• Intrusion detection technology is the core technology security audit is one of the important network security components.

    入侵检测技术安全审计中的核心技术之一,是网络安全防护重要组成部分

    youdao

  • Consider the effectiveness of the company's internal control system, including information technology security and control.

    评价公司内部控制系统有效性包括信息技术安全和控制。

    youdao

  • So how to ensure the inner network security has been very important in the research of the information technology security field.

    如何确保内网安全成为当前信息安全的一个重要研究领域

    youdao

  • As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.

    随着信息技术安全问题日益突出网络系统进行安全分析日益重要

    youdao

  • To the question, the paper presents a system evaluation method and software based on the evaluation Criteria for Information Technology Security (Common Criteria).

    针对这个问题,设计实现了基于信息技术安全性评估准则(通用标准)的系统评估方法软件

    youdao

  • By using EJB technology security, the project team was also able to abandon their custom security framework, while still retaining method-level security in their application.

    通过利用EJB技术安全性方案小组得以应用中保留方法级安全性的同时抛弃了他们用户安全框架

    youdao

  • According to MIT Technology Review, whether companies are connecting dog food bowls or security systems to the Internet, there may be some problems.

    根据麻省理工科技评论》,无论公司还是安全系统连接互联网,都可能遇到一些问题。

    youdao

  • "Each magstripe has three tracks of information," explains payments security expert Jeremy Gumbley, the chief technology officer of CreditCall, an electronic-payments company.

    电子支付公司CreditCall首席技术、支付安全专家杰里米·冈布利解释说:“每个磁条都信息轨迹。”

    youdao

  • Nevertheless, he said he’s betting on the general approach as the promising future of security technology.

    尽管如此依然认为安全技术光明未来仍是常规解决途径

    youdao

  • These packs work together to simplify the business, technology, security, governance and process interoperability issues associated with business services in an SOA.

    这些包协同工作简化SOA中的业务服务相关联业务、技术安全治理流程互操作性问题

    youdao

  • "The Human Factor," treated in Chapter 17, is a critical aspect of truly secure systems that is often ignored in breathless discussions about new security technology.

    17讲述的“因素”,我们在讨论新的安全技术时,经常忽略掉安全系统关键方面

    youdao

  • First, that security depends on a combination of technology and policy; and second, that no system is ever totally secure.

    第一安全依赖技术政策联合体第二永远没有完全安全系统

    youdao

  • Zhou Hongyi, founder of Qihoo 360 Technology, China’s largest internet security software provider, is not afraid to battle with his competitors.

    奇虎360技术公司是中国最大互联网安全软件提供商,该公司创始人周鸿祎无惧对手的竞争。

    youdao

  • Your customer’s payments are sent directly to your commerical bank account using the latest security technology.

    客户付款可以使用最新安全技术直接发送商业银行账户

    youdao

  • This configuration has one known limitation: in the case of the JMS technology connector, security must not be turned on.

    这个配置一个众所周知局限:就JMS技术连接器而言允许打开安全性

    youdao

  • But American politicians know all too well that security concerns about imported technology are sometimes justified.

    美国政客们引进技术会带来安全问题实在是在了解了。

    youdao

  • Companies and policy makers must also tackle misaligned incentives around issues such as privacy and security, access to data, and technology deployment.

    企业政策制定者必须克服这些关于隐私安全数据访问技术部署问题的不对称诱因

    youdao

  • Secretary Clinton says this new technology has helped strengthen America's security.

    克林顿国务卿这项技术有助于加强美国安全

    youdao

  • The technology available today is mainly designed for security professionals, and does not always meet the needs and use cases of development.

    当今可利用技术主要安全专家所使用,通常没有满足开发需求

    youdao

  • However, EJB technology allows method-level security on any EJB component or method.

    EJB技术可以任何EJ b组件方法上实施方法安全策略。

    youdao

  • Otellini gave a very brief preview of a forthcoming hybrid software-silicon security technology to come from Intel and its McAfee subsidiary.

    欧德宁给了非常简短预览,关于一款即将推出的来自英特尔它的子公司迈克菲的混合软件安全技术

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务主要客户是美国情报和军事部门。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • SPEXER 2000 is the worldwide first security radar using the newest radar technology of Active Electronically Scanning Array (AESA).

    SPEXER 2000全球第一个采用最新主动电子扫描阵列技术(AESA)安全雷达

    youdao

  • That said, developers at every level of the technology stack must take personal responsibility for the security of the entire application.

    这也就是说,处于技术级开发人员必须整个应用程序安全性负起自己应付的责任

    youdao

  • The IAEA should increase input to promote technical cooperation and assistance in nuclear power, nuclear safety and security, and nuclear technology application.

    国际原子能机构应该加大投入推动核电安全核技术应用方面技术合作援助

    youdao

  • Intel plans a hybrid security technology that will combine software with chip-based defenses.

    英特尔公司正计划一项混合安全技术就是结合基于芯片防御软件中。

    youdao

  • Indeed, hackers are everywhere, according to Bruce Schneier, security expert and chief security technology officer for it service-provider BT.

    正如IT服务提供商BT公司的首席安全技术、网络安全专家布鲁斯·施奈德指出的那样,黑客的确无处不在

    youdao

  • First, it has hired new advisers and lobbyists to convince Congress that worries about the security of U.S. technology are baseless.

    首先新的顾问说客国会信服美国安全担忧没有根据。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定