• By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.

    随着计算机信息技术网络技术迅猛发展信息与网络的安全形势日趋严峻和复杂化。

    youdao

  • To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.

    进行信息网络安全技术标准研究开发相应的安全产品从事安全服务工作

    youdao

  • This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.

    课题现有网络通信技术数据库技术信息安全技术基础设计实现新型的安全即时通信系统。

    youdao

  • This paper first introduces the actuality of network security, intrusion detection technology and CORBA, then puts foward the structure of a distributed intrusion detection system based on CORBA.

    本文首先简要介绍网络安全现状入侵检测技术CORBA 技术,然后给出应用CORBA建立分布式入侵监测系统体系结构

    youdao

  • Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.

    基于安全系统全面信息安全策略网络安全技术网络安全管理两个层次上研究内部网安全性

    youdao

  • With the wide application of computer and network technology on libraries, the security problem of the library information network becomes unavoidably more and more important.

    随着计算机网络技术广泛应用图书馆,使得图书馆信息网络安全问题成了不容回避重要课题。

    youdao

  • Regaining the initiative of computer safe protection is required for Information Age. People pay more attention to network security tactics based on cheating technology.

    信息时代到来需要计算机安全防护由被动防御转向主动,因此基于欺骗网络安全策略日益受到重视

    youdao

  • Second, from the use of the technology , it discusses detailedly the three-tier structure, J2EE framework, GPRS communications, GPS positioning, enterprise portal, network , security , and so on.

    其次系统建设所用到技术入手,架构J2EE框架GPRS通讯GPS定位企业门户网站网络与安全等方面进行了详细探讨。

    youdao

  • The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.

    主要介绍网络安全准入控制系统组成相关技术技术铁路信息系统中如何应用加以探讨

    youdao

  • Nowadays, network intrusion and attack affairs happen frequently, which makes people pay more attention on the spot of network security management technology.

    当前网络入侵事件不断发生使得网络安全管理技术成为当今人们关注热点

    youdao

  • Starting from the computer network security and the commercial trade security, basing on the technology of network security and commerce security, this paper is presenting the security system model.

    电子商务系统计算机网络安全,商务交易安全性出发,在分析网络安全技术交易安全技术基础上,给出了一种保证电子商务安全的体系结构。

    youdao

  • But it did put the focus on content filtering, a network security technology that observers say has been undervalue d.

    确实使人们注意力集中到内容过滤上,这是观察家们认为以往被低估了的网络安全技术

    youdao

  • This paper discusses on the problem of realizing the information security of network communication by using DES and RSA hybrid encryption technology.

    探讨采用DESRSA混合加密方式来实现计算机网络通信中的信息安全问题

    youdao

  • The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.

    本文中所设计网络安全监测模型当今流行入侵检测技术主要方法采用实时基于NIDS的技术。

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

  • Mobile IP is a mobile solution on the network layer. More and more attentions are paid to the security and the application of Mobile IP technology.

    移动IP一种网络移动解决方案,它安全应用成为人们最为关注的问题。

    youdao

  • Based on the inspection of the new factory, we designed a powerful and advanced security system which is based on digital network technology.

    本文通过厂区实地考察设计了一套基于数字网络技术功能强大技术先进安全防范系统

    youdao

  • For the current mixed-type attacks on an endless stream of security threats, traditional network security based on a single device protection technology has become powerless.

    对于当前混合型攻击层出不穷安全威胁传统基于单一设备网络安全防护技术己显得无能为力了

    youdao

  • With the advent of the network society and the growing popularity of e-commerce, traditional system security technology which depends on token or password has been facing serious challenges.

    随着网络社会到来电子商务日趋普及传统依赖信物口令系统安全性技术已经面临严峻挑战

    youdao

  • On the platform, the paper analyzes the component technology, middleware technology, data storage and backup technology, load balancing technology and network security technology.

    平台建设技术方面分析构件技术中间件技术、数据存储备份技术、负载均衡技术网络安全技术及相应的标准。

    youdao

  • Intrusion detection system is an indispensable part of network security. IDS evaluation and testing may discover the weakness of current technology and thus improve on them.

    入侵检测系统网络安全重要组成部分入侵检测系统的评测分析发现技术不足为研究提供改进的方向。

    youdao

  • Security and management on Internet are meeting the new challenge because the application of P2P technology is based on its own flexible network structure.

    由于P 2 P应用基于自组织弹性网络结构,网络安全和管理带来新的挑战

    youdao

  • Companies without any security at all on their wireless networks make it risibly easy for hackers to break in. Switching on the security that comes with the network technology should be automatic.

    无线网没有任何安全措施的公司会让黑客轻而易举地攻破,因此采用网络技术确保安全必然

    youdao

  • Since the rapidly development of the computer network and communication technology, the security of data that transfer on the network attracts more and more attentions.

    计算机网络通讯技术飞速发展今天,网络传输数据安全性成为人们日益关注的问题。

    youdao

  • This paper focuses on the key technology and control of this system's development, voice card programming technology, as well as the network and security with its application in practice.

    论文重点阐述系统开发关键技术控件语音编程技术、网络安全技术及其在实际中的应用

    youdao

  • This paper focuses on the key technology and control of this system's development, voice card programming technology, as well as the network and security with its application in practice.

    论文重点阐述系统开发关键技术控件语音编程技术、网络安全技术及其在实际中的应用

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定