您要查找的是不是:
- This project base on the actual requirement of the Training Center, carry on the design that the security technique guarding system. 本方案根据培训中心的实际需求,进行安全技术防范系统的设计。
- This paper introduces Internet incursion, interprets the security tactics and analyzes the main security technique including Firewalls and Data-Cryptography and so on. 本文围绕网络安全问题介绍了因特网常见的侵袭 ,阐明了网络安全策略 ,分析了主要的网络安全技术 ,包括防火墙和数据加密等。
- We employ different security techniques to protect the database. 我们使用不同的保护措施来保护数据库。
- VPN(Virtual Private Network) is a current security technique to set up a safe network, and becomes a researching focus for its security, agility and economic. 虚拟专用网(VPN,Virtual Private Network)就是一种常见的建设安全的企业内部网的安全技术,并以其安全性、灵活性和经济性成为了研究的热点。
- So,firstly expatiate the summarize of the database security,then analysis the typical database security technique,finally study the ORACLE database security technique. 为此,首先阐述了数据库安全概述,接着分析了典型数据库的安全技术,最后研究了ORACLE数据库安全。
- Honeypot skill is one of the active defense network security techniques. 摘要蜜罐技术是一种主动防御的网络安全技术。
- Network security includes a series network security technique that fireproofing wall is representation. Those are IP address transition technique, service deputy, dummy special network technique, system separating inner net and outer net, and so on. 网络安全技术包括以防火墙技术为代表的系列网络安全技术,即IP地址转换技术、服务代理技术、虚拟专用网络技术、将系统分为内网同外网等。
- Recently, the concept of steganography or information hiding has been presented as a different technique from traditional information security techniques. 近几年来,国际上提出一种不同于传统保密技术的信息伪装(隐藏)概念。
- To the power data of master station in AMRS, firewall and other security techniques are adopted to improve the security of the whole AMRS. 而对远程抄表系统主站系统中的电能量数据,则采用以防火墙为主、其他安全技术为辅的安全防范方案,提高了整个远程抄表系统的安全性。
- Security technique on networking register table 与上网相关的注册表安全技术
- The communication security techniques including confidentiality,integrity and authenticity are introduced in this paper. It can prevent concoction replay and repudiation. 该文介绍了一种基于Linux平台下保证短信的保密性、完整性及可认证性的安全传输技术,具有防伪造、防重放、防抵赖功能。
- This paper studies the security techniques for voice and video over IP to traverse NATs/Firewalls, and proposes an effective and transparent scheme to pass through NATs/firewalls. 本文研究IP音视频安全穿越NAT/防火墙的技术,提出了一种安全穿越NAT/防火墙的有效透明穿越方案。
- It's all a cat-and-mouse game: As new security techniques arise, hackers poke holes in them and malware authors learn how to manipulate them for profit. 这全都是一种猫捉老鼠的游戏:作为新的安全技术出现时;黑客戳洞;他们与恶意代码作者学习如何操纵它们;以盈利为目的.
- Supply crypto chips with independent intellectual property rights so as to provide the foundation for development of independent information security techniques and industry. 将两种入侵检测技术相结合,研发基于高速网络的高性能入侵检测系统。
- Chapter III: Expounding main network security techniques including data Encryption, Authentication, Kerberos, Virtual Private Network (VPN), Access Control, Security Protocol and Intrusion Detection Systems and Antivirus technique etc. 它们是:防火墙技术、信息安全技术,包括:数据加密、身份鉴别、Kerberos鉴别系统、虚拟专用网(VPN)、访问控制及必要的安全协议、网络入侵检测与网络防病毒等。
- The Information Security Technique on Internet Internet网上信息安全技术综述
- I'll undertake for your security. 我将保证你的安全。
- In the old society we never knew real security. 在旧社会我们的生活从来没有真正的保障。
- He get weekly social security payment. 他按周领取社会保险金。
- Israel, Palestinians restore security link. 以色列巴勒斯坦重回安全临界线。
