go top

security techniques

  • 安全防范技术

网络释义专业释义

  保密技术

保密技术.生物统计学安全性评估 英文名称:Information technology - Security techniques - Security evaluation of biometrics ICS分类:35.240.15 中标分类:L80 发布日期:2012 实施日期: 替代...

基于22个网页-相关网页

  安全性技术

安全性技术.非拒绝.第1部分:总则 英文名称: Information technology - Security techniques - Non-repudiation - Part 1: General 标准组织: 【ISO】国际标准化组织标准 正文语种: 国标分类: 【L0..

基于20个网页-相关网页

  安全要求

安全要求.IT安全的评价标准.第2部分:安全功能性要求 英文名称 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirement..

基于8个网页-相关网页

短语

Information security techniques 信息安全技术

IT security techniques IT安全技术

safety security techniques 安全保障技术

network security techniques 网络安全技术

Security Techniques Advisory Group 安全技术咨询组

web security techniques web安全技术

basic security techniques 基本安全技术

security techniques evaluation 安全性评估

communication security techniques 通信安全技术

 更多收起网络短语
  • 安全技术 - 引用次数:110

    There are many kinds of network security techniques, such as firewall、security audit,etc.

    网络安全技术众多,如防火墙、安全审计等等。

    参考来源 - 数字签名技术在网上报税系统中的应用

·2,447,543篇论文数据,部分数据来源于NoteExpress

双语例句权威例句

  • General distributed security techniques.

    一般分布式安全技术

    youdao

  • We employ different security techniques to protect the database.

    我们使用不同保护措施保护数据库

    youdao

  • This paper details the conception of network security, the threat network facing and network security techniques.

    给出网络安全概念,网络所面临威胁,提出了解决网络安全的相关技术

    youdao

更多双语例句
  • "The main challenge is making security techniques lightweight, but apart from that people shouldn't be overly worried about security issues, " said Randell.

    CNN: Future dress code: Very smart

  • Unfortunately, traditional endpoint security techniques are not designed to understand the logic behind these attacks the clandestine activity occurring within system processes, those subtle changes necessary to spot potentially bad behavior.

    FORBES: To Stop Cybercrime: Understand Crime Logic, And Adapt

  • This provides not only reassurance, but all important proof, that the network security is capable of identifying and mitigating the latest threats and security evasion techniques.

    FORBES: Written by Anthony Haywood

更多权威例句
$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定