How to stop them, we have to rely on the network security engineer.
如何阻击他们,还得靠我们网络安全工程师。
For all those who use computers on the network security measures to have sufficient knowledge of it, it is very important.
让所有使用电脑的人对网络安全防护措施有足够的认识,这一点是很重要的。
Security sources say that Mr Dokpesi, who owns a television network and a shipping line, was implicated by text messages found on the mobile phone of another suspect but was later released.
安全部队表示,拥有电视网络与船运公司的多科佩西在他的手机上发现的短信暗示到了另一个嫌疑人,但后来他被释放了。
The Derby database embedded in Eclipse lets you create an SQL database on the client side with no security issues or network problems, such as an unstable connection or high latency.
嵌入到Eclipse中的Derby数据库使您可以在客户端创建SQL数据库而不会有任何安全问题或网络问题,例如连接不稳定或反应时间长。
A proxy is important to an Ajax architecture if you plan to aggregate content from multiple Web services or if you need to enforce a security mechanism on clients connecting to the network.
若想聚合来自多个Web服务的内容或需要在连接到网络的那些客户机上强制施行一种安全机制,那么代理对于Ajax架构而言就愈发重要。
One-Net offers users the ability to communicate on a single, integrated communications network with a full-range of information security features.
One - Net为用户提供在一个单一、综合通信网络上的通信能力,同时伴随全范围信息安全特征。
It has also installed robust security software on the devices and ensured that they can gain access only to a hospital's network.
voalte还在他们的智能手机上安装了强大的安全软件,以确保它们只能通过医院的网络连接系统。
Akamai monitors the Internet traffic using agents installed across all continents and reports the findings on several domains: security, network and web outages, Internet penetration.
Akamai利用安装在各大洲的代理对Internet流量进行了监控,并报告了对安全、网络和网络中断、Internet普及率这三个领域的观测结果。
Security researchers have shown that the network used to make 80 per cent of the world's phone calls is vulnerable to hacking, building on work demonstrated in previous years.
安全专家表示全球百分之八十的手机通讯网络非常容易被黑客攻击,这是依据前几年的研究做此结论。
This again serves to emphasize the earlier point that focusing security solely on keeping the intruders out of the network is insufficient.
这再次强调了前面提到的观点:仅仅防御来自网络外部的攻击者是远远不够的。
This again serves to emphasize the earlier point that security that is focused solely on keeping the intruders out of the network is insufficient.
这再次强调了前面提到的仅仅防御来自网络外部的攻击者是远远不够的。
The FBI did not provide details on the security incident, but it looks as though hackers may have used maliciously encoded file attachments to hack into the network.
FBI并没有就此次故障事故提供更多细节,不过看起来黑客们可能是通过带毒的邮件附件对网络进行攻击。
The security firm warns that the best method to keep yourself safe is to go ahead and create your own social network profile on the major networks "before someone else does."
阿拉丁公司警告称,保护个人安全的最好办法就是往前看,“抢在别人之前”,在主要社交网站建立自己的档案资料。
Attack An attempt to circumvent the security measures in place on a network either to gain unauthorized access to the system or to force a denial of service.
试图破解网络上某一处的安全防护措施,以便在未获得授权的情况下访问系统或者是遭到服务拒绝。
As a Network Administrator, you might choose to build on the defaults of Internet Explorer to enhance security for your users.
作为一个网络管理员,您可以通过选择建立默认的InternetExplorer来为用户增强安全性。
Wireless hubs make attacks on the shopper's computer network the better choice because most wireless hubs are shipped with security features disabled.
无线hub使攻击购物者计算机网络成为更好的选择,因为大多数无线hub都禁用了安全特性。
Here are some strengthen router security measures, to prevent the attack on the router itself, and prevent the network information from eavesdroppers.
下面是一些加强路由器安全的具体措施,用以阻止对路由器本身的攻击,并防范网络信息被窃取。
Under the award, BBN Technologies will work on the second phase of the Military Networking Protocol program to enhance network security and performance, according to a July 13 company announcement.
根据7月13日的公司公告称,根据合同,雷神BBN技术公司将开始军事网络协议项目的第二阶段工作,以提高网络的安全和性能。
An digital image watermark algorithm is proposed based on the synergetic neural network, combined with encryption technique, to guarantee its robustness and security.
为保证图像数字水印的鲁棒性和安全性,结合加密技术,提出了一种使用协同神经网络的图像数字水印算法。
The thought of network security situation prediction based on cloud and an algorithm of network security situation prediction based on cloud were proposed.
提出了基于云的网络安全态势预测思想和基于云的网络安全态势预测规则挖掘算法。
To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.
进行信息网络安全技术和标准的研究,开发相应的安全产品,并从事安全服务工作。
In this article, the security and recovery techniques are introduced, which are implemented on a network data base-IDMS.
本文介绍了在网状型数据库idms上实现的安全技术和恢复数据库的过程。
The problem of computer system security is discussed with emphasis on distributed system and computer network security in this paper.
本文讨论了计算机系统的安全问题,重点放在分布式系统和网络的安全方面。
We will be at the meeting to share with you on the cloud, network, local and endpoint security methods, to help you understand how to protect the user and data everywhere.
我们将在会中与您分享关于云端、网络、本地及端点的安全防护方法,带您了解如何保护“身处各地”的用户与数据。
It doesn't, however, report new computers on the network as possible intruders, as Panda Internet Security 2008 does.
然而,它却不把新进入网络的电脑报告为潜在入侵者,熊猫互联网安全2008却报告。
By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.
随着计算机信息技术与网络技术的迅猛发展,信息与网络的安全形势也日趋严峻和复杂化。
To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.
该模型以透明计算机系统为基础,利用透明计算技术对计算机内部的安全问题进行控制。
The thought of network security situation prediction based on cloud doesn't need the initial data training, and the objectivity of predicting results is improved.
基于云的网络安全态势预测思想,不需要对预测算法进行数据训练,提高了网络安全态势预测的客观性。
The United States Congress held a hearing on the Russian intervention in U. S. elections, which may be the direction of future network security policy.
美国国会就俄罗斯干涉美国选举举行听证会,这可能是未来网络安全政策的导向。
The United States Congress held a hearing on the Russian intervention in U. S. elections, which may be the direction of future network security policy.
美国国会就俄罗斯干涉美国选举举行听证会,这可能是未来网络安全政策的导向。
应用推荐