您要查找的是不是:
- This article has analyzed and the P2P technology related information security question,including main security threat whichbrings by its own technical flaw. 该文分析了和P2P技术相关的信息安全问题,包括由其自身的技术缺陷所带来的主要安全威胁。
- Information security threats 信息安全威胁
- He thinks that it is necessary to publish information about security threats to motivate system operators to protect themselves. 他认为公布安全威胁的信息是必要的,可以激励系统操作员增加保护意识。
- When you use this feature, there are potential security threats. 使用此功能时,存在潜在的安全威胁。
- Want to know more about information security? 希望对资讯保安有更多的认识?
- Independent review of information security. 信息安全的独立的回顾。
- First, give a detailed introduction of RFID system and introduce the attacks and threats against information security and privacy in RFID system. 首先,介绍RFID系统的组成、工作原理并阐述了在RFID系统中针对电子标签信息安全性和隐私性的威胁。
- Both DML and DDL triggers are open to this kind of security threat. 对于此类安全隐患,DML和DDL触发器都处于打开状态。
- For details, see Web Application Security Threats Overview (Visual Studio). 有关详细信息,请参见Web应用程序安全威胁概述(Visual Studio)。
- User authentication is the cornerstone of information security. 用户身份认证是信息安全的基石。
- It has formed a club of central Asian powers to deal with security threats. 它组建了中亚强国俱乐部来应付安全威胁。
- Where can I obtain more information about Information Security? 我可从哪里取得有关资料保安的资料?
- Denial of Service attacks are both a security threat and a stability threat. 拒绝服务攻击既对安全性造成威胁,也对稳定性造成威胁。
- CAJ-digital watermark in information security applications. 数字水印在信息安全中的应用.
- ICPO... information security section, anti-cybercrime group... 他并未回头,冷澈的嗓音在夜色中飘来,“...
- "In the provinces under high security threat level maybe the turnout was low. 纳贾非说:“在安全威胁大的省份,参选率可能是低的。
- CAJ digital watermark in information security applications. CAJ数字水印在信息安全中的应用.
- Security threats have been detected. You are advised to neutralize them immediately. 已经检测到安全威胁。建议您立即处理它们。
- The other are the more modern security threats that flow largely from or are exacerbated by globalization. 另一种威胁属于更为现代的安全威胁,主要来自于世界一体化或者说被世界一体化所加重。
- Information Security Management Systems (ISMS) help to protect IT systems - and your company's critical information - against the threat of loss, theft, or damage. 信息安全管理体系(ISMS)可以保护IT系统,避免贵公司的重要信息丢失、被盗用或破坏。