您要查找的是不是:
- Network Trusted Computer Base 网络依赖的计算机数据库
- The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain. 授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
- Trusted computing base of computer information system 计算机信息系统可信计算基
- Trusted Computer Base 置信计算机基地
- Trusted Computing Based User Authentication for Mobile Equipment 基于可信计算的移动终端用户认证方案
- Trusted Computer System Evaluation Criteria(TCSEC), DOD5200.28-STD Dec 1985. 行政机关资讯系统安全稽核制度之研究;1996;行政院研考会编印.
- How Trustworthy Is Trusted Computing? 可信计算有多可信赖?
- Abstract: To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm. 文章摘要: 为了解决日益严重的局域网的安全问题,提出一种安全的基于网络的计算机系统模型。
- trusted computing base 可信计算基
- Private computers are also known as trusted computers. 私人计算机也称为受信任的计算机。
- Adaptive Server Anywhere 7.0 Was awarded a TCSEC (Trusted Computer System Evaluation Criteria) C2 security rating from the U.S. Government. Adaptive Server Anywhere 7.;0荣获美国政府授予的TCSEC(可信计算机系统评估标准)C2安全等级。
- Why do you need a PTW Computer Based Training Program? 为什么您需要工作许可证电脑培训课程?
- Nikos Drakos, Computer BASEd Learning Unit, UniversITy of Leeds. 作者:佚名技巧来源:不详点击数:更新时间:2005-11-26
- NATIONAL COMPUTER SECURITY CENTER. United States. Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria[Z]. NCSC-TG-021, April 1991. 蒋继洪.;计算机系统、数据库系统和通信网络的安全与保密[M]
- It analyzed characteristic of the computer base map commonly used in the present and introduced the prospect of blueprinting paper in our country. 该文对我国晒图纸的前景和当前普遍采用电脑底图的特点,进行了分析,并对提高分辨力的实验作了详细叙述。
- Cybersecurity and Domestic Surveillance or Why Trusted Computing Shouldn't Be? 数字安全与国内监督,或为何原本可信的计算机面目全非?
- Lev has also worked in the areas of application security and trusted computing. Lev也从事于应用程序安全和可信的计算方面的研究。
- By means of authorware on windows platform,how to develop the CAI teaching software for computer base of university with vividness,beautification and effectiveness. 本文讲述了在Windows平台上;如何利用多媒体著作工具Authorware开发出图文并茂、形象生动、美观实用的《大学计算机基础》cai教学软件.
- This decline was met with arguments in favor of building security into the technical system, both at its core, in the network elements themselves, and at its periphery, through “trusted computing. 这种信任的减少伴随着另一种争论,即通过“可信任计算”在技术系统中建造安全系统,包括位于核心的网络原理本身,以及其周边系统。
- You can plug into the national computer network. 你可以接通全国计算机网络。