The research of this thesis will be a good help for further study in the field of multilevel security network.
本文的工作为以后多级安全网络的进一步深入研究打下了良好的基础。
Resource is a new kind of concept, which can be used in the nowadays model of security network OA construction.
资源化是一种全新的概念,可用于现代安全网络OA的模型。
The results show that, the multilevel security network this paper trussed satisfy what the multilevel security need.
结果表明,本文提出的多级安全网络满足多级安全网络的功能需求。
This makes ge's Win of the largest single order of an analog video system in the Beijing Security network even more noteworthy.
这次是GE进入本领域以来,在北京安防系统中取得的最大的模拟摄像系统的单笔定单。
Net technology is used to design the software of main supervision function module of vehicles security network supervision system.
NET开发平台进行系统软件的设计,对主要的监管功能模块进行了开发和设计。
Long ago, a report says Google help the U. S. national security agency security network security, even to the intelligence agencies sell equipment.
很久前就有报道称,谷歌帮助美国国家安全局保障网络安全,甚至还向情报机构出售设备。
Work on setting up a "three-dimensional" security network is to be stepped up under a national policy package aimed at eradicating potential deadly attacks.
国家一项政策指出,将加强建立“立体化社会安全防控网”的工作,旨在消除潜在致命袭击。
This paper discusses the system of security network document. It emphatically introduces the methods of studying and analysing the function and the structure.
本文介绍了安全网络公文系统,着重对其功能和系统的体系结构进行了分析和描述。
The collapse of finance system will bring uncountable loss for the society, so many countrys have built or are building all kinds of finance security network.
由于金融系统的崩溃将会给社会带来无法估量的损失,因此许多国家都已经或正在建立各种形式的金融安全网。
We will improve financial institutions' ability to manage risks, make progress in developing a security network for the financial system, and guard against systemic risks.
提高金融机构风险管理水平,推进金融体系安全网建设,防范系统性金融风险。
Furthermore, this system provides some functions of security network management, such as the statistics of data stream, the surveillance of present active connections, etc.
此外还提供部分安全网管功能,如数据流量统计和当前活动连接查看等。
It's hard to stay ahead of the game in network security when the landscape is constantly changing.
当形势不断变化时,在网络安全领域保持领先地位是困难的。
While this protection strategy allows higher network throughput, it does so at the cost of some network security.
这种保护策略允许更高的网络吞吐量,代价是牺牲部分网络安全性。
SSO can also improve the productivity of network users, reduce the cost of network operations, and improve network security.
SSO还可以提高网络用户的生产力,减少网络操作的成本,增强网络安全性。
As you'll see later, this can seriously damage network security allowing attackers to capture passwords and sensitive data.
正如您稍后将会看到的,这可能严重地损害网络安全性,使攻击者捕获密码和敏感数据。
Spoofing can be interpreted as the network security term used for forging.
电子欺骗可以解释成用于伪造的网络安全术语。
Most of the solutions exercising multifactor as well as multi-layer authentication make use of the same underlying network security mechanism.
大多数实现多因素身份验证和多层身份验证的解决方案使用相同的底层网络安全机制。
This article discusses the risks associated with systems using the same network security mechanism for multifactor or multi-layer authentication.
本文讨论使用相同的网络安全机制实现多因素或多层身份验证的风险。
Duties for network and security controls of virtual machines may not be well separated.
对虚拟机的网络和安全控制职责可能没有很好地分隔。
That feature was introduced in .NET from the beginning to prevent security attacks coming from network locations.
当初之所以在.NET中引入这个特性,是为了阻止从网络上进行的安全攻击。
Which means they are supposed to be largely immune to viruses and other network security threats.
因此人们认为它们不会受病毒和其他网络安全威胁的影响。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
The contract includes network operations and security, computer network defense, security life cycle management, and identity management, the Defense Department said.
国防部称,合同内容包括网络运行与安全、计算机网络防御、安全的全寿命管理以及识别管理等。
After Posting my profile on several sites, without much success, along came Philippe Padieu, a 46-year-old network security analyst.
我把自己的资料放在几个网站上,但收获甚微,后来一名46岁的网络安全分析师菲利浦·帕迪厄开始关注我。
After Posting my profile on several sites, without much success, along came Philippe Padieu, a 46-year-old network security analyst.
我把自己的资料放在几个网站上,但收获甚微,后来一名46岁的网络安全分析师菲利浦·帕迪厄开始关注我。
应用推荐