• The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.

    协议涵盖企业安全呼吁支持信息技术服务,对新出现网络威胁网络入侵提高认识

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务主要客户是美国情报和军事部门。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • Network services requiring security and availability should benefit from this powerful operating system technology.

    需要确保安全性可用性网络服务应该受益这种强大的操作系统技术

    youdao

  • However, network security is not only a technical problem but also a comprehensive systems engineering of security strategy, security technology and security management.

    然而网络系统安全问题不仅仅技术问题,而是安全策略、安全技术安全管理综合过程,是一项系统工程

    youdao

  • By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.

    随着计算机信息技术网络技术迅猛发展信息与网络的安全形势日趋严峻和复杂化。

    youdao

  • To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.

    进行信息网络安全技术标准研究开发相应的安全产品从事安全服务工作

    youdao

  • This article first analyzes the security of computer network, introduces basic technology that guarantee the security and emphasizes that cryptography is the core technology.

    本文第一章分析计算机网络安全性介绍保障计算机网络安全基本技术指出密码技术网络安全技术的核心

    youdao

  • The main research content of this paper is network information detection technology and network security evaluation method.

    本文主要研究内容网络信息探测技术建立在信息探测基础上的安全评估方法

    youdao

  • With the information age arrival and network technology broad application, people's requirement for security is higher and higher.

    随着信息时代到来网络技术的广泛应用人们安全性要求越来越高。

    youdao

  • At last, the popular technology about computer network virus detection and information and network security is summarized.

    最后计算机网络病毒检测当前网络安全主流技术进行了分析。

    youdao

  • The users of network have to adopt active defend technology and deep, various means to protect network security.

    网络使用者必须采用积极防御技术纵深的多样手段保证网络的安全

    youdao

  • This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.

    本文描述AT M网络中的信息安全可能受到的威胁、安全结构系统之间鉴别技术

    youdao

  • This paper first introduces the actuality of network security, intrusion detection technology and CORBA, then puts foward the structure of a distributed intrusion detection system based on CORBA.

    本文首先简要介绍网络安全现状入侵检测技术CORBA 技术,然后给出应用CORBA建立分布式入侵监测系统体系结构

    youdao

  • In auditing system about network security, the technology about information catching and reverting is a difficult problem. At the same time, it is also foundation problem.

    信息捕捉还原技术网络安全技术审计系统实施的一个难点同时也是实现审计系统的基础。

    youdao

  • The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.

    通过设置密码蓝牙技术安全机制提供信息家电网络远程控制系统的安全保障

    youdao

  • Some research point out, the majority of network security threatens from the system interior, so we are urgent need to use one kind of new measure and the technology safeguard the network security.

    研究指出大部分网络安全威胁来自系统内部,因此,我们迫切需要采用新的措施技术保障网络的安全。

    youdao

  • Identity authentication is an important aspect of network security technology and the basis of other security mechanisms.

    身份认证网络安全技术一个重要方面,是其他安全机制基础

    youdao

  • As a security technology, WLAN intrusion detection technology plays an important role in the security of the WLAN network and system.

    WLAN入侵检测技术作为一项安全技术,保证WLAN网络和系统安全性上起非常重要作用

    youdao

  • This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.

    课题现有网络通信技术数据库技术信息安全技术基础设计实现新型的安全即时通信系统。

    youdao

  • Meanwhile, the perfection of the standards management of security of network technology and equipment can also offer help for tracking down and punishing the crime of the network effectively.

    同时网络技术设备安全管理规范完善能够侦破处罚网络犯罪提供有效地帮助

    youdao

  • This paper give detail description of SI-MIS feature and relevant realization, key technology such as network data storage scheme and information security strategy are also included.

    本文详细描述具体功能结构的设计实现,包括网络数据存储方案信息安全实现关键技术

    youdao

  • Firstly, in the paper I introduce network security problem and the method the network security aim at, network threaten, traditional network technology and the network security module.

    本文首先讨论了网络安全问题及其对策,包括网络安全目的,网络现存的威胁传统的网络安全技术网络安全模型

    youdao

  • Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.

    基于安全系统全面信息安全策略网络安全技术网络安全管理两个层次上研究内部网安全性

    youdao

  • This article analyses the security problems of the Virtual Privat Network, introduces its main security technology and put forward the general principles and measures of the security design of VPN.

    本文分析了虚拟专用网存在安全问题介绍了虚拟专用网的主要安全技术提出设计安全虚拟专用网一般原则步骤

    youdao

  • In the face of endless hacking technology and network viruses and Internet security technology needs further study.

    面对层出不穷网络入侵技术网络病毒网络安全技术需要进一步研究

    youdao

  • The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.

    主要介绍网络安全准入控制系统组成相关技术技术铁路信息系统中如何应用加以探讨

    youdao

  • The key technology of the network and information security prototype system is studied, the network and information security test platform is introduced, and the testing methods are explained.

    主要研究了网络信息安全原型系统中的关键技术介绍了网络与信息安全测试平台的组成,阐述测试方法

    youdao

  • This paper describes the meaning of computer network security, the existence threat in computer network and enhance related technology initiatives of computer network security.

    本文主要介绍了计算机网络安全含义,计算机网络存在威胁以及加强计算机网络系统安全的相关技术措施

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定