Data is organized in a number of categories - Sales, Security, Computer, Internet, Communication, Financial Management, Training, etc. -, each category being further organized in sub-categories.
同时还数据对进行了分门别类的管理,类别有销售、安全、计算机、因特网、通信、金融管理和培训等,每个分类又有进一步的子分类。
Thus, you have an opportunity to install on your computer and use a special program, which would play a role of a "second echelon" for your data security.
这样,你有机会可以安装在您的计算机上,并使用一个特殊的计划,该计划将发挥作用的“第二梯队”,为您的数据安全。
Delete important information or destroy data, improve system security, the password does not meet the requirements of computer networking in the block after repeated warnings.
删除重要信息或破坏数据,提高系统安全行,对密码不符合要求的计算机在多次警告后阻断其连网。
In computer security, data left in storage after processing operations and before degaussing or rewriting has taken place.
在计算机安全学中,经处理操作后,消磁或重写数据前剩留在存储器中的数据。
Security of data in computer system is put forward and system frame design, function design, principle and method of core modules implement are all mentioned.
提出并实现了一种数据安全管理系统,对系统的设计目标、框架设计、功能设计以及核心模块的实现原理及方法进行了详细的论述。
The paper discusses the state of existence of data in computer and the security problem in stored procedures, and carries out the exploration on data security and protection.
本文从各类数据在计算机中存在的状态以及在存储过程中的安全问题,对数据的安全性和保护性进行了论证。
Some literature named this technology of protection data and prevention of the illegal data accessing as the computer security or the system security technology.
有些文献将这些保护数据、阻挡非法数据访问的技术统称为计算机安全或系统安全技术。
With the rapid development of computer networks, network data security problem becomes more serious.
随着计算机网络的飞速发展,网络数据传输的安全问题也变的日趋严重。
Network is faced with various security threats, and it is important to effectively protect crucial data and to improve the security of computer networks.
通信网络面临多种多样的安全威胁,如何有效地保护重要数据信息、提高通信网络的安全性已经成为一个日益重要的迫切任务。
They also study the legal and ethical aspects of computer operation, including privacy issues and data security.
他们还必须学习有关于计算机操作的法律和道德方面的知识,其中包括个人隐私和数据安全的问题。
Using the technologies such as hook, network communication, data encrypting and database, computer operation analyzing and data security managing system has been implemented.
综合运用系统钩子、网络通信、数据加密和数据库等多种技术,计算机操作行为分析与数据安全管理系统的功能已经基本实现。
As the important line of defense of data security, network backup has been a key issue reinserted in network computer architecture.
作为数据安全的重要防线,网络备份已成为一项被纳入网络计算机体系结构的关键问题。
1 strengthen security awareness training, so that each staff to understand the importance of data security information, understanding of data security is to ensure the safety of all computer users.
1加强安全意识培训,让每个工作人员明白数据信息安全的重要性,理解保证数据信息安全是所有计算机使用者共同的责任。
At present, the security problem of enormous data storage in computer, the problems of data store steal and distort have been paid much attention by people.
目前,计算机大批量数据存储的安全问题、敏感数据的防窃取和防篡改问题越来越引起人们的重视。
Since the rapidly development of the computer network and communication technology, the security of data that transfer on the network attracts more and more attentions.
在计算机网络与通讯技术飞速发展的今天,网络上传输的数据的安全性成为人们日益关注的问题。
It brings us a problem of data security. Factors against the safety of computer data consist in hardware, software and data input, processing, output, storage, transmission, transfer and others.
电脑数据的安全性问题随即产生,其包含在电脑硬件及软件之中,也存在于数据输入、加工、输出、存储、传输、转储等的环节上。
The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus.
本发明属于计算机信息安全处理系统,尤其属于一种外置式计算机硬盘数据加密方法及其装置。
One example: She led an initiative to create a centralized data center, allowing campuses to reduce operating costs, increase computer security, and open valuable physical space on their campuses.
一个例子是:她推动了集中信息中心的建立,使各校区能够减少成本,提高计算机安全性,并解放了各校区宝贵的实际空间。
In computer and data security, the person who attempts to overcome the computer or data security measures.
在计算机及数据安全学中,试图攻破计算机或数据安全措施的人。
The size of computer networks has made network security a critical issue. Protocol security and algorithm security are two fundamental aspects of network data security.
网络的普及使得网络安全问题日益重要,协议的安全性和密码算法的安全性是网络数据安全的两个最基本的概念。
At the same time, some key problems, such as human computer interface, product engineering data modeling and description and security of the distributed system, are analyzed and described.
同时也对人机接口、产品工程数据建模,以及分布式安全等协同设计中关键问题的解决进行了分析说明。
This article analyses the process and the character of the hacker attacking the computer and the hidden troubles in the library computer data, in order to protect computer 's security.
以一则真实的入侵实例分析黑客人侵过程、常用手段、特征及图书馆数据安全存在的隐患、危害及防范措施。
Intentional delete or accidental delete always leads to computer data loss. Data recovery plays an important role in information security protection.
恶意删除或数据误删现象时常发生,数据恢复的成败关系到信息的安全。
It destroyed the security of one's communication in Internet and the data in computer. Moreover, it disturbed the peace of personal life.
它破坏个人通信的安全性、个人数据资料的安全和个人生活的安宁。
This Trojan includes a keylogger and allows attackers to access your computer, stealing passwords and personal data. It is a registered security risk and should be removed immediately.
该木马包括键盘记录功能,并允许攻击者访问你的计算机,窃取密码和个人数据。
In computer security, data left in storage after processing operations and before degaussing or rewriting has taken place.
在程序设计中,把数据送入存储器或工作寄存器。
The research is from Fujian provincial natural science fund subject: "Computer & Communication Network Variable Structure Data Encryption and Security Research".
本研究来源于省自然科学基金课题“计算机通信网络变结构数据加密与安全研究”。
The research is from Fujian provincial natural science fund subject: "Computer & Communication Network Variable Structure Data Encryption and Security Research".
本研究来源于省自然科学基金课题“计算机通信网络变结构数据加密与安全研究”。
应用推荐