• Chapter 3: authenticity of a listed company to disclose information system security.

    第三上市公司信息披露真实性制度保障。

    youdao

  • Twenty-sixth Information System Security Grading Protection filing and evaluation rectification.

    第二十六条信息系统安全等级保护定级备案测评整改

    youdao

  • Because database is a set of information, database system security plays a crucial role on the information system security.

    数据库作为信息载体,它的安全性整个信息系统的安全决定作用

    youdao

  • This paper first introduces nowadays information system security certification and accreditation(C&A)process of American and our country.

    该文首先简要介绍美国信息系统认证认可过程我国现阶段的信息系统测评认证的现状。

    youdao

  • The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.

    操作系统安全信息系统安全基石访问控制则是操作系统安全机制重要内容。

    youdao

  • Then, after SSE-CMM is explained, a risk-analysis-centric model of information system security engineering is established using system engineering theory.

    充分研究SSE CMM模型的基础上,采用系统工程思想建立了以风险分析为中心信息系统安全生命期模型。

    youdao

  • In the campus network application process, people tend to focus on network environment safety, and ignore the information system security precautions level.

    校园网应用过程中人们往往侧重网络环境安全忽视信息系统层面安全防范

    youdao

  • Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.

    通过分析发现,利用攻击模型信息系统安全进行度量,比较好的选择最后对本模型的特点进行了讨论

    youdao

  • Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.

    传统信息系统安全风险评估系统运行维护环境出发,分析漏洞威胁

    youdao

  • This paper propose a quantitative information security risk metric based on information system security analysis, gap analysis method and its assessment procedure.

    本文提出一种基于信息系统安全性分析来定量计算信息安全风险度量尺度差距分析方法相应评估流程

    youdao

  • Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.

    数据完整性信息系统安全目标之一该文描述了一个时间相关数据库管理系统完整性策略模型

    youdao

  • The first chapter emphasizes on the importance of information system security. It introduces modern security management theories and the BS7799 security management standard.

    第一重点阐述信息安全管理重要性介绍现代安全管理思想引入国外的BS 7799安全管理标准。

    youdao

  • It will greatly assure the national information system security to construct and normalize the national information on the basis of constructing the information system security frame.

    构建信息系统安全架构高度出发来全面构建和规范我国信息安全,有效保障我国的信息系统安全。

    youdao

  • The Information system Security management does not involve only the management system or only the relevant techniques, but includes the relevant strategies, management and techniques.

    信息安全管理单单是管理体制技术问题,而是策略、管理技术有机结合。

    youdao

  • In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.

    本文网络安全病毒防护主机系统安全三方面对信息系统的安全进行分析实现技术进行了探讨

    youdao

  • Information security risk assessment is not only the most component of the information system security engineering, but also the basis to construct the information safety guarantee system.

    信息安全风险评估信息系统安全工程重要组成部分,也是建立信息安全保障体系的基础

    youdao

  • To evaluate the military information system security effectiveness, which involves many factors, is a complex problem, in which the information about specification is incomplete and vague.

    军用信息系统效能评估一个十分复杂问题涉及因素,而且存在部分因素完全不确定的问题。

    youdao

  • After the completion of the third party information system test, business units should complete the information system security level protection filing and evaluation of rectification work.

    信息系统第三测试完成业务单位完成信息系统安全等级保护备案测评整改工作

    youdao

  • Through the research, this article has the guiding role to the Shaangu information system safety control, and has reference to the manufacturing enterprise information system security management.

    通过研究本文信息系统安全管理指导作用,对制造企业信息系统安全管理借鉴作用

    youdao

  • To evaluate the military information system security effectiveness, which is related to so many factors, is a complex question, in which the information about specification is incomplete and vague.

    军用信息系统效能评估一个十分复杂问题涉及因素,而且存在部分因素完全不确定的问题。

    youdao

  • While the identity authentication technology are network security and information system security the first barrier, it is time network information security technology a very important research field.

    身份认证技术网络安全和信息系统安全一道屏障网络时代信息安全技术非常重要一个研究领域。

    youdao

  • In contrast, a system may require identifying information in order to handle matters such as security or quality of service.

    相比而言,为了处理诸如安全服务质量之类事情系统需要标识信息了。

    youdao

  • But security experts warn that attackers could use their foothold on the system to start stealing users' and customers' credit card Numbers and personal information.

    但是安全专家警告攻击者可以利用他们系统中的立足点偷窃用户客户信用卡账号个人信息。

    youdao

  • The server's security system validates the user against its security registry and obtains other security information about the user.

    服务器安全系统针对安全注册中心用户进行验证获得关于用户的安全信息

    youdao

  • You can also perform an audit after receiving information that would lead you to believe someone is trying to compromise the security of your system.

    可以使相信有人试图威胁系统安全信息后,执行审计

    youdao

  • For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.

    有关如何使用registrySYSTE m属性控制用户登录更多信息阅读AIX安全指南”和参考资料部分所列出文章

    youdao

  • Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.

    同样如果系统侵入并受到破坏,那么数据库数据库访问信息存储正在运行Web服务器机器上会引发安全性问题

    youdao

  • The operating system confirms whether the bob/bobpsw combination is valid or not, and returns this information to the security plug-in.

    操作系统确认bob/bobpsw组合是否有效,把信息返回安全插件

    youdao

  • The operating system confirms whether the bob/bobpsw combination is valid or not, and returns this information to the security plug-in.

    操作系统确认bob/bobpsw组合是否有效,把信息返回安全插件

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定