您要查找的是不是:
- Guards the network security, becomes the genuine hacker! 捍卫网络安全,成为真正的黑客!
- Spoofing can be interpreted as the network security term used for forging. 电子欺骗可以解释成用于伪造的网络安全术语。
- With the popularity of Internet,it is increasingly difficult to guarantee the network security. 随着因特网的普及,网络的安全性越来越难以保证,网络遭破坏的事件时有发生。
- Application settings are controlled by the network security policy. Please contact your system administrator if necessary. 通过网络安全策略控制程序设置。必要的话联系您的系统管理员。
- He just joins the Network Security Management Group today and is our new co-worker. 他今天刚刚来网络安全小组报到,是我们的新同事。
- With the popularity of Internet, it is increasingly difficult to guarantee the network security. 随着因特网的普及,网络的安全性越来越难以保证,网络遭破坏的事件时有发生。
- The invasion detection is an important method for guaranteeing the network security. 入侵检测是保障网络安全的一种重要手段。
- The attack knolls the alarm bell of the network secure . 它给网络安全敲响了警钟。
- Fault containment is proposed to construct a survivable kernel of the network security device based on the IBM virtual machine. 提出在IBM虚拟机器的架构上,使用错误围堵策略建立可生存的网络安全设备内核的思想。
- The network is the basis of Network Finance and Electronic Business, and the network security relates directly to the network transaction security. 网络是发展网上交易的基础,网络的安全性直接关系到网上交易的安全性。 在网络的发展过程中,技术的进步和法律规制都是十分关键的,电子签名就是与网络的迅速发展息息相关的。
- Main firewall techniques are used to analyse how to improve the network security performance to ensure the safety of network. 全面分析了目前计算机网络安全问题,探讨了网络安全策略,通过主要的防火墙技术来分析如何提高网络安全性能,从而保证网络的安全。
- With the data encryption via digital signature and the introduction of public key infrastructure, the system improved the network security. 同时引入第三方公共密钥将网络技术和密码技术结合,利用数字证书对数据进行加密提高系统的安全性。
- The network computer offers simplicity. 网络计算机提供了简洁性。
- This article elaborated the tradition deals with the network security,and introduced the UTM's produce, market and future development. 本文阐述了网络安全传统的应对方法,并介绍了新的信息安全解决方案UTM的产生、市场及未来的发展。
- With the swift development of the network technology, the network technology alienation is making attack increasingly the network security. 摘要随着网络技术的迅猛发展,网络技术异化也日益侵袭着网络的安全。
- Therefore, to the network security risk assessment correlation content research and the risk assessment system design is the this article key duty. 因此,对网络安全风险评估相关内容的研究和风险评估系统设计是本文的重点任务。
- On the other hand, the procedures of setting up the security system shall also be considered. In the end, we design a solution to the network security of CIQ Qingdao. 通过上述研究,我们认为网络安全技术研究的重点在于针对系统安全威胁建立正确的安全策略,提出安全的整体解决方案,严格规范建立安全系统的步骤,从而建立安全机制。
- The program is presented by the network as a public service. 该节目作为一项公共服务在该网络上播出。
- This paper advances an invasion detection model in the network security based on multi-sensor data fusion,and introduces in detail the structure of invasion detection system. 提出了网络安全中基于多传感器数据融合技术的入侵检测模型,并对入侵检测系统的体系结构进行了详细介绍。
- The topology of the network may be ring, star or bus. 网络的拓扑结构可以是环形的、星形的或总线形的。