...IT网络安全.第5部分:使用虚拟私人网络使网络间的通信安全化 英文名称: Information technology - Security techniques - IT network security - Part 5: Securing communications across networks using virtual private network..
基于20个网页-相关网页
Network security and IT risk 网络安全和IT风险
The old security model was for it to build a big mote around the corporate network and only let trusted, authorized employees come across the well-guarded drawbridge and into the proverbial castle.
IT旧的安全模型是在企业网络周围建立一刻巨大的微尘,只让受信任的、已授权的员工穿越守卫严密的吊桥墙进入众所周知的城堡。
While this protection strategy allows higher network throughput, it does so at the cost of some network security.
这种保护策略允许更高的网络吞吐量,代价是牺牲部分网络安全性。
How do you determine the level of security in your office network, even if you have a network administrator manning it?
我们又应该如何来判断办公网络的安全级别呢(尽管您可能有一个网络管理员在管理网络)?
Mr.Obama said the United States and NATO agree that it is critically important to dismantle the al-Qaida network and work effectively with the Afghan government to ensure security in the country.
VOA: standard.2009.09.29
Does it need refinement in some way?" "And if it does need some adjustment in light of the events that have taken place over the last number of months, including the election and so on, and then what are the implications of that in terms of General McChrystal's resource request?" The secretary said the United States will not abandon its core mission in Afghanistan, which President Obama described as the destruction of the al-Qaida terrorist network, because it is "critical" to U.S.national security.
VOA: standard.2009.10.23
应用推荐