低保密水准的电子邮件 :很多企业以为电子信函是保密通信,其实不然。
Poor emailing standards: Many businesses treat emails as confidential communications, but this is far from the case.
目前已经收紧了电子邮件的接驳权限以及复印范围,同时还提高了敏感信息的保密等级。
It has now tightened access to the e-mails and the scope to copy them. Sensitive information will have to receive a higher classification.
受试者的数据是匿名的,但是可以通过一个保密电子信息系统跟其家庭成员获得联系。
Patient data are anonymous, but the families can be contacted through a secure electronic-messaging system.
如果客户希望就相关就业机会联系保密求职者,他们将通过我们的系统向求职者发送电子邮件。
If the customer desires to contact the confidential job seeker regarding an employment opportunity, they will send an email to the job seeker through our system.
该体系通过标准的接口为电子商务提供必须的保密、完整、认证和不可否认服务。
The system provides the necessary services of confidentiality, integrity, authentication and non-repudiation fore-commerce by the standard API.
最后但并非最不重要的是,电子邮件更具有保密性。
构成富士康客户基础的知名电子产品企业,对保密性的要求很高。
The branded electronics groups that make up his customer base demand high levels of confidentiality.
经常更改密码可以帮助您保证电子邮件的保密性。
The quick act of changing your password will help your email remain private.
最后介绍了混沌技术在电子干扰中的应用,包括利用混沌技术实现对弱信号的检测以及混沌保密通信。
Lastly, it is introduced for chaos 'application in electronic jamming. It includes the detecting technology for weak signal and chaos security communication.
访问控制是网络安全的一个重要组成部分,在保障电子政务信息的完整性、保密性和可用性方面发挥着重要作用。
Access control is an important component of network security, E-Govment in the protection of information integrity, confidentiality and availability play an important role.
在此潮流之下,传统的保密与认证方式,已难以应付日益复杂的电子交易和信息保密措施的需要。
Under this tide, traditional security ways have been no longer reliable to satisfy the need of complex behaviors of e-commerce and information security.
当多个用户举行保密的电子会议时,会议机密信息的安全性在很大程度上取决于会议的密钥。
On an electronic conference holding among many users, the security of the secret information depend on conference key to a great extent.
从一个实用系统出发,采用形式化的证明方法,分析了电子资金转帐系统中安全协议的保密性和可鉴别性。
From an application system, this paper analyzes the privacy and authenticity of a security protocol in the electronic fund transfer system with a formal proof method.
在此潮流之下,传统的保密与认证方式如:识别码,已难以应付日益庞杂的电子交易与信息保密措施等的需求。
Traditional security ways, such as PIN code, are no longer reliable and difficult to satisfy the complex behaviors of e-commerce and information security.
它通过使用加密、数字证书、数字签名和数字指纹等安全技术,可以很好地保证电子商务应用的保密性、可靠性和完整性。
It USES some security technologies such as cipher technology, digital certificate, digital digest and digital finger print to confirm the electronic commerce applications' security.
作者在研制激光数字点阵全息图的基础上,尝试使用电子束刻蚀系统制作数字像元全息图以期用于防伪和保密模压全息图的制作。
Trial fabrication of digital pixel hologram which are recorded by an electronic beam lithography system to apply to fabrication of embossing hologram for anti counterfeiting and security is described.
电子时序密码锁是一种具有高可靠性和高保密性的新型锁。
Electric lock with password and time control is a kind of newly-designed lock with high stability and high safety.
SSL协议在网上银行、电子商务中得到广泛地应用,主要解决了数据的安全性、保密性。
The SSL protocol is widely used in internet bank and electronic business to insure the security of data.
保密性声明:本电子邮件包含发送给特定收件人的机密和特殊权限的材料。
CONFIDENTIALITY NOTICE: This email may contain confidential and privileged material for the sole use of the intended recipient.
新型RISC(精简指令计算机)的PIC16系列单片机具有耗电小、速度快、程序保密性强、系统结构简单等优点,非常适合于工业智能仪表、电子设备及家电产品的微控系统。
The new RISC type of microchip processor PIC16xx is low in energy, high in speed and secrecy, which is fit to make controller-inside industrial meter, electronic equipment and device.
根据近年来国内外关于数字签名的研究背景及进展,阐述盲签名在计算机保密通信,特别是在电子货币等方面的一系列重要应用。
In this paper, we present a series of important applications of blind signature to computer security communication, especially to electronic voting and electronic cash.
电子锁由于其保密性高,使用灵活性好,安全系数高,受到了广大用户的青睐。
Electronic lock because of its confidentiality high, use flexibility good, high safety coefficient, got the favor from the masses of users.
电子支付网络系统中的保密通信问题是实现安全电子交易的核心问题。
The security of an electronic defrayal communications network system is the fundamental problem of implementing electronic business.
在生成文件之后,还应该建立责任制,以保护这些商业机密,其中包括限制员工和第三方 的访问权限,将关键文件和电子文档设为保密级,并且要求特别口令 保护。
The company also needs to keep tabs on the trade secrets being developed by its employees, making sure that new trade secrets are documented and folded into the protection program.
最后从人员管理、保密制度、审计制度等方面论述了电子商务的安全管理。
Lastly, personnel management, security systems, auditing system security management and other aspects of e-commerce.
在保证便携移动电子设备功能的基础上使产品更具有便携性和对个人信息的保密性逐渐成为消费者和设计制造者关注的重点。
Ensuring the benefits from function of portable mobile electronic devices, consumers and manufacturers focus attention on the product's portability and the confidentiality of personal information.
本电子邮件及其附件所载之信息为保密信息,仅供指定的收件人使用。
The information in this email and any of its attachment is confidential. It is intended solely for the named addressee.
本电子邮件及其附件所载之信息为保密信息,仅供指定的收件人使用。
The information in this email and any of its attachment is confidential. It is intended solely for the named addressee.
应用推荐