最好的加密应用是专为电子数据的保护。
Best Crypto application is designed for electronic data protection.
准则2,全局数据的保护可以通过两种方式得到保证。
Guideline 2, protection of global data, can be ensured in two ways.
数据的保护由综合安全概念手段进行清楚调节。
Protection of the data is clearly regulated by means of a comprehensive security concept.
探讨了如何用VXD技术来加强对CMOS数据的保护。
How to protect the CMOS data with VXD technology is discussed in this paper.
它还质疑智能手机制造商对经过他们设备的敏感数据的保护责任。
It also questions the responsibility of smartphone makers to protect the sensitive data that flows through their devices.
图像数据的保护日益受到社会的普遍重视,使图像信息加密技术也变得至关重要。
Image data protection has been noticed in the society, that causes the image encryption technology also becomes very important.
移动代理安全性体现在移动代理机密数据的保护、移动代理和移动代理执行平台的验证等。
The security of mobile agent systems lies in the protection of confidential data, the verification of mobile agents and mobile agent platforms.
其中有一种观点认为,美国和欧盟在对隐私和个人数据的保护标准上不对等,这种看法虽未经证实却一直存在。
Among them is the persistent — and unsupported — notion that privacy and data protection standards in the United States and the European Union are incompatible.
其中有一种观点认为,美国和欧盟在对隐私和个人数据的保护标准上不对等,这种看法虽未经证实却一直存在。
Among them is the persistent - and unsupported - notion that privacy and data protection standards in the United States and the European Union are incompatible.
为了加强数据的保护,防止非法的存取,用于评价计算机系统、存储空间和运行过程完整程度的一种指标。
A term applied to a computer system, spaces, or operating procedures when considering the protection of data from corruption or unauthorized access.
为了提高对隐私数据的保护程度和挖掘结果的准确性,提出一种有效的隐私保护分布式关联规则挖掘算法。
In order to raise the level of protection of data privacy and accuracy of the outcome of the excavation, an effective protection of the privacy of distributed algorithms Mining Association Rules Act.
通过IBMi 6.1的高级加密选项(advanced encryption options),满足了对重要商业信息的静态数据和备份数据的保护的监管需求。
Meet regulatory requirements by protecting data at rest and backups of critical business information through advanced encryption options available for IBM I 6.1.
宪法到底在多大程度上保护了你的数字数据?
Just how much does the Constitution protect your digital data?
涉及保护数据和人员的网络安全正面临多重威胁,尤其是网络犯罪和网络行业间谍,这两种威胁都在迅速增长。
Cyber-security, which involves protecting both data and people, is facing multiple threats, notably cybercrime and online industrial espionage, both of which are growing rapidly.
许多倡导者认为,带有日期和时间戳的透明数据程序将保护科学家的成果不被他人抢先发表。
Many advocates think that transparent data procedures with a date and time stamp will protect scientists from being scooped.
保护客户数据的能力是市场价值的关键,董事会代表股东对市场价值负责。
The ability to guard customer data is the key to market value, which the board is responsible for on behalf of shareholders.
银行仍然会从你的账户中挖掘数据,以便向你出售金融产品,包括一些没有价值的东西,比如信用保险和信用卡保护计划。
Banks will still be mining data from your account in order to sell you financial products, including things of little value, such as credit insurance and credit-card protection plans.
它们拥有我们的数据,它们的业务依赖全球公众的集体信念,即它们会尽一切努力保护这些数据。
They have our data, and their businesses depend on the global public's collective belief that they will do everything they can to protect that data.
斯坦福大学商学院的海姆·门德尔松表示:“数据正成为一种像其他任何资产一样需要加以保护的资产。”
"Data is becoming an asset that needs to be guarded as much as any other asset," says Haim Mendelson of Stanford University's business school.
“当前对于数据保护的权利最终需要适应数字世界。”她如是说。
"The current right to data protection needs to finally be adapted for the digital world," she said.
该计划可能会引起有关公民自由及数据保护的担忧。
It is likely to raise concerns about civil liberties and data protection.
简单的保护包含数据的网络已经远远不够了。
Simply protecting the network that contains data is no longer adequate.
简单地,可恢复的动作是修改被保护数据的任何事情。
For our simple purposes, a recoverable action is anything that modifies protected data.
你在意设备的数据保护么?
用于保护数据的加密算法
我们现在讨论的是数据保护,而不只是功能保护。
We are now dealing with protection of data, not just of functionality.
安全标签是应用到行和列上以保护数据的数据库对象,将安全标签授给用户时他们才可以访问受保护的数据。
Security labels are database objects applied to rows and columns in order to protect data, and granted to users to give them access to protected data.
为了确保敏感数据得到保护,公认的最佳实践就是加密所有敏感数据。
To ensure that sensitive data is protected, one best practice is to encrypt all sensitive data.
数据保护的质量必须表示为相应范围内的策略。
Qualities of data protection have to be represented as policies within ranges.
数据保护的质量必须表示为相应范围内的策略。
Qualities of data protection have to be represented as policies within ranges.
应用推荐