Some literature named this technology of protection data and prevention of the illegal data accessing as the computer security or the system security technology.
有些文献将这些保护数据、阻挡非法数据访问的技术统称为计算机安全或系统安全技术。
With the advent of the network society and the growing popularity of e-commerce, traditional system security technology which depends on token or password has been facing serious challenges.
随着网络社会的到来与电子商务的日趋普及,传统的依赖信物或口令的系统安全性技术已经面临严峻的挑战。
First, that security depends on a combination of technology and policy; and second, that no system is ever totally secure.
第一,安全依赖于技术和政策的联合体。第二,永远没有完全安全的系统。
The purchase is designed to provide Thales with key technology bricks needed to offer a system of systems capability in maritime safety and security, a Thales spokesman said.
泰利斯公司发言人称,此次购买协议将为泰利斯公司提供关键技术基础,从而在海上安全和保卫方面提供系统之系统能力。
Network services requiring security and availability should benefit from this powerful operating system technology.
需要确保安全性和可用性的网络服务应该会受益于这种强大的操作系统技术。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
To appropriate hardware and software redundance technology and safety chunnel could improve the security of computer system.
采用硬件、软件冗余技术与安全输出通道,可极大地提高计算机系统的安全性能。
This paper make some study to relevant key technology of honeypot, have a certain and positive effect on better arrangement online security defence system.
本文对蜜罐中的相关关键技术做了一些研究,对于更好的布置网络安全防御体系起着一定积极作用。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
The information security guarantee system framework can be divided into the security management framework and the security technology framework.
为了系统地、完整地构建企业信息安全保障体系,应考虑技术体系和管理体系共同构建。
The principle of opening, integration, stability, and security of the system is strictly observed because of the adoption object-oriented technology and multi-language programming technology.
坚持系统的开放性、集成性、稳定性和安全性原则,采用了流行的面向对象技术及多种语言混合编程技术实现。
The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology.
本文介绍的安全电子邮件系统通过信息安全技术对传统的电子邮件系统进行扩展和完善。
The researching key point in the paper is the design and realization of the packet filter technology in individual security defense system.
本文研究的重点是个人安全防御系统中包过滤技术的设计与实现。
Technical constructions of technical prevention are: the use of RFID technology, perfect security system, and the introduction of functional music.
技术性预防方面的技术性建设主要有:运用RFID技术,完善安检制度,引入功能音乐等等。
Consider the effectiveness of the company's internal control system, including information technology security and control.
评价公司内部控制系统的有效性,包括信息技术安全和控制。
To the question, the paper presents a system evaluation method and software based on the evaluation Criteria for Information Technology Security (Common Criteria).
针对这个问题,设计实现了基于信息技术安全性评估准则(通用标准)的系统评估方法和软件。
It is the advanced network technology in the ERP system, so the information security is important for the ERP system.
ERP系统中运用了先进的网络技术,也正因为如此,ERP系统中信息的安全问题也是ERP系统正确实施而必须解决的问题。
However, because of the particularity of information technology and the inherence of safety problem, the problem of system security becomes more and more important.
然而,由于信息技术本身的特殊性以及安全问题的固有性,信息系统的安全问题显得越来越重要。
With the widely application of the computer network communication technology in the power secondary system, network security problems become more and more striking.
随着计算机网络通信技术在电力二次系统中的广泛应用,网络安全问题越来越突出。
Therefore, the existing technology, how to build a reliable campus network security system, it became the campus network management personnel are an important topic.
因此,在现有的技术条件下,如何构建相对可靠的校园网络安全体系,就成了校园网络管理人员的一个重要课题。
Some research point out, the majority of network security threatens from the system interior, so we are urgent need to use one kind of new measure and the technology safeguard the network security.
有研究指出,大部分的网络安全威胁来自系统内部,因此,我们迫切的需要采用一种新的措施和技术来保障网络的安全。
The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.
通过设置密码和蓝牙技术的安全机制,提供了信息家电网络和远程控制系统的安全保障。
In the information security, the status authentication technology holds the extremely important status, is the information security system first checkpoint.
在信息安全中,身份认证技术据有极其主要的位置,是信息安全体系的第一个关卡。
PKI is the latest information security technology in the world, and trust model is very important in PKI system.
PKI是目前国际上研究最热的信息安全技术。信任模型在PKI体系中占有重要地位。
The key technology of the network and information security prototype system is studied, the network and information security test platform is introduced, and the testing methods are explained.
主要研究了网络与信息安全原型系统中的关键技术,介绍了网络与信息安全测试平台的组成,阐述了测试方法。
In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.
本文通过CORBA中间件技术,来实现基于策略的安全信息系统,从而解决这一棘手问题。
But the capability of single security technology or security product (security component) is limited, which can only meet specific security need of system and network.
但是,单个安全技术或者安全产品(安全部件)的功能和性能都有其局限性,只能满足系统与网络特定的安全需求。
The software infrastructure and information security technology have been summarized to indicate the feasibility of this software system.
同时对软件构架,以及对信息传输安全性等关键技术作了总结,以表明系统实现的可行性。
As a security technology, WLAN intrusion detection technology plays an important role in the security of the WLAN network and system.
WLAN入侵检测技术作为一项安全技术,在保证WLAN的网络和系统安全性上起着非常重要的作用。
As a security technology, WLAN intrusion detection technology plays an important role in the security of the WLAN network and system.
WLAN入侵检测技术作为一项安全技术,在保证WLAN的网络和系统安全性上起着非常重要的作用。
应用推荐