Such issues constitute a control challenge because tried and tested network-level security controls might not work in a given cloud environment.
这些问题构成了一个控制的挑战,因为基于尝试和测试的网络级安全控制在一个给定的云环境中可能无法正常工作。
We are pleased to be working with Cisco to extend our offering to include wireless plant network solutions with the security and reliability required in the process environment.
我们很高兴和思科一起,致力于扩大我们的供应范围,使其包括具有在过程环境需要的安全性和可靠性的无线工厂网络解决方案。
All in all, this constitutes a control challenge of insufficient network-based controls because tried-and-tested network-level security controls might not work in a given cloud environment.
总而言之,这形成了一个控制上的问题,即不充分的基于网络的控制,因为基于尝试与测试的网络级别安全控制可能在某些云计算环境下无法工作。
At the industrial level, to improve the level of industrial support, establish a good market environment, cultivate China's leading enterprises in network security.
在产业层面,提高产业化支撑水平,建立良好的市场环境,培育我国网络安全龙头企业。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
With the popularization and application of P2P network in enterprise environment, security becomes more and more important.
随着P 2 P网络越来越多地应用于企业环境,安全问题变得越来越重要。
Nowadays, in the computer network environment, all the confidentiality, security, integrality, usability and nonrepudiation of the information must be resolved by encrypting technology.
如今在计算机网络环境下信息的机密性、安全性、完整性、可用性等特性,都需要采用密码技术来解决。
The according strategy for the security of Internet information should be considered from environment security, network security, information security, etc.
相应的网络信息安全的策略就要从环境安全、网络安全、信息安全和健全管理机制等方面考虑。
Identification recognition, authentication and digital signature are strong methods of available security theories to secure safe transmission in network environment.
身份识别和认证以及数字签名技术是现有的安全理论中保证网络环境下信息安全传输的有力手段。
This paper briefly expounds the management and maintenance of E-reading room from aspects of the rules and regulations, indoor environment, software and hardware, and network security, etc.
从规章制度、室内环境、软硬件、网络安全等方面简要阐述了对电子阅览室的管理和维护。
Finally, free antivirus software for the majority of Internet users to set up the correct Internet safety concept, purified network security integral environment.
最后,免费杀毒软件为广大网民树立了正确的互联网安全理念,净化了网络安全整体环境。
Traditional ID authentication combines a user name and a password, which is not sufficient enough to assure the security of application systems in an environment full of hackers network attacks.
传统的身份认证只是一种用户名和口令的简单组合,在充满黑客和攻击的网络环境下,这种认证方式已经不能充分保证应用系统的安全。
In the campus network application process, people tend to focus on network environment safety, and ignore the information system security precautions level.
在校园网应用过程中,人们往往侧重于网络环境安全,而忽视了信息系统层面的安全防范。
Such research in this paper is helpful for human to master the trust mechanism, construct a trustable interaction environment, and guarantee the network security in a virtual social.
该研究有助于人类更好的认识和掌握虚拟社会中的信任机制,构建一个高可信的网络交易环境,确保虚拟社会的网络安全。
The anonymity and dynamics of the P2P (peer to peer) network bring many security problem, The traditional trust manage model can not satisfy the P2P environment commendably.
P2P网络的匿名性和动态性带来了许多安全问题,传统的信任管理模型并不能很好的适应对等网络环境。
The complex network environment which leads attackers making use of the flaws of protocol to demolish the world, at the same time brings difficulties in confirmation of security of protocols.
复杂的网络环境使攻击者可以利用通信协议自身的缺陷来实施各种各样的攻击,也给确保协议的安全性带来较大难度。
In modern network environment, the number of network devices is increasing continuously, and the network is becoming much more complicated, the security problem of network is becoming seriously.
在现代网络环境中,随着网络设备的数量不断增长,网络的复杂性持续提高,网络的安全问题也日益突出。
Detection of network security. In the VC environment to run successfully. Please be assured that the use of!
实现网络的安全检测。在VC环境下运行成功。请放心使用!
Detection of network security. In the VC environment to run successfully. Please be assured that the use of!
实现网络的安全检测。在VC环境下运行成功。请放心使用!
应用推荐