第5章 数据库保护 5.1 教材(summarize) 5.2 安全保护(security protection) 5.3 完整性保护(integrality protection) 5.4 事务及事务特性(transaction and it's characteristics)5.5 并发控制技术(technology of control simultaneously) 5.6 数据...
基于16个网页-相关网页
To keep the authenticity and integrality of the world heritage is the responsibility of each member who belongs to the Protection of the World Cultural and Natural Heritage Convention.
保护世界遗产的真实性和完整性,是每一个《保护世界文化和自然遗产公约》缔约国应尽的责任。
It is the identification? The encryption protection of transmission and storage? Integrality and undeniability in information network security that need to use password technology to be solved.
密码技术是解决信息网络安全的关键技术,信息网络安全中的身份认证,传输和存储信息的加密保护、信息完整性和不可否认性等,都需要运用密码技术来解决。
The last part introduces the application of encryption protection, (identity) identification, information integrality and figure signature.
最后介绍了加密技术在信息加密保护、身份识别、信息完整性和数字签名中的应用。
应用推荐