This paper focused on SDH communication network protection.
本文研究了SDH通信网的保护问题。
The principle and technique of high voltage network protection.
朱声石。高压电网继电保护原理与技术。
Built-Refinement of the rules, more intelligent network protection.
内置细化的规则设置,使网络保护更加智能。
Active defense technology is an new hotspot in network protection at the moment.
主动防御技术是目前网络保护的新热点。
Lateral protection, the power plant network protection measures as shown in figure 5.
横向防护方面,电厂内部的网络防护措施如图5所示。
It will be a heavy burden for CPU to achieve network protection only based on software.
如果单靠软件来实现网络安全保护,对于处理器来说是无疑是一个很沉重的负担。
The current network protection methods are ineffective in controlling the hosts of the Intranet.
现有的网络安全防护手段缺乏对内网主机的安全管理。
The new network protection technique is one of the most popular research directions of optical communications.
新的保护方式是当前通信系统中热门的研究方向。
Protection-switching time is an important measure for evaluating the performance of a network protection scheme.
保护切换时间是衡量一个网络保护方案性能优劣的重要指标之一。
The X 8500e tested came in a UTM bundle, a package that includes everything needed for comprehensive network protection.
所测的X 8500e来自一个UTM包中,该包涵括了全面网络保护所需的一切。
Hence, the research on integrated network defense and intrusion detection system is critical to network protection.
因此,研究网络集成防御和入侵检测技术对网络防御技术有着重要意义。
Lots of network protection equipment providers adopt the strategy that using CPU combined with ASIC to protect the network.
越来越多的网络安全设备厂商趋向于采用ASIC芯片与CPU组合的策略。
A comprehensive, yet easy to use network protection software, you can ensure that your computer is not by any hacker intrusion.
一个全面,却又简单易用的网络防护软件,可以确保你的计算机不被任何黑客侵扰。
The paper provides the security from the following 3 ways: authentication provided, network protection and endpoint protection.
从接入认证、网络各层的防护以及端点保护三个方面对软交换提供了安全的保障。
The effect of distributed generation on distribution network protection and calculation of allowed capacity are analyzed in detail.
文章详细分析了分布式发电对配网保护的影响及准入容量的计算。
Initially, perform a baseline risk analysis based on a current threat assessment to use for developing a network protection strategy.
最初,执行基准风险分析当前威胁评估的基础上开发使用的网络保护战略。
Network forensic system gives us a new method of network protection, and remedies the shortage of the current network security system.
智能网络取证为网络防护提供了一种新的措施,弥补了原有网络安全体系中的不足。
Operational policy constraints are often impacted by the type of appliance doing the policy enforcement or by the overall network protection directives.
实施策略的设施类型或总体网络保护指示常常会影响操作策略约束。
Fundamental to risk management is identification of residual risk with a network protection strategy in place and acceptance of that risk by management.
风险管理的基本条件是剩余风险识别与建立,管理风险,通过验收的网络保护策略。
Intelligent network forensic system (INFS) gives us a new method of network protection, and remedies the shortage of the current network security system.
智能网络取证为网络防护提供了一种新的措施,弥补了原有网络安全体系中的不足。
The data throughput achieved by ASIC will become one of the critical targets to weigh the performance of network protection equipment under such strategy.
这种策略下,ASIC芯片所能达到数据吞吐率便成了衡量网络安全设备性能的关键指标。
Combined with topologies of major telecom operators' transmission networks of long -distance backbone transmission networks in China, it analyzes its network protection solution.
结合目前我国长途骨干传输网上主要电信运营商的传输网络的网络拓扑现状,对其网络保护方案进行了分析。
Modern society is increasingly depending on communications, therefore network protection and restoration has become one of the key elements of network construction and maintenance.
现代社会对于通信的依赖性越来越强,因此网络的保护和恢复是网络建设和维护的关键之一。
While this protection strategy allows higher network throughput, it does so at the cost of some network security.
这种保护策略允许更高的网络吞吐量,代价是牺牲部分网络安全性。
It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
You should consult other sources of information to ensure your system is secure, or run it on a private network that provides a suitable level of protection.
您应当参考其他信息来源以确保您的系统安全,或者在提供适当保护的内部网络上运行它。
An operating system's protection ends at the network.
对操作系统的保护止于网络。
This provides an added degree of protection by hiding the true IP addresses of the private network from the public network.
通过对公共网络隐藏专用网络的实际ip地址,这增加了保护程度。
Lady Sawers put no privacy protection on her Facebook account, allowing any of the site's users in the open-access London network to see the entries.
Sawers夫人没有给她的Facebook账号设置隐私保护,Facebook上的所有通过伦敦公用网络接入的用户都可以访问她的页面。
Secure Shell (SSH) was intended and designed to afford the greatest protection when remotely accessing another host over the network.
SecureShell (SSH)的目的在于在通过网络远程访问另一个主机时提供最大的保护。
应用推荐