While those new business enriched our life, the security of the network was an emerged problem.
这些新业务在丰富人们生活的同时,自身的安全问题也日益暴露出来。
Intrusion detection is an essential component of information security protection system, which guarantees the security of the network resource.
入侵检测是信息安全保护体系中的一个重要组成部分,确保计算机网络资源的安全性。
The model of the DMZ is adopted to manage the network topology and SSL authentication system is used to strengthen the security of the network information.
在网络拓扑上主要采用DMZ管理区模式,通过SSL认证系统加强网络信息安全防护。
This paper introduces the functions and operation structure of meteorological information network, and analyzes several measures for protecting the security of the network.
介绍了气象信息网络的功能与运行结构,并分析了几种网络安全防护措施。
In order to better protect the security of the network hosts, we need to detect the host's security first, and find out what kind of security problem existing in the hosts.
为了更好的保护网络主机的安全,首先需要检测主机的安全性,发现主机存在怎样的安全问题。
This paper advances the security target of the electronic commerce network payment system on the basis of having elaborated the question about the security of the network payment system.
本文在阐述电子商务网上支付系统安全性问题的基础上,提出其所要达到的安全目标。
It's hard to stay ahead of the game in network security when the landscape is constantly changing.
当形势不断变化时,在网络安全领域保持领先地位是困难的。
To guarantee security of the messages traveling over the network, the client mode must be configured to support SSL and J2C authentication alias.
为了保证在网络上传输的消息的安全,必须将客户机模式配置为支持ssl和j2c身份验证别名。
The J2EE Server provides for network communications and security that can be configured to the needs of the system.
J2EE服务器为网络通信和安全性提供支持,它们可以根据系统需求进行配置。
SSO can also improve the productivity of network users, reduce the cost of network operations, and improve network security.
SSO还可以提高网络用户的生产力,减少网络操作的成本,增强网络安全性。
The security model requires only that each of the components can be identified in an interaction, which can be achieved at network architecture level or through use of generic application identities.
安全模型仅要求能够在交互中标识每个组件,这可以在网络体系结构级别或通过使用通用应用程序标识实现。
Additional factors that can complicate the deployment of tools are the company's network structure and security policies.
其他的可能使得工具部署复杂化的因素是公司的网络结构及安全规则。
This paper analyzes packet capturing principle in detail combined with the structure and functions of the software and introduces its application in designing a network security and watch system.
文中结合该软件包的结构与功能对包捕获原理进行了详细的分析,并介绍了其在网络安全监控系统中的应用。
Although DB2 provides a sufficient level of security to safeguard the data over the network, it requires administrators to configure the DB2-specific authentication modules.
虽然DB 2提供了足够级别的安全性来确保数据在网络上的安全,但是仍然需要管理员配置DB 2特有的身份验证模块。
Most of the solutions exercising multifactor as well as multi-layer authentication make use of the same underlying network security mechanism.
大多数实现多因素身份验证和多层身份验证的解决方案使用相同的底层网络安全机制。
Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.
可以通过策略实现安全措施(包括对部分网络的访问)或控制服务质量。
Authentication, authorization, privacy, integrity, and non-reputation are the major security components of software or a software-based solution working over the network.
在通过网络运行的软件或软件解决方案中,身份验证、授权、私密性、完整性和不可否认性是主要的安全组件。
This again serves to emphasize the earlier point that focusing security solely on keeping the intruders out of the network is insufficient.
这再次强调了前面提到的观点:仅仅防御来自网络外部的攻击者是远远不够的。
The overall security of a network is only as strong as its weakest link, and in a mobile-commerce network the weakest link is the client-side device.
网络总体安全性的强度取决于其最薄弱的环节,而在移动商业网络中,最薄弱环节是客户机端设备。
Despite its advantages, most of the solutions exercising multifactor as well as multi-layer authentication make use of the same underlying network security mechanisms.
尽管多因素身份验证和多层身份验证是有优势的,但是大多数解决方案使用相同的底层网络安全机制实现它们。
Requesters can authenticate recipients using network and transport-provided security, claims proven in messages, and encryption of the request using a key known to the recipient.
通过网络和由传输提供的安全性、消息中已批准的声明,以及用收件人已知的密钥对请求进行加密,请求者可以对收件人进行身份验证。
This again serves to emphasize the earlier point that security that is focused solely on keeping the intruders out of the network is insufficient.
这再次强调了前面提到的仅仅防御来自网络外部的攻击者是远远不够的。
The program's suite of security techniques will ensure that the network is limited to authorized users and is extremely difficult to spoof or to introduce false traffic.
该项目的一整套安全技术将确保网络仅限授权用户使用,很难遭遇网络欺诈或引入虚假流量。
You're so preoccupied with configuring your file systems properly and ensuring the security of your systems that you might routinely forget that the N in NFS stands for network.
您太过专注于合理配置文件系统和确保系统的安全性,因而可能经常忘记NFS中的N代表网络。
Beyond this, you should consider the security requirements of your build server and its network and explore some of the security tools that Linux provides.
除此之外,还应当考虑构建服务器和构建服务器所在网络的安全需求,并尝试Linux提供的一些安全工具。
The architecture of the application doesn't match our { storage, network, deployment, security } model
这款产品的体系结构跟我们的{存储,网络,部署,安全}模型不匹配。
WebSEAL forms the basis of the network topology by providing proxy and security services, while the Web 2.0 feature pack provides the application libraries to create Ajax styled Web applications.
WebSEAL通过提供代理和安全服务形成了网络拓扑的基础,而Web 2.0功能部件包则提供了应用程序库来创建Ajax风格的 Web应用程序。
WebSEAL forms the basis of the network topology by providing proxy and security services, while the Web 2.0 feature pack provides the application libraries to create Ajax styled Web applications.
WebSEAL通过提供代理和安全服务形成了网络拓扑的基础,而Web 2.0功能部件包则提供了应用程序库来创建Ajax风格的 Web应用程序。
应用推荐