The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.
该协议涵盖企业安全,并呼吁支持信息技术服务,对新出现的网络威胁和网络入侵提高认识。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
At last, the popular technology about computer network virus detection and information and network security is summarized.
最后,对计算机网络病毒的检测和当前网络安全的主流技术进行了分析。
With the information age arrival and network technology broad application, people's requirement for security is higher and higher.
随着信息时代的到来和网络技术的广泛应用,人们对安全性的要求越来越高。
By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.
随着计算机信息技术与网络技术的迅猛发展,信息与网络的安全形势也日趋严峻和复杂化。
To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.
进行信息网络安全技术和标准的研究,开发相应的安全产品,并从事安全服务工作。
The main research content of this paper is network information detection technology and network security evaluation method.
本文主要研究的内容是网络信息的探测技术和建立在信息探测基础上的安全评估方法。
Nowadays, in the computer network environment, all the confidentiality, security, integrality, usability and nonrepudiation of the information must be resolved by encrypting technology.
如今在计算机网络环境下信息的机密性、安全性、完整性、可用性等特性,都需要采用密码技术来解决。
This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.
本文描述AT M网络中的信息安全、可能受到的威胁、安全结构和端系统之间的鉴别技术。
The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.
通过设置密码和蓝牙技术的安全机制,提供了信息家电网络和远程控制系统的安全保障。
In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.
本文从网络安全、病毒防护、主机系统安全三方面对信息系统的安全进行分析,并对实现技术进行了探讨。
This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.
本课题在现有的网络通信技术、数据库技术和信息安全技术的基础上设计并实现了新型的安全即时通信系统。
P2P network technology offers information resource for people, it increases availability and robustness of P2P network, but brings new security problems of network too.
P 2 P网络技术在使人们享受信息资源,增强网络可用性、健壮性的同时,也带来了新的网络安全问题。
The information secure middleware is a kind of software which utilizes the monitoring technology of network security by combining information safe technology and middleware technology.
信息安全中间件是一种把信息安全技术和中间件技术结合起来,实现网络安全监测的软件。
E-government technology is developed in domestic and overseas as new managing way, but its security is difficult problem because a lot of confidential information is involved in its inside network.
电子政务作为一种新型的政务管理技术,正在各国蓬勃发展,由于电子政务内部网络涉及大量的国家机密信息,因而安全问题成了电子政务的关键问题。
The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.
主要介绍网络安全准入控制系统组成及相关技术,并对该技术在铁路信息系统中如何应用加以探讨。
The key technology of the network and information security prototype system is studied, the network and information security test platform is introduced, and the testing methods are explained.
主要研究了网络与信息安全原型系统中的关键技术,介绍了网络与信息安全测试平台的组成,阐述了测试方法。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
In this paper, the threat to information security, information security technology and information security management of information security for the campus network, where explored.
本文就信息安全威胁、信息安全技术和信息安全管理对校园网的信息安全进行探讨。
With the wide application of computer and network technology on libraries, the security problem of the library information network becomes unavoidably more and more important.
随着计算机及网络技术广泛应用于图书馆,使得图书馆信息网络安全问题成了不容回避的重要课题。
In auditing system about network security, the technology about information catching and reverting is a difficult problem. At the same time, it is also foundation problem.
信息捕捉与还原技术是网络安全技术中审计系统实施的一个难点,同时也是实现审计系统的基础。
This paper give detail description of SI-MIS feature and relevant realization, key technology such as network data storage scheme and information security strategy are also included.
本文详细描述了其具体功能结构的设计和实现,包括网络数据存储方案和信息安全实现等关键技术。
Network security in sensor technology is that sensor getting information or image transmit in network to insure information's security and reliability in network.
传感技术中网络安全问题是由传感器获取的信息或图象通过计算机网络传输时产生的,以保证网上获取信息的安全、可靠。
With the rapid development of the network technology, the security of network content becomes more and more important, even exceeds information security.
随着网络技术的飞速发展,内容安全显得越来越重要,甚至超过了信息安全。
This paper discusses on the problem of realizing the information security of network communication by using DES and RSA hybrid encryption technology.
探讨了采用DES和RSA混合加密方式来实现计算机网络通信中的信息安全的问题。
However, due to the connatural frailty of the computer network, as well as the start of China's network and information technology was late, which causes the network security many potential threats.
然而,网络自身固有其脆弱性,并且中国的网络信息技术起步较晚,给网络安全带来诸多潜在的威胁。
While the identity authentication technology are network security and information system security the first barrier, it is time network information security technology a very important research field.
而身份认证技术是网络安全和信息系统安全的第一道屏障,它是网络时代信息安全技术非常重要的一个研究领域。
It is the identification? The encryption protection of transmission and storage? Integrality and undeniability in information network security that need to use password technology to be solved.
密码技术是解决信息网络安全的关键技术,信息网络安全中的身份认证,传输和存储信息的加密保护、信息完整性和不可否认性等,都需要运用密码技术来解决。
应用推荐