• Decisions about data sources to be used, security, data structure, data quality, data standards, and an overall data model will typically need to be completed before actual implementation begins.

    使用数据源安全性数据结构、数据质量、数据标准整个数据模型的有关决策一般需要真正实现开始之前完成

    youdao

  • This model of development leads to security vulnerabilities that can multiply very quickly: With each new artifact or data source added to a mashup, security vulnerabilities increase.

    这种开发模型导致安全漏洞成倍增加:每当一个mashup添加新的工件数据源,安全漏洞都会增加。

    youdao

  • This paper advances an invasion detection model in the network security based on multi-sensor data fusion, and introduces in detail the structure of invasion detection system.

    提出网络安全基于多传感器数据融合技术入侵检测模型对入侵检测系统体系结构进行了详细介绍

    youdao

  • The model integrates one backup-restore and data mining module for the data of security audit.

    模型针对安全审计数据融合了一个备份恢复数据挖掘模块

    youdao

  • In Chapter 4, the design of the data exchange system of Collaborative Commerce Platform based on the security model is discussed.

    第4章主要介绍了基于安全模型协同商务平台数据交换系统设计

    youdao

  • Based on the active defense model of the network data transmission, a method of security measurement of the network data transmission is proposed.

    基于网络数据传输过程中的主动防御模型提出一种网络数据传输过程中的安全性进行测量、量化和评估的方法

    youdao

  • Combining data replication with security, we proposed a mathematic model which can determine data replication quantity.

    为此数据副本机制信息安全结合起来,提出一种决定数据资源副本数量数学模型

    youdao

  • Secondly, it puts forward a solution of network security audit based on data mining and builds a system model to solve the problems existing in current network security audit.

    其次根据目前网络安全审计存在问题提出基于数据挖掘网络安全审计系统实现方案建立了系统模型图。

    youdao

  • On the basis of discussing above, a security multicast system model based on GDOI Protocol is proposed. The design idea is described and the main data structures and source programs are provided.

    前面讨论基础上,在组成员方提出一个基于GDOI协议安全主机结构模型描述了各个模块的设计思想给出主要数据结构程序

    youdao

  • According to the data transfer requirements, which focus on security, high efficiency and timely information feedback, a 4-control-file-centered FTP data transfer model is presented.

    针对数据传输安全性、数据传输效率及时信息反馈等问题,提出了以四个控制文件中心FTP数据传输模型

    youdao

  • According to research data collected, summarized, comparison and analysis, it present implement model of information security risk assessment of hybrid library based on the ISO27000.

    通过调研所得数据进行收集归纳比较分析,本文提出了基于ISO 27000针对复合图书馆信息安全风险评估实施模型

    youdao

  • Unit 2: This unit includes chapter 3 and chapter 4. The security model has been designed by the studies on the security of the data and information system.

    第二部分,通过数据信息系统安全探讨得出列车运行图信息系统的安全模型包括第三、

    youdao

  • And then, the paper analyzes the MatchMaking model, includes the point technologies, for example buffer technology, data access technology, security technology.

    之后撮合模块进行了重点分析并介绍使用的关键技术,比如缓存方案,数据访问方案,安全性考虑以及故障恢复考虑等。

    youdao

  • And then, the paper analyzes the MatchMaking model, includes the point technologies, for example buffer technology, data access technology, security technology.

    之后撮合模块进行了重点分析并介绍使用的关键技术,比如缓存方案,数据访问方案,安全性考虑以及故障恢复考虑等。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定