英语人>网络例句>network security 相关的网络例句
network security相关的网络例句

查询词典 network security

与 network security 相关的网络例句 [注:此内容来源于网络,仅供参考]

In this paper,we simply introduces the whole design scheme of security network access server; subsequently, we deeply analyse the principle and structure model of RADIUS and TACACS in the distributed security authentication system, and more explain the idea and implementation of design. On the other hand, in order to authencating、authorizing and accounting more securely, efficiently and accurately to the remote users, we put forward a series of key techniques which are used in analysis such as MD5 encryption arithmetic、packet retransfer、buffer storage、interprocess communication and so on, and prove the compatibility of the system through employing the commercial software Shiva AccessManager.

本论文首先简要介绍了《安全网络访问服务器》的总体设计方案;之后,深入分析了分布式安全认证系统RADIUS和TACACS的原理与结构模型,并进一步详细阐述了安全认证模块的设计思想和实现,深入剖析了系统中引用的MD5加密算法、数据包重发机制、缓冲区存储、进程间通信等技术,这些技术使得系统能安全、高效、准确地对远程用户进行认证、授权和计费,而且通过使用商用软件Shiva AccessManager的测试验证了该系统的通用性。

Companies without any security at all on their wireless networks make it risibly easy for hackers to break in. Switching on the security that comes with the network technology should be automatic.

无线网没有任何安全措施的公司会让黑客轻而易举地攻破,因此采用网络技术确保安全是必然的;网络公司版权申明:本站网络公司文章均来自网络。

The supporting technologies of network information security are summarized. The unitive authentication systems existing are analyzed in this paper; their virtues and shortcomings are discussed.2. About the distributed peculiarities of allied resource, the concept of alliance grid is established. The access control model of alliance grid is established by directive ideas of access control security of alliance grid. AG-RBAC model is set up in the basic of common RBAC, interbedded relations between roles are set forth.

针对制造联盟企业资源分布式的特点,提出了联盟网格的概念;根据联盟网格安全访问控制的指导思想,提出了联盟网格访问控制模型;在一般RBAC模型的基础上提出了基于角色的联盟网格访问控制模型,清晰的表述了角色之间的层次关系;初步分析了AG-RBAC的实现模式,重点讨论了角色定义和权限配置的实现方法。

The analysis results show that this scheme doesn't need additional memory space and increases the probability that neighbor nodes have the same key space. Compared with the pairwise key predistribution scheme, this scheme can increase the threshold of captured nodes and improve the security of WSN, and fits the network environment and meets the security requirements of WSN.

分析表明,该方案在不增加存储空间的情况下,提高了邻居节点拥有相同密钥空间的概率,并且与多密钥空间密钥对预分布方案相比,可大幅提高被俘节点的阈值,增强了网络安全性,能够较好地适应无线传感器网络的网络环境和安全要求。

Henan modern electronic machinery is based on the Henan Institute of Science and Technology Committee of Henan Branch of the word [1999] on the 1st of the cultural spirit of the establishment of a scientific research institutions, the registered capital of 5.1 million yuan, the Chinese Society of optoelectronic and electronic LED display quality sentinel Detection units, with the Ministry of Information Industry national computer information system integration four qualifications, Henan Province Public Security Department security technology to prevent three qualities, scientific and technological projects in Henan Province units, mainly engaged in LED displays and LED Miner'slamp, and other related products, computer software development And network engineering, anti-theft alarm and video surveillance networks, and other electronic machinery and new materials, new technologies, new product development, development of new materials, new technologies, new product development, development and application.

河南省现代机械电子研究所是依据河南省科学技术委员会豫科条字[1999]01号文化精神设立的一家科学研究机构,注册资金510万元,中国光电学会会员及LED电子显示屏定点质量检测单位,具备国家信息产业部计算机信息系统集成四级资质,河南省公安厅安全技术防范三级资质,河南省科技攻关项目承办单位,主要从事LED显示屏与LED矿灯等相关产品、计算机软件开发与网络工程、防盗报警网络与视频监控,以及其它机械电子类新材料、新技术、新产品的研制、开发类新材料、新技术、新产品的研制、开发与推广应用。

Most security policies state that, to access a network and its services, a user must enter a login ID and a password that a security server authenticates.

大多数安全策略都规定,为访问网络及它的服务,用户必须输入自己的登陆ID和密码,供安全服务器进行身份验证。

With the increasingly development of Network Technology, the data must be enciphered to protect from being intercepted or modified. So, the security of Computer Data Communication became a focus of our society, which leads to the development of encryption and deciphering technique of Computer Data Communication Security.

随着网络技术的不断发展,为了保护数据在传递过程中不被别人窃听或修改,我们必须对数据进行加密,从而计算机数据通信的安全问题也就成为当今网络社会的焦点,也自然导致了加密、解密等一系列关于计算机数据通信安全技术的产生和发展。

All the ways such as VLAN, export router, IPv6, security policy, hardware firewall, anti virus software of net work-edition and management of information security are applied to the project to implement the optimization and revamps of campus network topology structure and the updating of the overall performance.

以青岛职业技术学院校园网二期改造工程为背景,根据国际化标准,研究了校园网设计原则,在分析了学院校园网一期工程性能缺陷和示范院校建设新需求的基础上,从功能扩展、网络安全及管理等各个方面进行了整体方案设计,详细研究了网络各层设计及设备选型,采用VLAN、出口路由处理、IPv6技术、安全策略、硬件防火墙、网络版防病毒软件以及各种信息安全管理等技术与手段,实现了校园网络拓扑结构的优化改造和整体性能的升级。

Secondly, aiming at the difficulty of information sharing between reheating furnace and roughing mill which is brought by the separate control of the two facilities, and the problems of exceeding energy consumption and low security of rolling process given by the difficulty to adjust the heating process of slab dynamically, this paper presents a comprehensive optimizing control strategy of reheating furnace based on the rolling information feedback. In the presented strategy, fuzzy control and neural network are used to feed roll force and slab temperature of therolling process back to reheating furnace and the concrete furnace temperature setting compensation value can be worked out. So that the heating process of slab can be adjusted dynamically according to the heating quality of the slab, and energy consumption can be reduced, the rolling security can be ensured as well.

其次,针对目前加热炉和粗轧机的分离控制带来的生产信息难以共享、钢坯的加热过程难以动态调整而造成的能耗浪费过大、粗轧机轧制安全难以保障等问题,提出了基于轧制信息反馈的加热炉综合优化控制策略,利用模糊控制和神经网络的方法,将粗轧机一侧的能够反映钢坯加热质量好坏的生产信息,如粗轧机的轧制力、钢坯的温度等,反馈到加热炉一侧并计算出炉温设定值的补偿量,从而能够根据钢坯的加热状况动态地调整后续钢坯的加热过程,减少了能耗浪费,保障了轧制安全。

In security, the related theory, system security, focusing on computer viruses, network attacks, firewalls, honeypots, anti-virus process of analysis of the typical model of the principle.

在安全防护上,涉及系统安全理论,侧重计算机病毒、网络攻击行为、防火墙、蜜罐、杀毒过程等典型模型的原理分析。

第34/63页 首页 < ... 30 31 32 33 34 35 36 37 38 ... > 尾页
推荐网络例句

The split between the two groups can hardly be papered over.

这两个团体间的分歧难以掩饰。

This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.

这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。

The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.

聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力