• Finally, Combined with the design of database system, the paper discusses the data integrity, and does some design and research on system security through information security and network security.

    最后论文结合数据库系统设计论述数据完整性信息安全和网络安全两个方面系统安全性进行了设计研究

    youdao

  • There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.

    同样网络无线安全技能人群以及那些具有认证信息系统安全专业证书的也备受青睐

    youdao

  • The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.

    数据库所有信息系统核心,数据库的安全通常其中所存数据的安全,是网络安全、信息安全的重要组成部分

    youdao

  • With the proliferation of computer and network techniques, database security has become an important research area of information security.

    随着计算机网络技术广泛应用,数据库安全技术成为信息安全重要研究领域

    youdao

  • Specifically, the wisdom of the city may encounter information security issues are divided into network security, system security, data security and integrated security.

    具体而言智慧城市可能遇到信息安全问题分为网络安全、系统安全、数据安全和综合安全。

    youdao

  • To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.

    进行信息网络安全技术标准研究开发相应的安全产品从事安全服务工作

    youdao

  • With more and more severe challenges of network security, information security has changed the track of history.

    随着企业面临越来越严峻网络安全挑战,信息安全问题已经改变了历史的轨迹

    youdao

  • Intrusion Detection System, new domain of Network Security, is a core research area in dynamic Information Security, but it still has many problems, especially in self-completing and self-learning.

    入侵检测系统目前安全领域课题,是动态安全领域核心目前仍然存在很多问题特别是具有自适应能力、能自我学习的入侵检测系统还不完善。

    youdao

  • This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.

    本文描述AT M网络中的信息安全可能受到的威胁、安全结构系统之间鉴别技术

    youdao

  • The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.

    通过设置密码蓝牙技术安全机制提供信息家电网络远程控制系统的安全保障

    youdao

  • In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.

    本文网络安全病毒防护主机系统安全三方面对信息系统的安全进行分析实现技术进行了探讨

    youdao

  • This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.

    课题现有网络通信技术数据库技术信息安全技术基础设计实现新型的安全即时通信系统。

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • This article from the computer system of information on the importance of the issue of security, focused on the impact of computer information network security factors and preventive measures.

    该文论述计算机系统信息安全问题重要性出发,重点探讨影响计算机信息网络安全的因素防范对策

    youdao

  • Conclusion Intranet security management system can effectively guarantee information security of hospital Intranet and greatly improve work efficiency of network maintenance personnel.

    结论内网安全管理系统能够有效保障医院内网信息安全和大幅提高网络维护人员工作效率

    youdao

  • The information security switch mechanism adopts the method of hardware and software combination to realize the information switch, and ensures the security of network terminal information.

    信息数据安全交换机制采用软硬件结合方法实现信息数据的快速交换,保障了网络终端信息数据的安全。

    youdao

  • Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.

    基于安全系统全面信息安全策略网络安全技术网络安全管理两个层次上研究内部网安全性

    youdao

  • This article mainly explains the problems that influence the information security in the teaching of network in universities, and the solution of defending to the problem of information security.

    本文主要阐述高等学校网络教学过程所遇到信息安全问题以及针对信息安全问题防御解决方法。

    youdao

  • In this paper, the threat to information security, information security technology and information security management of information security for the campus network, where explored.

    本文信息安全威胁、信息安全技术信息安全管理校园网信息安全进行探讨

    youdao

  • Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.

    指挥自动化网络安全系统基于信息存储通信信道计算机病毒及电磁辐射安全性分析

    youdao

  • Chaotic encryption applies a new research approach to solve security of information in computer network and security communication inaugurate.

    混沌加密计算机网络安全通信方面应用解决信息安全问题开辟一种新的研究途径

    youdao

  • The key technology of the network and information security prototype system is studied, the network and information security test platform is introduced, and the testing methods are explained.

    主要研究了网络信息安全原型系统中的关键技术介绍了网络与信息安全测试平台的组成,阐述测试方法

    youdao

  • This console integrates various network security infrastructure and information security software, can look up information about security and operate security resource quickly.

    平台各种网络安全设施信息安全软件整合在一起,能够快速查询安全信息和操控安全资源

    youdao

  • Based on the methods of network security counting and combined with the feature for wideband community information server, a security counting system is designed in this paper.

    现有网络安全计费方法基础上,结合宽带社区信息服务特点,设计一种基于社区信息服务的安全计费集成系统

    youdao

  • Zhang Futai, male, born in 1965, professor, PhD supervisor. His research interests include information security, network security and cryptography.

    张福泰,1965年出生教授博士生导师研究领域包括信息安全网络安全、密码学

    youdao

  • Network security in sensor technology is that sensor getting information or image transmit in network to insure information's security and reliability in network.

    传感技术网络安全问题传感器获取信息图象通过计算机网络传输时产生的,保证网上获取信息安全、可靠。

    youdao

  • With the rapid development of the network technology, the security of network content becomes more and more important, even exceeds information security.

    随着网络技术飞速发展内容安全显得越来越重要甚至超过了信息安全。

    youdao

  • At the same time, the article expounds the features of computer information network being attacked and invaded, security factors and other security precautionary measures.

    主要阐述计算机信息网络攻击入侵特点安全因素以及其安全防范手段

    youdao

  • In recent years, the study on Internet worms has become one of the most active research topics in the field of network security and information security in the world.

    网络蠕虫研究已经成为近年国际上在网络安全和信息安全领域活跃研究方向之一

    youdao

  • In recent years, the study on Internet worms has become one of the most active research topics in the field of network security and information security in the world.

    网络蠕虫研究已经成为近年国际上在网络安全和信息安全领域活跃研究方向之一

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定