• The detail of security threaten in computer network is given in this article, and analyzes the network security policy.

    介绍计算机网络当前面临安全威胁,对网络安全策略了分析

    youdao

  • The United States Congress held a hearing on the Russian intervention in U. S. elections, which may be the direction of future network security policy.

    美国国会俄罗斯干涉美国选举举行听证会可能未来网络安全政策导向

    youdao

  • Abstract: this paper discussed four network security problems-network insecurity problems network security classification network security policy and network security measure.

    文摘:从网络所面临的威胁、网络安全等级、网络安全策略网络安全措施等四个方面,分析与探讨网络安全问题

    youdao

  • Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.

    访问控制策略网络安全策略重要组成部分基于角色访问控制策略以其方便有效特点日益受到人们的关注

    youdao

  • The research and its application of the mechanism provide theoretical foundation and guideline for the study of the prevention techniques against the malicious code and the network security policy.

    通过恶意代码机理研究实践恶意代码防范技术研究网络安全策略研究提供理论基础指导依据

    youdao

  • Implementing a password policy can be time consuming when presenting the information in a clearer format for reporting to security managers, especially when dealing with a large enterprise network.

    如果需要清楚的格式安全经理报告信息实现密码策略非常费时间尤其是处理大型企业网络时。

    youdao

  • Network security auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions.

    网络安全审计深入覆盖商业开源工具使用协助审计和验证安全策略的假设。

    youdao

  • Outside the host network (Intranet or extranet) are considered not to be trusted, so the application can run on the host and external services to set targeted strong security policy.

    主机以外网络(内部网外部网)认为是不可信任的,因此可以针对该主机运行具体应用对外提供的服务设定针对性很强的安全策略。

    youdao

  • Network policy support includes LAN-based Class of Service and Quality of Service, advanced security and automated network management.

    网络政策支持包括基于LAN服务种类服务质量先进安全性自动的网络管理

    youdao

  • In this paper discusses mainly the possibility and means which make up harms to the network resources, and network security as well as policy, then introduces network security Architecture.

    本文主要讨论了网络资源构成危害可能性及其手段网络安全性问题,说明了网络安全体系结构及其技术

    youdao

  • Work on setting up a "three-dimensional" security network is to be stepped up under a national policy package aimed at eradicating potential deadly attacks.

    国家政策指出,加强建立立体化社会安全防控”的工作旨在消除潜在致命袭击。

    youdao

  • Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.

    基于安全系统全面信息安全策略网络安全技术网络安全管理两个层次上研究内部网安全性

    youdao

  • Therefore it is necessary to understand the network threats toe-commerce, and adopt the corresponding security policy to guarantee e-commerce run normally continuously, stably and correctly.

    因此必须了解电子商务所受到网络威胁采取相应安全策略保证电子商务系统的正常连续稳定正确地运行

    youdao

  • Network security log management center is made up of transform module, statistics analysis module, and policy reconfiguration module.

    网络安全日志管理中心转换模块统计分析模块策略再配置模块组成。

    youdao

  • The real capacity and existing problems of General Packet Radio Service (GPRS) network are analyzed and its construction principle, planning scheme and security policy are discussed.

    文章分析了当前GPRS实际容量存在主要问题探讨了GPRS核心网建设规划方案安全策略

    youdao

  • The modern enterprise network security protection common security issues and their implications, explore ways to solve these problems of network security, provides network-based security policy.

    现代企业网络安全防护常见安全问题及其影响探讨解决这些网络安全问题方法提供了基于网络内部的安全策略

    youdao

  • Intrusion Detection system (IDS) is an activity based network security system. As the logical supplement of usual passive policy, it is the important part of whole security system.

    入侵检测系统(IDS)一种基于主动策略网络安全系统,是对常用被动策略逻辑补偿网络安全系统中的重要组成部分

    youdao

  • The security of Gold Insurance System is discussed in detail and the security policy of network platform is studied with emphasis according to the security requirements.

    论文根据金保系统安全需求,对安全性进行深入的探讨,并重点研究了网络平台安全策略

    youdao

  • To be meaningful, a custom permission must be added to the security policy on the computer (or computers, in the case of a network) where the application using the permission runs.

    若要让自订使用权限具有意义必须使用这个使用权限应用程序执行时所在电脑(如果网路,可能有多部电脑),将它加入安全性原则

    youdao

  • If the assembly or document location is on a network share, the local (User level) security policy update is not enough to allow the solution to run.

    如果组件文件位置网路共用上,则本机(使用者层级)安全性原则更新不足以允许执行方案

    youdao

  • Network access management should ensure that terminals pass the security examination. Once terminals 'healthy condition does not meet the security policy, it should be restricted and repaired.

    安全接入管理应该能够确保用户在接入时满足终端安全策略要求即通过健康体检并且一旦出现健康状况满足安全策略时即限制访问要求修复。

    youdao

  • However, the campus network has some problems, such as no reasonable management mode and flexible accounting policy. The security and stabilization are weak.

    同时校园网也存在不少问题诸如缺乏合理管理模式缺乏灵活计费策略,以及网络的安全稳定得不到保障。

    youdao

  • SNMP network monitoring analysis of business conditions, the implementation of security policy, real-time monitoring network devices, servers, etc., to ensure network operations performance.

    SNMP监控分析企业网络情况实施安全策略实时监控网络设备服务器保证网络的运行状态和性能

    youdao

  • SNMP network monitoring analysis of business conditions, the implementation of security policy, real-time monitoring network devices, servers, etc., to ensure network operations performance.

    SNMP监控分析企业网络情况实施安全策略实时监控网络设备服务器保证网络的运行状态和性能

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定