It is their difficulty to grasp that makes primes the basis for our modern information security.
正因为他们非常难把握,质数成为我们现代信息安全的基础。
So the establishment of a complete information security training system is the trend of The Times.
那么建立一个完整的信息安全培训体系就是大势所趋了。
Degree required: Associate's or bachelor's degree in computing or certifications in information security.
文凭要求:计算机学士学位或大专学位,或信息安全认证。
We will intensify our information security and secrecy, and improve management of information networks.
加强信息安全和保密工作,完善信息网络管理。
It could even be a requirement for insurance coverage, allowing a market for information security to emerge.
这些信息甚至可作为保险责任范围的一项必要条件,以利于信息安全市场的形成。
To undertake emergency coordination of information security and to coordinate the handling of major incidents.
承担信息安全应急协调工作,协调处理重大事件。
Most of the compliance requirements (but not all) involve information security and the associated business risk.
大多数遵从性需求(但不是全部)都涉及信息安全性和相关的业务风险。
As the Internet increasingly emphasizes information security, more web applications are using SSL authentication.
随着互联网日益强调信息安全,越来越多的web应用程序在使用SSL身份认证。
For too long, information security has been considered a separate discipline, isolated from the enterprise architecture.
长久以来,信息安全一直被认为是一门单独的学科,孤立于企业架构之外。
Therefore, the lack of information security awareness training, to make up for deficiencies in the information system.
所以单纯的信息安全意识培训,不足以弥补人在信息系统中的缺陷。
Those factors are leading to a crisis in information security that will demand new solutions from the security specialists.
这些因素导致了信息安全危机,从而需要来自安全专家的新的解决方案。
"Apple will continue to be one of the leaders in strengthening personal information security and privacy," the company adds.
“苹果将继续是保障个人信息安全的先锋”苹果补充说。
Encryption keys are a crucial aspect of information security in the delivery of assured communications to military personnel.
加密密钥是信息安全的关键环节,保障军事人员的通信传递。
Because of the reliance on electronic communications by modern information society, information security has become so weak.
由于现代信息社会对电子通信的依赖,信息安全变得更加脆弱。
And as the world increasingly goes digital, information security professionals will be the digital security guards of the future.
随着世界加速数字化,信息安全专家将成为未来的数字安全卫士。
Command information Inc. has acquired privately held Idealogica Inc., a Leesburg, va., provider of information security services.
指挥信息公司已经秘密获得位于弗吉尼亚洲Leesburg的Idealogica公司,该公司是信息安全服务提供商。
Develop and document a robust information security architecture as part of a process to establish an effective protection strategy.
制定和文件作为一个进程的一部分,健全信息安全架构,以建立一个有效的保护战略。
The company’s information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.
该公司的信息安全团队几乎立即发现了攻击,并采取积极的行动来保护所有系统和数据。
The company's information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.
该公司的信息安全团队几乎立即发现了攻击,并采取积极的行动来保护所有系统和数据。
But if they have accidentally already downloaded any of these documents, they are being told to notify their "information security offices."
但如果在“偶然”情况下下载了这些密件中的任何内容,通知中表示,雇员应将此情况通知其所在单位的“信息安全办公室”。
But if they have “accidentially” already downloaded any of these documents, they are being told to notify their “information security offices.
但是如果已经“意外地”下载了这些文件,他们则需要告知“信息安全办公室”。
Sources of risk to information security include, but are not limited to, people or hardware within or outside the organization (Figure 2).
信息安全风险的来源包括(但并不限于)机构内部或者外部的人或硬件(图2)。
It information security professionals in the medical industry appear to be reluctant to deploy document authentication and encryption for users.
似乎医疗产业的IT信息安全专家们很不情愿为用户提供文档认证和加密功能。
We express our commitment to cooperate for strengthening international information security. We will pay special attention to combat cybercrime.
我们承诺合作加强国际信息安全,并对打击网络犯罪予以特别关注。
A new Georgia Tech information Security Center report cites search engines, mobile phones and personal information as prime targets for hackers.
佐治亚理工学院信息安全中心一份新的报告把搜索引擎、移动电话和个人信息列为黑客攻击的首要目标。
As a very important application of information hiding, covert communication plays a very important role in the field of information security.
作为信息隐藏技术的一个重要应用,隐秘通信在信息安全领域扮演着十分重要的角色。
One-Net offers users the ability to communicate on a single, integrated communications network with a full-range of information security features.
One - Net为用户提供在一个单一、综合通信网络上的通信能力,同时伴随全范围信息安全特征。
This distribution is again a customized version of Knoppix with an emphasis on information security tools, therefore STD (security tools distribution).
这个发行版本也是一个定制过的Knoppix版本,它重点关注信息安全工具,因此就得名std (SecurityTools Distribution)。
We hope that through this ecosystem so that different areas of the community in the field of network information security cooperation to a higher level.
我们希望可以通过这个生态系统让不同领域的社区在网络信息安全方面的合作能够更上一层楼。
We hope that through this ecosystem so that different areas of the community in the field of network information security cooperation to a higher level.
我们希望可以通过这个生态系统让不同领域的社区在网络信息安全方面的合作能够更上一层楼。
应用推荐