Delete important information or destroy data, improve system security, the password does not meet the requirements of computer networking in the block after repeated warnings.
删除重要信息或破坏数据,提高系统安全行,对密码不符合要求的计算机在多次警告后阻断其连网。
Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.
指挥自动化网络安全系统,基于信息存储、通信信道、计算机病毒及电磁辐射等安全性分析。
This article from the computer system of information on the importance of the issue of security, focused on the impact of computer information network security factors and preventive measures.
该文从论述计算机系统的信息安全问题的重要性出发,重点探讨了影响计算机信息网络安全的因素和防范对策。
This system can be more rational for assessing the security to the computer network, reducing the human factor. Finally, the objective appraisal to the information safety of the network was realized.
通过该系统可以更加合理的对计算机网络的安全进行评价,减少人为因素,最终实现对网络信息安全的客观评价。
The paper first explained the bank computer security management information system related background, the analysis related computer security should contain different side.
论文首先说明了银行计算机安全管理信息系统的相关背景,分析有关计算机安全所应包含的不同侧面。
The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus.
本发明属于计算机信息安全处理系统,尤其属于一种外置式计算机硬盘数据加密方法及其装置。
Study and development of secure operating system is an important means to enhance the security of computer information system and has important significance.
研究和开发安全的操作系统是提高计算机信息系统安全性的重要手段,具有重要意义。
Only the operating system to ensure the safe and reliable network security, this makes the computer information security faced a new topic.
只有操作系统安全可靠,才能保证整个网络的安全,这就使计算机信息安全面临着新的课题。
Article 2 the present Regulation shall be applicable to the protection of the security of the computer information system within the administrative area of this Province.
第二条本省行政区域内计算机信息系统的安全保护,适用本规定。
This paper explicates that applying DEBUG program can effect hard dish backup and recover of information system; applying the recover method can improve security of micro computer system.
阐述了应用DEBUG系统程序对硬盘系统区信息备份与恢复的方法,应用该方法可提高微机系统安全。
In the last, the author points out that in order to protect our computer system and network security forcefully, we should strengthen the computer information syst…
最后指出采用新技术和传统措施相结合,综合地利用各种手段技术、策略来强化计算机信息系统的安全程序,才会更加有力的保护我们的计算机及网络安全。
Nowadays, authentication technique is becoming an important research content in computer system security field when information security is more important.
在信息安全日益重要的今天,身份识别技术的研究成为计算机安全领域中的一个重要的研究内容。
Security audit system can record the user's actions and block the user's illegal operations in a timely manner. The log information can provide evidence for the computer forensics.
安全审计系统能够及时地将用户操作以日志的形式记录下来,并且对违规操作进行阻断,日志信息可以为事后取证提供证据。
So to design the security architecture of power information system, a systematic and structural design method and corresponding computer-aided tools are necessary.
为此,需要一种系统化和结构化的设计方法以及相应的辅助工具设计电力信息系统的安全体系。
According to public computer, visit control system used on drives and files ensures the security of personal information.
针对公用计算机,进行驱动器或文件夹的访问控制,保证个人信息具有保密性。
According to public computer, visit control system used on drives and files ensures the security of personal information.
针对公用计算机,进行驱动器或文件夹的访问控制,保证个人信息具有保密性。
应用推荐