In the information security, the status authentication technology holds the extremely important status, is the information security system first checkpoint.
在信息安全中,身份认证技术据有极其主要的位置,是信息安全体系的第一个关卡。
First, that security depends on a combination of technology and policy; and second, that no system is ever totally secure.
第一,安全依赖于技术和政策的联合体。第二,永远没有完全安全的系统。
In the first article in this series, I introduced Acegi and explained how to use security filters to implement a simple, URL-based security system.
在本系列第一篇文章中,我介绍了Acegi并解释了如何使用安全过滤器实现一个简单的基于URL的安全系统。
If you haven't implemented that set of rules first using AIXPert, the tool can't check the security of your system.
如果没有先使用AIXPert实现规则集,工具就无法检查系统的安全性。
First, it extracts the system defaults, then lists each account contained in /etc/security/user that has attributes which overrides the system defaults.
首先,它提取系统默认设置,然后列出 /etc/security/user 中包含的具有非系统默认属性设置的每个账户。
First, give a detailed introduction of RFID system and introduce the attacks and threats against information security and privacy in RFID system.
首先,介绍RFID系统的组成、工作原理并阐述了在RFID系统中针对电子标签信息安全性和隐私性的威胁。
Their "value at risk" models first lulled bankers into a false (and perilous) sense of security, but are now causing the financial system to seize up.
他们的“风险价值”模型一开始令银行家产生一种虚假(和危险)的安全感,但如今正引起金融体系失灵。
Identity authentication as an important means of prevention is the first security system barriers, strengthening teller control, a clear correlation responsibility is of great significance.
身份认证作为事前防范的重要手段,是安全体系的第一道屏障,对于加强柜员制约、明确相关责任具有重要意义。
This paper first discusses the challenges and attacks in the design of embedded system security, and then studies approaches to bridging the security processing gap and resisting security attacks.
本文讨论了嵌入式系统安全设计面临的挑战以及受到的攻击方式,探讨了如何弥合安全处理的资源缺陷和抵抗攻击的方法。
With the perfect quality assurance system and production of security system, to first-class products and services to win the customer's favor.
凭借完善的质量保证体系和生产保障体系,以一流的产品,一流的服务赢得了客户的青睐。
The paper first introduces the On-line Registering System for NMT of Guangdong Province in detail, analyzes the existing system in the area of security deficiencies.
本课题首先详细介绍了广东省普通高考网上报名系统的结构与功能,分析了现有系统在安全方面的不足。
This paper pointed the threat faced by Three-Layer MPLS VPN first, then analysis the security of control layer, data layer and management layer, at last gave some advices to keep the system security.
本文首先指出三层MPLSVPN可能受到的安全威胁,然后分析了三层MPLS VPN在数据面、控制面和管理面上的安全性,最后提出保持系统安全的一些建议。
This paper first introduces the actuality of network security, intrusion detection technology and CORBA, then puts foward the structure of a distributed intrusion detection system based on CORBA.
本文首先简要介绍网络安全现状、入侵检测技术和CORBA 技术,然后给出应用CORBA建立的分布式入侵监测系统体系结构。
First is the security of mobile agent system, especially the malicious host problem; Second is the fair exchange problem in electronic commerce.
首先是移动代理系统的安全问题,特别是恶意主机问题;其次是电子商务中的公平交易问题。
First, the paper talked about the standard of security computer networking, mainly analyzing the structural standard for OSI security system.
本文首先讨论了计算机网络安全标准,重点分析了OSI安全体系结构标准。
First builds up a reliability model of the biometrics technology, and then discusses security holes in the biometrics system, at last gives a new solution to the specific attack.
首先给出了生物识别认证技术的可靠性模型,然后讨论了生物识别系统的安全漏洞。
First of all, it is necessary to analyze and evaluate the security risk of the system vulnerabilities, the potential attackers and the purpose of the attack, and the possible consequences.
首先,要对系统漏洞、潜在的攻击者及攻击目的、可能导致的后果等进行安全风险分析评估。
First of all, wireless communication system security threats and the need for the introduction of safety measures as well as the main method have been outlined.
全文首先对无线通信系统的安全性威胁和引入安全措施的必要性以及主要方法进行了概要介绍。
The first chapter emphasizes on the importance of information system security. It introduces modern security management theories and the BS7799 security management standard.
第一章重点阐述信息安全管理的重要性,介绍现代安全管理思想,引入国外的BS 7799安全管理标准。
Property rights system and the mechanism of competition to integrate to ensure that public interests and social security first.
要把产权制度和竞争机制结合起来,把保证公共利益和社会安全放在第一位。
This paper analyses the theory of modern information hiding system first, especially the trade-off relationship between the robustness and security of the system.
本论文首先分析了现代信息隐藏系统的原理,并重点分析了图像信息隐藏系统健壮性与安全性之间的权衡关系。
Currently, there are five types of security mechanisms in the Asia Pacific: First, the US-led alliance system and relevant bilateral and multilateral arrangements;
目前亚太主要有五类安全机制:一是美国主导的同盟体系及其双多边安排。
The paper first explained the bank computer security management information system related background, the analysis related computer security should contain different side.
论文首先说明了银行计算机安全管理信息系统的相关背景,分析有关计算机安全所应包含的不同侧面。
The article introduces the network security and encryption techniques applied by the authors in the first examination system for the registered architects in China.
本文介绍了作者在全国第一个注册建筑师网络考试系统中所应用的网络安全与加密技术。
Public crisis prevention is the first and the core stage in public crisis management and the social security system plays a special role in preventing and resolving public crisis.
公共危机预防是公共危机管理的第一和核心环节,社会保障制度对公共危机的预防和化解具有特殊作用。
At first, through analyse the influence on the soil, crops, groundwater and function of water body of sewage, the index system of sewage irrigation security appraisal have been set up.
首先,通过污水对土壤、农作物、地下水以及水体功能的影响分析,建立了污水灌溉安全性评价的指标体系。
First of all, it puts forward the theoretical support of the system of security measures in our country.
首先提出我国保安处分体系构建的理论支撑。
This paper analyses the current problems of the security policy system of VPN at first, discuss the security policy system's trend of development.
本文首先分析了VPN安全策略系统所面临的问题,论述了安全策略系统的发展趋势。
Chapter2: First introduce the characteristic of our country's rural worker, second analyze the flaws of social security system of rural work, then analyze the barrier factors of this situation.
第二章:在介绍我国目前进城务工人员特征的基础上,分析了进城务工人员社会保障制度的缺失,然后分析了导致这种缺失现状的障碍因素。
Chapter2: First introduce the characteristic of our country's rural worker, second analyze the flaws of social security system of rural work, then analyze the barrier factors of this situation.
第二章:在介绍我国目前进城务工人员特征的基础上,分析了进城务工人员社会保障制度的缺失,然后分析了导致这种缺失现状的障碍因素。
应用推荐