By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.
随着计算机信息技术与网络技术的迅猛发展,信息与网络的安全形势也日趋严峻和复杂化。
To do research on the information network security technology and standard and develop the relevant security products and to be engaged in the security service work.
进行信息网络安全技术和标准的研究,开发相应的安全产品,并从事安全服务工作。
This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.
本课题在现有的网络通信技术、数据库技术和信息安全技术的基础上设计并实现了新型的安全即时通信系统。
This paper first introduces the actuality of network security, intrusion detection technology and CORBA, then puts foward the structure of a distributed intrusion detection system based on CORBA.
本文首先简要介绍网络安全现状、入侵检测技术和CORBA 技术,然后给出应用CORBA建立的分布式入侵监测系统体系结构。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
With the wide application of computer and network technology on libraries, the security problem of the library information network becomes unavoidably more and more important.
随着计算机及网络技术广泛应用于图书馆,使得图书馆信息网络安全问题成了不容回避的重要课题。
Regaining the initiative of computer safe protection is required for Information Age. People pay more attention to network security tactics based on cheating technology.
信息时代的到来需要计算机安全防护由被动防御转向主动,因此基于欺骗的网络安全策略日益受到重视。
Second, from the use of the technology , it discusses detailedly the three-tier structure, J2EE framework, GPRS communications, GPS positioning, enterprise portal, network , security , and so on.
其次从系统建设所用到的技术入手,对三层架构、J2EE框架、GPRS通讯、GPS定位、企业门户网站、网络与安全等方面进行了详细探讨。
The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.
主要介绍网络安全准入控制系统组成及相关技术,并对该技术在铁路信息系统中如何应用加以探讨。
Nowadays, network intrusion and attack affairs happen frequently, which makes people pay more attention on the spot of network security management technology.
当前网络入侵事件不断发生,使得网络安全管理技术成为当今人们关注的热点。
Starting from the computer network security and the commercial trade security, basing on the technology of network security and commerce security, this paper is presenting the security system model.
从电子商务系统对计算机网络安全,商务交易安全性出发,在分析网络安全技术和交易安全技术的基础上,给出了一种保证电子商务安全的体系结构。
But it did put the focus on content filtering, a network security technology that observers say has been undervalue d.
但它确实使人们的注意力集中到内容过滤上,这是一项观察家们认为以往被低估了的网络安全技术。
This paper discusses on the problem of realizing the information security of network communication by using DES and RSA hybrid encryption technology.
探讨了采用DES和RSA混合加密方式来实现计算机网络通信中的信息安全的问题。
The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.
本文中所设计的网络安全监测模型,以当今流行的入侵检测技术为主要方法,采用实时的基于NIDS的技术。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
Mobile IP is a mobile solution on the network layer. More and more attentions are paid to the security and the application of Mobile IP technology.
移动IP是一种网络层的移动解决方案,它的安全与应用成为人们最为关注的问题。
Based on the inspection of the new factory, we designed a powerful and advanced security system which is based on digital network technology.
本文通过对新厂区的实地考察,设计了一套基于数字网络技术的功能强大、技术先进的安全防范系统。
For the current mixed-type attacks on an endless stream of security threats, traditional network security based on a single device protection technology has become powerless.
对于当前混合型攻击层出不穷的安全威胁,传统的基于单一设备的网络安全防护技术己显得无能为力了。
With the advent of the network society and the growing popularity of e-commerce, traditional system security technology which depends on token or password has been facing serious challenges.
随着网络社会的到来与电子商务的日趋普及,传统的依赖信物或口令的系统安全性技术已经面临严峻的挑战。
On the platform, the paper analyzes the component technology, middleware technology, data storage and backup technology, load balancing technology and network security technology.
在平台建设技术方面分析了构件技术、中间件技术、数据存储备份技术、负载均衡技术和网络安全技术及相应的标准。
Intrusion detection system is an indispensable part of network security. IDS evaluation and testing may discover the weakness of current technology and thus improve on them.
入侵检测系统是网络安全的重要组成部分,入侵检测系统的评测分析能发现技术的不足及为研究提供改进的方向。
Security and management on Internet are meeting the new challenge because the application of P2P technology is based on its own flexible network structure.
由于P 2 P应用基于自组织的弹性的网络结构,对网络的安全和管理带来了新的挑战。
Companies without any security at all on their wireless networks make it risibly easy for hackers to break in. Switching on the security that comes with the network technology should be automatic.
无线网没有任何安全措施的公司会让黑客轻而易举地攻破,因此采用网络技术确保安全是必然的。
Since the rapidly development of the computer network and communication technology, the security of data that transfer on the network attracts more and more attentions.
在计算机网络与通讯技术飞速发展的今天,网络上传输的数据的安全性成为人们日益关注的问题。
This paper focuses on the key technology and control of this system's development, voice card programming technology, as well as the network and security with its application in practice.
论文重点阐述了本系统开发的关键技术和控件、语音卡编程技术、网络和安全技术及其在实际中的应用。
This paper focuses on the key technology and control of this system's development, voice card programming technology, as well as the network and security with its application in practice.
论文重点阐述了本系统开发的关键技术和控件、语音卡编程技术、网络和安全技术及其在实际中的应用。
应用推荐