英语人>网络例句>network security 相关的网络例句
network security相关的网络例句

查询词典 network security

与 network security 相关的网络例句 [注:此内容来源于网络,仅供参考]

With the Internet and computer network technology to be flourishing, network security that has been widely concerned.

随着 Internet 和计算机网络技术的蓬勃发展,网络安全问题现在已经得到普遍重视。

But the application of the high-speed network brings a new challenge to network security.

然而,千兆高速网络的应用又给网络安全提出了新的挑战和更高的要求。

High-speed network monitoring is a basic measure to guarantee the network security.

高速网络监控是保障高速网络安全的基本措施之一。

For network security, people will naturally think of offensive and defensive – of the behavior of hackers showdown, while the network of step with the development of safe behavior gradually become a popular focus of attention, while the so-called hackers – using intelligence to challenge the limits of the crowd, as the protagonist and the interpretation of the Internet revolution, but most of the so-called hacker was just that the sense of the word hacker, but rather the punishment not the impulsive and play, hackers, and perhaps the same as Honker, or do not, it is also the behavioral characteristics of attitudes and ideas!

对于网络安全,人们就自然联想到攻防–黑客的行为对决,而随网络大步发展,安全行为逐渐成为热门关注的焦点,而所谓的黑客-用智力去挑战极限的人群,作为主角而演绎网络革命,但大部分的所谓的黑客只是现实意义上的骇客而已,而并非冲动性的惩罚和玩耍,黑客和红客或许一样,那同样是态度和观念的行为特征!

With the rapid development of network technology, network security has become increasingly important.

随着网络技术的飞速发展,网络安全问题日益重要。

In addition, this paper presents the initial solution scheme for network management and network security.

最后,本论文给出了基于局域网的消防信息应用系统软件的设计。

In the meantime, this paper present the initial solution scheme for network management and network security.

同时,本文对网络管理和网络安全策略提出了初步方案。

The limitation of the existing two methods for network security management systems is showed as the following: the cut-set method cannot analyze large network, and the Monte-Carlo method gives only the interzone evaluation, but not accurate results.

现存的两种评估网络安全管理系统的生存性的方法存在较大局限性:割点法无法对大型网络进行分析;Monte-Carlo法只能区间估计,得不到准确值。

In this paper,the design of network security monitor system based on network intrusion system is introduced.

本文介绍了基于网络入侵检测系统的网络安全监测系统的设计。

IP packet interception mechanism is a network performance analysis tools and network security tools to achieve.

IP数据包截获机制是网络性能分析工具和网络安全工具的实现基础。

第10/63页 首页 < ... 6 7 8 9 10 11 12 13 14 ... > 尾页
推荐网络例句

The split between the two groups can hardly be papered over.

这两个团体间的分歧难以掩饰。

This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.

这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。

The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.

聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力