Network and data security can be guaranteed by establishing point-to-point secure connections.
可以通过建立点对点安全连接来保证网络与数据安全性。
We'll start with a look at application security, then move on to discuss network and data security.
我们将首先研究应用程序安全性,然后继续讨论网络和数据安全性。
As part of this discussion, we'll suggest some potential ways to enhance network and data security for J2ME applications.
作为讨论的一部分,我们将提出一些增强J2ME应用程序的网络和数据安全性的可能方法。
Technological innovation has changed the way we live and work, but also as the shadow follows the form of network and data security.
技术革新改变了我们的生活和工作方式,但网络与数据安全问题也如影随形。
As you'll see later, this can seriously damage network security allowing attackers to capture passwords and sensitive data.
正如您稍后将会看到的,这可能严重地损害网络安全性,使攻击者捕获密码和敏感数据。
While virtual desktops require network connectivity to function, you cannot overlook the security, mobility, and data integrity benefits of such a strategy.
尽管虚拟桌面需要网络连接才能工作,但是这种战略在安全性、可移动性和数据完整性方面具有很强的优势。
Thomson Reuters, purportedly the world's largest financial real-time data network, spews out 750,000 updates of security price changes, quotes and news per second.
汤森路透据称是世界上最大的金融数据实时网络,每秒钟发布750,000条最新的股票价格变动、报价及相关新闻。
Kerberos is a popular security mechanism used by systems for network authentication and secure transmission of data.
Kerberos是用于网络身份验证和保护数据传输的最流行的安全机制。
Secure Sockets Layer (SSL) protocol is a cryptographic protocol that provides privacy and security for data communication over the network.
SecureSocketsLayer (SSL)协议是一种加密协议,可为网络上的数据通信提供隐私和安全保障。
Secure Shell (SSH), as the name suggests, is a tool that provides a high degree of security and reliability to data as it is transferred across the network.
SecureShell (SSH),顾名思义,是一种为网络上传输的数据提供高度安全性和可靠性的工具。
We will be at the meeting to share with you on the cloud, network, local and endpoint security methods, to help you understand how to protect the user and data everywhere.
我们将在会中与您分享关于云端、网络、本地及端点的安全防护方法,带您了解如何保护“身处各地”的用户与数据。
The structure, function and security of Long-distance education data center in a large military network are explained in this paper.
文章阐述了某大型军用网络远程教育数据中心的模块化体系结构、业务功能和安全设计。
Sniffing is a common way in gathering and intercepting network data, but malicious sniffing often does great harm to network security.
嗅探是一种常见的网络数据采集和侦听方式,恶意嗅探对网络安全具有极大的危害。
Review operational rules: review security practices, patches, and access points to network systems, applications, functions, and data.
审视运营规则:审核安全实践、补丁,以及到网络系统、应用、功能和数据的控制访问点。
Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.
从思科出版社帮助网络专业人员安全的关键数据和资源的安全题目,防止和减轻网络攻击,并建立端到端的,自防御网络。
The database is the core of all information systems, the security of the database usually refers to the security of the data, which is an important part of network security and information security.
数据库是所有信息系统的核心,数据库的安全通常是指其中所存数据的安全,是网络安全、信息安全的重要组成部分。
Specifically, the wisdom of the city may encounter information security issues are divided into network security, system security, data security and integrated security.
具体而言,智慧城市可能遇到的信息安全问题分为网络安全、系统安全、数据安全和综合安全。
The thought of network security situation prediction based on cloud doesn't need the initial data training, and the objectivity of predicting results is improved.
基于云的网络安全态势预测思想,不需要对预测算法进行数据训练,提高了网络安全态势预测的客观性。
The existing algorithms of network security situation prediction depended on the initial training data, and the objectivity of predicting results was insufficient.
现有网络安全态势预测算法对初始训练数据依赖性强,预测结果客观性差。
Confidential data, business data and other sensitive information on network security put forward higher request.
机密数据、商业数据等敏感信息对网络安全提出了更高的要求。
Network is faced with various security threats, and it is important to effectively protect crucial data and to improve the security of computer networks.
通信网络面临多种多样的安全威胁,如何有效地保护重要数据信息、提高通信网络的安全性已经成为一个日益重要的迫切任务。
In this article, the security and recovery techniques are introduced, which are implemented on a network data base-IDMS.
本文介绍了在网状型数据库idms上实现的安全技术和恢复数据库的过程。
This paper advances an invasion detection model in the network security based on multi-sensor data fusion, and introduces in detail the structure of invasion detection system.
提出了网络安全中基于多传感器数据融合技术的入侵检测模型,并对入侵检测系统的体系结构进行了详细介绍。
So we must create perfect system to protect the security and high-availability of data in the network.
因此,人们必须建立完善的数据保护系统,以保障网络数据的安全性和高可用性。
In modern network and communication system, the security of data convey seems important day by day.
在现代的网络和通信系统中,数据传输的安全性日益显得重要。
This paper give detail description of SI-MIS feature and relevant realization, key technology such as network data storage scheme and information security strategy are also included.
本文详细描述了其具体功能结构的设计和实现,包括网络数据存储方案和信息安全实现等关键技术。
The data replication not only reduces network lag and bandwidth consumption when accessing long-range data, but also improves load balance of network, security and reliability of data.
数据复制不仅可以降低远程访问数据的网络延迟及带宽消耗,还可以提高网络的负载平衡,并且提高数据的安全性、可靠性。
The research is from Fujian provincial natural science fund subject: "Computer & Communication Network Variable Structure Data Encryption and Security Research".
本研究来源于省自然科学基金课题“计算机通信网络变结构数据加密与安全研究”。
According to his maintenance in our hospital, this paper discusses security measures in hospital from such aspects as system security, data security, network security, and security management.
结合多年来对医院网络信息系统的维护工作,从系统安全、数据安全、网络安全,以及对安全管理等方面进行论述。
According to his maintenance in our hospital, this paper discusses security measures in hospital from such aspects as system security, data security, network security, and security management.
结合多年来对医院网络信息系统的维护工作,从系统安全、数据安全、网络安全,以及对安全管理等方面进行论述。
应用推荐