发布、网络设备管理、网络应用管理和网络安全等各个方面。
The threat is critical. Attackers get access to an internal bank's network and critical information systems. That allows them to rob the bank.
黑客攻击的威胁十分严重。罪犯可以黑进银行的内部网络以及重要的信息系统,这让罪犯远程抢劫银行成为了可能。
Thee-commerce platform can integrate the information systems of enterprise and establish expansible, interactive enterprise information systems network which supports rational operation flow.
电子商务平台能集成企业内外的信息系统资源,建立可扩展的、交互性强的、业务流程合理的企业信息网络。
The functionality and accuracy of this feature is dependent on the network, satellite systems, and the agency receiving the information.
功能和它的特点是依赖于网络、卫星系统,该机构收到的信息。
With high efficiency of CANbus network, the protection & monitor units of substation bays can exchange information through the network quickly to achieve data sharing in substation automation systems.
变电站间隔层的保护测控单元可以通过网络交换信息和数据,因而CAN总线网构成了高效率信息、数据网络。
This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.
本文描述AT M网络中的信息安全、可能受到的威胁、安全结构和端系统之间的鉴别技术。
It has a satellite communications and transmission network, and has introduced 10 computerized information processing systems.
它有一个卫星通信和传输网络,并引进了10个计算机信息处理系统。
The near neighbor pair query of the datasets in the network has important application in geographical information systems, query in the network and spatial database.
网络环境下的数据集中的近邻对查询在地理信息系统、网络查询和空间数据库等领域有着重要的应用。
So designing and implementing information systems to support the logistics network is critical.
因此设计和实施信息系统来支持物流网络也是至关重要的。
So designing and implementing information systems to support the logistics network is critical.
因此设计和实施信息系统来支持物流网络也是至关重要的。
应用推荐