• First, that security depends on a combination of technology and policy; and second, that no system is ever totally secure.

    第一安全依赖技术政策联合体第二永远没有完全安全系统

    youdao

  • The purchase is designed to provide Thales with key technology bricks needed to offer a system of systems capability in maritime safety and security, a Thales spokesman said.

    泰利斯公司发言人称,此次购买协议将泰利斯公司提供关键技术基础,从而海上安全和保卫方面提供系统系统能力

    youdao

  • Network services requiring security and availability should benefit from this powerful operating system technology.

    需要确保安全性可用性网络服务应该受益这种强大的操作系统技术

    youdao

  • The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.

    网络系统主要安全技术数据加密RSA算法密钥系统安全的一种体制

    youdao

  • To appropriate hardware and software redundance technology and safety chunnel could improve the security of computer system.

    采用硬件、软件冗余技术安全输出通道,可极大地提高计算机系统安全性能。

    youdao

  • This paper make some study to relevant key technology of honeypot, have a certain and positive effect on better arrangement online security defence system.

    本文对蜜罐中的相关关键技术了一些研究,对于更好布置网络安全防御体系起着一定积极作用

    youdao

  • All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.

    这些导致企业无法成熟IT信息安全技术直接应用于工业控制系统信息安全保护

    youdao

  • The information security guarantee system framework can be divided into the security management framework and the security technology framework.

    为了系统地、完整地构建企业信息安全保障体系,考虑技术体系管理体系共同构建。

    youdao

  • The principle of opening, integration, stability, and security of the system is strictly observed because of the adoption object-oriented technology and multi-language programming technology.

    坚持系统开放性集成性稳定性安全性原则,采用流行的面向对象技术多种语言混合编程技术实现。

    youdao

  • The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology.

    本文介绍安全电子邮件系统通过信息安全技术传统的电子邮件系统进行扩展完善。

    youdao

  • The researching key point in the paper is the design and realization of the packet filter technology in individual security defense system.

    本文研究重点是个安全防御系统过滤技术设计实现

    youdao

  • Technical constructions of technical prevention are: the use of RFID technology, perfect security system, and the introduction of functional music.

    技术性预防方面技术性建设主要运用RFID技术完善安检制度引入功能音乐等等

    youdao

  • Consider the effectiveness of the company's internal control system, including information technology security and control.

    评价公司内部控制系统有效性包括信息技术安全和控制。

    youdao

  • It is the advanced network technology in the ERP system, so the information security is important for the ERP system.

    ERP系统中运用了先进网络技术,也正因为如此,ERP系统信息安全问题也是ERP系统正确实施而必须解决的问题。

    youdao

  • However, because of the particularity of information technology and the inherence of safety problem, the problem of system security becomes more and more important.

    然而由于信息技术本身特殊性以及安全问题固有性,信息系统安全问题显得越来越重要

    youdao

  • With the widely application of the computer network communication technology in the power secondary system, network security problems become more and more striking.

    随着计算机网络通信技术电力二次系统中的广泛应用,网络安全问题越来越突出。

    youdao

  • Therefore, the existing technology, how to build a reliable campus network security system, it became the campus network management personnel are an important topic.

    因此现有技术条件下,如何构建相对可靠的校园网络安全体系成了校园网络管理人员一个重要课题。

    youdao

  • Some research point out, the majority of network security threatens from the system interior, so we are urgent need to use one kind of new measure and the technology safeguard the network security.

    研究指出大部分网络安全威胁来自系统内部,因此,我们迫切需要采用新的措施技术保障网络的安全。

    youdao

  • The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.

    通过设置密码蓝牙技术安全机制提供信息家电网络远程控制系统的安全保障

    youdao

  • With the extensive application of computer network technology, security problem could not be ignored. Computer network, as an open system, has to face up to various threats and attacks.

    随着计算机网络技术广泛应用网络安全问题不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。

    youdao

  • In the information security, the status authentication technology holds the extremely important status, is the information security system first checkpoint.

    信息安全中,身份认证技术据有极其主要位置信息安全体系的第一个关卡。

    youdao

  • PKI is the latest information security technology in the world, and trust model is very important in PKI system.

    PKI目前国际上研究最热信息安全技术信任模型PKI体系中占有重要地位。

    youdao

  • Therefore, the most urgent key project for us to study is to solve how to take advantage of security technology precaution, to construct an effective multiple precaution panic alarm system.

    因此如何利用安全技术防范优势,构建有效的社区安全防范综合报警服务体系,就成了当前迫切需要研究解决重要课题

    youdao

  • The key technology of the network and information security prototype system is studied, the network and information security test platform is introduced, and the testing methods are explained.

    主要研究了网络信息安全原型系统中的关键技术介绍了网络与信息安全测试平台的组成,阐述测试方法

    youdao

  • In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.

    本文通过CORBA中间件技术实现基于策略安全信息系统从而解决棘手问题。

    youdao

  • But the capability of single security technology or security product (security component) is limited, which can only meet specific security need of system and network.

    但是单个安全技术或者安全产品(安全部件)功能和性能其局限性,只能满足系统网络特定的安全需求

    youdao

  • Some literature named this technology of protection data and prevention of the illegal data accessing as the computer security or the system security technology.

    有些文献这些保护数据阻挡非法数据访问技术统称计算机安全系统安全技术。

    youdao

  • Enterprise portal technology provided stable, flexible and reliable security base and structure for enterprise information system.

    企业门户技术是为企业的信息系统提供稳定可伸缩可靠安全基础框架结构

    youdao

  • The software infrastructure and information security technology have been summarized to indicate the feasibility of this software system.

    同时软件构架以及信息传输安全性等关键技术总结,表明系统实现可行性

    youdao

  • The software infrastructure and information security technology have been summarized to indicate the feasibility of this software system.

    同时软件构架以及信息传输安全性等关键技术总结,表明系统实现可行性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定