您要查找的是不是:
- communication security policy 通信保密政策
- Do not change the security policy in your computer. 不要更改计算机中的安全策略。。
- Choose a pre-defined Security Policy. 选择一个预先定义的安全政策。
- A new security policy is defined from the point of implement, then KQML, an agent communication primitive, is defined. 引入KQML语言,定义了模型的通信原语;借助安全策略制导的方法,为入侵检测技术中的数据的采集点等问题的解决提供了新的途径;
- A firewall will ensure that all communications conform to your security policy. 防火墙将确保所有的通信符合安全政策。
- Describes how to undo the last change to security policy. 描述如何撤消上次对安全策略的更改。
- Snapshot of system security policy and user rights are saved. 系统安全策略和用户权利的快照已被保存。
- The security policy that will be applied to the application. 将应用于应用程序的安全策略。
- A change was made in the code access security policy file. 代码访问安全性策略文件已更改。
- Update security policy to be aware of the custom permission. 更新安全策略以便识别自定义权限。
- Code groups are the building blocks of code access security policy. 代码组是代码访问安全策略的构造块。
- The machine policy level holds most of the default security policy. 计算机策略级别存放大部分默认安全策略。
- Indeed, data integrity is one of the most important aspects of communication security. 数据完整性确实是通信安全性的最重要方面之一。
- In the Security Policy Setting dialog box, click Add. 在安全策略设置对话框中,点击添加。
- Information security of the C3I system includes communication security, information authentication, intrusion detection and virus defence. 指挥控制系统的信息安全包括保密通信、信息认证、入侵检测和病毒防范。
- TLS/SSL is a widely-used standard for communication security, OpenSSL is an Open Source implementation of TLS/SSL. TLS/SSL是一个得到广泛应用的安全通信标准,OpenSSL是TLS/SSL的OpenSource实现。
- The simulation results show that the new algorithm has a better synchronous precision and communication security. 仿真表明,新算法较传统算法有更好的同步精度和通信的安全性。
- The basic goals of U. S. national security policy remain essentially unchanged. 美国国家安全政策的基本目标在实质上仍然没有改变。
- The SSL Protocol is a important protocol to keep the net security,and it is widely applicable in communication security. SSL协议是网络安全的重要协议;被广泛应用于安全数据传输与互联网交易中.
- The different security requirements of applications on mobile communication environment were introduced, and the security policy and its stricture were designed. 分析了移动业务在安全方面需求的差异性,设计了安全策略及组织结构。