您要查找的是不是:
- Recently, the concept of steganography or information hiding has been presented as a different technique from traditional information security techniques. 近几年来,国际上提出一种不同于传统保密技术的信息伪装(隐藏)概念。
- The Information Security Technique on Internet Internet网上信息安全技术综述
- Supply crypto chips with independent intellectual property rights so as to provide the foundation for development of independent information security techniques and industry. 将两种入侵检测技术相结合,研发基于高速网络的高性能入侵检测系统。
- micro - electronics and information security techniques 微电子和信息安全技术
- micro-electronics and information security techniques 微电子和信息安全技术
- Information Security Technique 信息安全技术
- Want to know more about information security? 希望对资讯保安有更多的认识?
- Independent review of information security. 信息安全的独立的回顾。
- User authentication is the cornerstone of information security. 用户身份认证是信息安全的基石。
- Information technology -- Security techniques -- Information security management systems -- Requirements 信息技术。安全技术。信息安全管理系统。要求
- Where can I obtain more information about Information Security? 我可从哪里取得有关资料保安的资料?
- CAJ-digital watermark in information security applications. 数字水印在信息安全中的应用.
- ICPO... information security section, anti-cybercrime group... 他并未回头,冷澈的嗓音在夜色中飘来,“...
- CAJ digital watermark in information security applications. CAJ数字水印在信息安全中的应用.
- This is a perfect solution of network information security which consists of public key cryptography technique,digital certificate,certificate authority and security policy. 该方案由公开密钥密码技术、数字证书、认证机构和关于公开密钥的安全策略等共同组成 ,是目前比较完善的网络信息安全技术解决方案。
- We employ different security techniques to protect the database. 我们使用不同的保护措施来保护数据库。
- The TEMPEST technique is a new subject in the information security field. The TEMPEST technique's principle and its application to the computer system are discussed. 摘要TEMPEST技术是信息安全领域的一个专门研究领域。论述了TEMPEST技术的原理、及其在计算机系统中防护技术。
- This project base on the actual requirement of the Training Center, carry on the design that the security technique guarding system. 本方案根据培训中心的实际需求,进行安全技术防范系统的设计。
- This paper introduces Internet incursion, interprets the security tactics and analyzes the main security technique including Firewalls and Data-Cryptography and so on. 本文围绕网络安全问题介绍了因特网常见的侵袭 ,阐明了网络安全策略 ,分析了主要的网络安全技术 ,包括防火墙和数据加密等。
- Shielded rooms, communication cabins and information security applications. 屏蔽室,通信机箱,和信息安全应用。
