Wireless hubs make attacks on the shopper's computer network the better choice because most wireless hubs are shipped with security features disabled.
无线hub使攻击购物者计算机网络成为更好的选择,因为大多数无线hub都禁用了安全特性。
The problem of computer system security is discussed with emphasis on distributed system and computer network security in this paper.
本文讨论了计算机系统的安全问题,重点放在分布式系统和网络的安全方面。
By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.
随着计算机信息技术与网络技术的迅猛发展,信息与网络的安全形势也日趋严峻和复杂化。
To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.
该模型以透明计算机系统为基础,利用透明计算技术对计算机内部的安全问题进行控制。
As the foundation of the study on network security, how to discover and handle computer system vulnerabilities have always been one of the focuses of the field.
作为网络安全研究的基础,计算机系统脆弱性的发现和应对等相关工作始终是网络安全研究的焦点之一。
This article from the computer system of information on the importance of the issue of security, focused on the impact of computer information network security factors and preventive measures.
该文从论述计算机系统的信息安全问题的重要性出发,重点探讨了影响计算机信息网络安全的因素和防范对策。
Information security is the precondition and basis of everything that can work regularly based on the computer network communication.
信息安全是一切基于盘算机网络的通信活动得以正常运行的前提和基本。
With the wide application of computer and network technology on libraries, the security problem of the library information network becomes unavoidably more and more important.
随着计算机及网络技术广泛应用于图书馆,使得图书馆信息网络安全问题成了不容回避的重要课题。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.
指挥自动化网络安全系统,基于信息存储、通信信道、计算机病毒及电磁辐射等安全性分析。
This paper introduces the enterprise computer network organization and security requests in our country, and gives security scheme for enterprise network based on cryptography.
该文试图通过对企业网络构成和安全需求的分析,提出基于自主密码技术的企业广域网系统安全方案。
At present, the problem of network security such as information leakage, network viruses, such as a direct impact on the normal computer applications.
目前,网络安全问题如信息泄密、网络病毒等直接影响计算机的正常应用。
Regaining the initiative of computer safe protection is required for Information Age. People pay more attention to network security tactics based on cheating technology.
信息时代的到来需要计算机安全防护由被动防御转向主动,因此基于欺骗的网络安全策略日益受到重视。
The construction of postal agent insurance computer system is given in brief. Based on service architecture and function, the network architecture, application system and security are demonstrated.
简单介绍了邮政代理保险计算机系统的建设情况,以业务结构及功能为基础,对网络结构、应用系统及安全等方面进行了说明。
This article on the impact of computer network system security the main factor analysis combined with practical work, and put forward countermeasures and the majority of peers to explore.
本文就对影响计算机网络系统安全的主要因素结合工作实际进行分析,并提出相应的对策,与广大同行共同探讨。
Based on many years' experience of network management the author, analyzes the common methods of network invasion and offers advice on security frameworks for management of secret computer.
本文根据多年网络信息系统安全管理的实践经验,分析了目前网络攻击入侵手段,详细论述了构建涉密计算机信息系统安全体系的基本思路。
Starting from the computer network security and the commercial trade security, basing on the technology of network security and commerce security, this paper is presenting the security system model.
从电子商务系统对计算机网络安全,商务交易安全性出发,在分析网络安全技术和交易安全技术的基础上,给出了一种保证电子商务安全的体系结构。
How to discover, fix and exploit computer system vulnerabilities has been one of the focuses of the study on network security.
如何发现、修补和利用计算机漏洞,是网络攻防研究的焦点问题之一。
During the university computer network security teaching process needs some viruses, the hacker programs and so on to carry on the teaching demonstration.
高校计算机网络安全教学过程中需要对一些病毒、黑客程序等进行教学演示。
German security officials have said last year's assault on the Bundestag's computer network was also carried out by Russia-backed hackers seeking ammunition for electoral meddling.
德国安全部门官员表示,去年对德国联邦议会计算机网络的袭击同样来自于俄罗斯支持的黑客,其目的在于寻找影响大选的途径。
To be meaningful, a custom permission must be added to the security policy on the computer (or computers, in the case of a network) where the application using the permission runs.
若要让自订使用权限具有意义,必须在使用这个使用权限的应用程序执行时所在的电脑(如果是网路,可能有多部电脑)上,将它加入安全性原则。
Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.
本文通过对大量的网络弱点的分析,结合网络的特性,建立了安全性分析模型,生成网络攻击图。
The vast information was processed by computer and transmitted on network about the traditional VPN products, the key problem was how to assure information security.
在传统VPN产品中,大量的信息在计算机中处理、在网络中传输,从而带来的一个关键问题是如何保证信息的安全性。
Since the rapidly development of the computer network and communication technology, the security of data that transfer on the network attracts more and more attentions.
在计算机网络与通讯技术飞速发展的今天,网络上传输的数据的安全性成为人们日益关注的问题。
Since the rapidly development of the computer network and communication technology, the security of data that transfer on the network attracts more and more attentions.
在计算机网络与通讯技术飞速发展的今天,网络上传输的数据的安全性成为人们日益关注的问题。
应用推荐