• First, that security depends on a combination of technology and policy; and second, that no system is ever totally secure.

    第一安全依赖技术政策联合体第二永远没有完全安全系统

    youdao

  • Abroad one-commerce security technology, although its structure or encryption technology is good, but is limited by the foreign password policy, so the strength of the common enough.

    国外有关电子商务安全技术虽然结构加密技术等不错受到外国密码政策的限制,因此强度普遍不够。

    youdao

  • Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.

    基于安全系统全面信息安全策略网络安全技术网络安全管理两个层次上研究内部网安全性

    youdao

  • It introduces the hardware system configuration, the policy of data security and accessing security as well as the data encrypted technology.

    介绍安全系统硬件体系结构数据安全和访问安全保障策略以及数据加密技术。

    youdao

  • It introduces the hardware system configuration, the policy of data security and accessing security as well as the data encrypted technology.

    介绍安全系统硬件体系结构数据安全和访问安全保障策略以及数据加密技术。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定