您要查找的是不是:
- Organization Management and Information Security Control of Extended Enterprise 扩展型企业的组织管理与信息安全性
- Access control is also a very important content of information security. 信息安全很重要的一点就是对关键信息的访问进行控制,访问控制是针对越权使用资源的防御措施。
- How to establish security control mechanisms? 如何设立保安监控机制?
- information security control 信息安全控制
- Want to know more about information security? 希望对资讯保安有更多的认识?
- Independent review of information security. 信息安全的独立的回顾。
- Establishment of a comprehensive security control process. 建立全面的安全控制流程。
- User authentication is the cornerstone of information security. 用户身份认证是信息安全的基石。
- It solvesthe problems of function extension and security control. 解决了功能扩展与安全控制的实现问题。
- Tighter computer security control has also been implemented. 此外,本署亦已实施更严密的电脑保安。
- Where can I obtain more information about Information Security? 我可从哪里取得有关资料保安的资料?
- It made information system, from access system to operate database and sign badge, all these things under security control. 使该所信息系统从用户访问系统,到操作数据库与具体实现签章等工作,都处在系统安全控制之下。
- CAJ-digital watermark in information security applications. 数字水印在信息安全中的应用.
- ICPO... information security section, anti-cybercrime group... 他并未回头,冷澈的嗓音在夜色中飘来,“...
- CAJ digital watermark in information security applications. CAJ数字水印在信息安全中的应用.
- Multi-user privilege control is one of the ways to protect information security in enterprise information system. 摘要在企业的信息系统中,多用户权限管理是保护数据安全的途径之一。
- Provide information and back-up technology for the Olympic networks and information security system so as to effectively impose supervision and control. 为奥运网络和信息安全体系提供信息和技术支撑,有效实施智能监控。
- Public security departments shall exercise security control over the auctioning industry as special industry. 公安机关对拍卖业按照特种行业实施治安管理。
- Shielded rooms, communication cabins and information security applications. 屏蔽室,通信机箱,和信息安全应用。
- Encrypting and digital signatures can satisfy information security needs. 加密及数码签署能满足资讯保安的需求。