This paper details the conception of network security, the threat network facing and network security techniques.
给出了网络安全的概念,网络所面临的威胁,提出了解决网络安全的相关技术。
The program's suite of security techniques will ensure that the network is limited to authorized users and is extremely difficult to spoof or to introduce false traffic.
该项目的一整套安全技术将确保网络仅限授权用户使用,很难遭遇网络欺诈或引入虚假流量。
With the proliferation of computer and network techniques, database security has become an important research area of information security.
随着计算机与网络技术的广泛应用,数据库安全技术已成为信息安全的重要研究领域。
Due to its essential role in network security, research on intrusion detection techniques is of great importance.
鉴于入侵检测技术对网络安全所起的重要作用,对入侵检测技术进行研究具有重要的意义。
In this article, the security and recovery techniques are introduced, which are implemented on a network data base-IDMS.
本文介绍了在网状型数据库idms上实现的安全技术和恢复数据库的过程。
In this paper we deal with some security techniques applied to network elective system and the construction of an elective database.
介绍了一种可行的网上选课系统的规划、流程以及所采取的安全技术。
New scanning techniques will continue to evolve and bombard your network, probing for holes and weak spots in your security.
总结新扫描技术将持续进化并不断攻击贵网络,探测安全上的漏洞和弱点。
The research and its application of the mechanism provide theoretical foundation and guideline for the study of the prevention techniques against the malicious code and the network security policy.
通过对恶意代码机理研究和实践,为恶意代码防范技术研究和网络安全策略研究提供理论基础和指导依据。
The article introduces the network security and encryption techniques applied by the authors in the first examination system for the registered architects in China.
本文介绍了作者在全国第一个注册建筑师网络考试系统中所应用的网络安全与加密技术。
The techniques need unite network security mechanism and resource recovery mechanism in order to insuring system usability.
网络容灾技术需要结合传统的网络安全机制和资源恢复机制,从多方面确保系统的可用性。
Four key techniques of telemedicine system about are researched respectively, which are network protocols, multimedia database system, data compress and network security.
本文对远程医疗的四个关键技术——网络协议、多媒体数据库技术、数据压缩技术、网络安全分别进行了研究。
It provides an overview of features and techniques available to service providers to help improve security by "hardening" the core network.
它概述了服务提供商可以用来“加强”核心网络,以帮助提高安全的现有功能和技术。
According to the key techniques above, the paper designs system of network security evaluation based on information detection in chapter 3, and supplies method for the system realization.
基于前面的关键技术,第四章详细设计了基于信息探测的网络安全评估系统的方案并给出了具体实现的方法。
This article analyses main menaces to library network security, and describes the principles and application of the principal prevention techniques.
分析了目前图书馆网络所面临的主要威胁,论述了几种主要防范技术的原理和应用方法。
Currently, researches on security of e-government network mainly focus on the defense work with the security equipments and techniques aiming at security defense, which is not effective enough.
对于政务网络信息安全的研究,目前的重点主要放在“设防”上面,许多安全产品、安全技术多以安全防御为主,但仅仅从这个角度去处理政务网的安全问题还有一定的局限性。
Analyzes the principles of network security scan, categories the techniques used in a scan process, presents the concept and protocols each technique derives from.
分析了网络安全扫描的原理,对扫描中使用的主要技术进行了分类,并阐述了每种技术的原理及协议特性。
Therefore, identity authentication for visitors is more and more important and become one of the most significant techniques in network security field.
因此,对网络资源访问者的合法身份进行认证就变得非常的重要,身份认证技术已经成为网络系统安全中最重要的技术之一。
Our work is a part of a key research project of Fujian province-Information Network Security Protection Techniques (No. 2001H103).
本课题是福建省重点科研项目《信息网络安全防护技术》(项目编号2001H103)的一部分。
Our work is a part of a key research project of Fujian province-Information Network Security Protection Techniques (No. 2001H103).
本课题是福建省重点科研项目《信息网络安全防护技术》(项目编号2001H103)的一部分。
应用推荐