数据的不同部分可以利用基于指定给该存储的数据部分的预定安全等级的不同加密技术加密。
Different portions of the data may be encrypted with different encryption techniques based upon a predetermined level of security assigned to the portions of the stored data.
电脑空间中的加密的通道可能是通过SSL、SSH和其他技术加密的——更不必说拟虚专用网络。
Encrypted tunnels through cyberspace are possible via SSL, SSH, and other technologies — not to mention virtual private networks.
从美国出口这项加密技术在目前是违法的。
It is currently illegal to export this encryption technology from the U.S.
So in general, both of these are examples of what we call secret key crypto.
所以通常,这两个都是,加密技术的例子。
In Week 2 we'll look at things like cryptography and functions and the tools that by which you begin to assemble solutions to problems; in Week 3 we'll introduce what are generally ; known as algorithms and data structures; mechanisms by which you can solve problems more efficiently, effectively.
第2周,我们学习加密技术及其功能,还会学到一些操作工具,通过这些工具的使用来收集解决问题的办法,第3周,我们将介绍;,算法和数据结构,以及可以更有效地解决问题的机制。
But the point is that how is Facebook, how is Amazon possibly going to communicate securely with you or your laptop using cryptology if you both have to know the same secrets.
关键是Facebook是怎么样,亚马逊是怎么样安全地和你或你的计算机,使用加密技术进行交流的,如果你们两个都,知道那个同样的密钥。
应用推荐