然后提出一种基于深度防御原则的深度入侵防御系统模型。
我们相信用于认证用户的唯一可行的策略是以深度原则应用防御,混合多种认证技术。
We believe that the only viable strategy for authenticating users is to apply the defense in depth principle, mixing a number of authentication techniques.
将网络并入主流防御概念和原则。
Incorporate cyber into mainstream Defence concepts and doctrine.
应用推荐