The paper introduce the new active network security technology: Honeypot.
本文介绍一个新的主动型的网络安全防御技术:蜜罐。
Intrusion Detection (ID) is an important aspect in network security technology.
入侵检测是网络安全技术的一个重要方面。
User Authentication is one of the important parts in network security technology.
身份认证是网络安全技术的一个重要组成部分。
And encryption technology is the core technology of the network security technology.
而加密技术则是网络安全技术中的核心技术。
Accordingly, emerge as The Times require of all sorts of network security technology.
因此,各种网络安全技术应运而生。
Honeypot technology is a new initiative based on the defense network security technology.
蜜罐技术是一种新兴的基于主动防御的网络安全技术。
Nowadays Intrusion Prevention System (IPS) is an important research field in network security technology.
入侵防御系统是最近网络安全技术领域一个重要研究方向。
Finally, the network security technology papers were summarized and prospects are given for further research.
论文最后对网络安全技术进行了总结和展望,给出了进一步的研究方向。
The company is strong in technology research and development, has a group of network security technology expert.
公司技术研发力量雄厚,拥有一批网络安全技术专家。
Intrusion detection is an initiative, active and real time network security technology. It has been studied widely.
入侵检测作为一种主动积极而实时动态的网络安全防范技术,目前得到了广泛的研究。
But it did put the focus on content filtering, a network security technology that observers say has been undervalue d.
但它确实使人们的注意力集中到内容过滤上,这是一项观察家们认为以往被低估了的网络安全技术。
Identity authentication is an important aspect of network security technology and the basis of other security mechanisms.
身份认证是网络安全技术的一个重要方面,是其他安全机制的基础。
The article discussed how to use network security technology to protect our school's campus network information in details.
文章详细讨论了怎样利用网络安全技术来保障我校校园网络信息的安全。
This paper expounds the basic concept of network security, and introduces the main technology of network security technology.
本文阐述了网络安全的基本概念,并介绍了当前网络安全技术的主流技术。
The technology of VPN is the network security technology which is added encrypt and attestation in the process when the data is transmitted.
VPN技术就是在数据传送过程中加上了加密和认证的网络安全技术。
Authentication identify is an important network security technology. How to build a secure authentication identify system is the focus of this article.
身份认证是一种重要的网络安全技术,如何构建一个安全的身份认证系统是本文关注的焦点。
But, the traditional network security technology has many defects which prompt researchers to try to combine with other technologies to regulate the network order.
而传统网络安全技术存在的许多缺陷促使研究人员试图结合其他技术来规范网络秩序。
To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.
进行信息网络安全技术和标准的研究,开发相应的安全产品,并从事安全服务工作。
So the topic of applications and research of network security technology in the enterprise network is of important theoretical significance and realistic background.
本文首先详尽介绍了课题应用研究的背景、目的和意义,从多层视角探讨了计算机网络安全概念。
Information Hiding is a new network security technology, it adopted the confidential information to other hidden vector to transmit this is not easily found by others.
信息隐藏技术是一门新的网络安全技术,它通过把保密信息隐藏到其它载体中来传输,这样不等闲被别人发现。
On the platform, the paper analyzes the component technology, middleware technology, data storage and backup technology, load balancing technology and network security technology.
在平台建设技术方面分析了构件技术、中间件技术、数据存储备份技术、负载均衡技术和网络安全技术及相应的标准。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
Air equipments information integration technology is a synthesize technology which is capable of realizing air equipments information share basing on information and network security technology.
航空装备体系信息一体化技术是以信息技术为基础,网络安全技术为保障,航空武器装备信息资源共享为目的的一项综合高技术。
The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.
该协议涵盖企业安全,并呼吁支持信息技术服务,对新出现的网络威胁和网络入侵提高认识。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
Network services requiring security and availability should benefit from this powerful operating system technology.
需要确保安全性和可用性的网络服务应该会受益于这种强大的操作系统技术。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
Compared with the past, the increasing complexity of information technology will make us more difficult to protect the security of enterprise network.
与过去相比,信息技术的日趋复杂会让我们在保护企业网络安全的时候遇到更多的困难。
应用推荐