查询词典 network security
- 与 network security 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Internet security issues include DDOS attacks, domain name hijacking, Trojan program, control of zombie host, webpage defacement and network spoofing.
互联网安全问题包括DDOS攻击、域名劫持、木马和僵尸控制主机、网页篡改、网络仿冒等。
-
The security of an electronic defrayal communications network system is the fundamental problem of implementing electronic business .
电子支付网络系统中的保密通信问题是实现安全电子交易的核心问题。
-
If the operator does not grasp now market development this trend, cannot manage the modernized management to take develops diligently goal, if the operator does not grasp the market development this to be unable to cause the management detachably now, the source of wealth to be luxuriant, uses the advanced data bank administration software management, may solve puzzle enterprise information questions and so on work security, reliability, single plane/Uses under the advanced number network environment the running rate to be quicker, the performance is stapler, data exchange speed even more quickly, accurate, running rate to be possible to hold the many client side concurrent operation quickly.
在此基础上现在有很多的商品批发商还是用手工出货,进货,计算,统计,那么成本方面和效率方面一定不高,如果达到以最小的成本得到最大的利润,那么一定需要选择科学,自动的管理方式。经营者如果不掌握当今市场发展的这一走向,就不能将现代化经营方式作为努力开拓的目标,就无法科学经营管理,让自己财源茂盛。如果采用先进的数据库管理软件管理,可以解决困扰企业信息化工作高成本、低产出、安全性、可靠性等问题,计算机/网络的管理软件运行速度快,性能更稳定,数据交换速度更加快捷、准确,可容纳多个客户端同时操作。
-
SET agreement is directed for the safe and effective bankcard trade on the open network jointly developed by Visa and Mastercard, offers security on the senior level for payment trade of the bank card on Internet and guarantee against swindle.
SET协议是针对开放网络上安全、有效的银行卡交易,由Visa和Mastercard联合研制的,为Internet上银行卡的支付交易提供高层的安全和反欺诈保证。
-
Finally, from a functional choice, preferred to have the firewall and DMZ demilitarized zone management products, to ensure the security of local area network.
最后,从功能上选择,可优选具备防火墙和DMZ非军事区管理的产品,以保证局域网的安全。
-
The expert reminds the information safety of center of Chinese finance attestation say, want silver-colored security of net of rational look upon, what at present domestic network silver cast off pair of Zhang date and password already is pure depend on, use the attestation method of double element, much element generally, Want to take significant step only, the bank on the net can be at ease use.
中国金融认证中心的信息安全专家提醒说,要理性看待网银安全,目前国内网银早已摆脱了对账号和密码的单纯依赖,普遍采用双因素、多因素的认证手段,"只要采取有效的措施,网上银行可以放心使用。"
-
At the same time in the second generation ID card industry applications, e-mail security gateway, visit the experts electricity, batteries, MODEM, IC smart cards, network and communication excellent power and other fields have achieved excellent results.
同时在第二代身份证行业应用、邮件安全网关、电访专家、电池、MODEM、IC智能卡、网优及通信电源等领域取得了优异的成绩。
-
At first, this paper studies the structure and security situation of electric enterprises information network, then introduces the basic theory of intrusion tolerance. After that, we study the key technology of intrusion tolerance: set up a distributed intrusion detection system model based on mobile agent; study the object replication technology and improve the voting algorithm; analyze and research the elliptic curve encryption system.
论文首先研究了电力企业信息网络结构以及安全现状,接着介绍了入侵容忍的基本理论,然后着重研究了入侵容忍的关键技术:建立了一种基于移动Agent的分布式入侵检测系统模型;研究了对象复制技术,改进了表决算法;分析和研究了椭圆曲线加密体制。
-
In computer security, especially specifies embezzlement with the aim of or directly using a computer and / or network.
在计算机安全学中,特指利用计算机和/或网络进行的贪污行为。
-
Key management is the core problem of network system security, which deals with the correlative problems from key being generated to ultimately destroyed; it includes system initialization, key generation, key encasement, key distribution, key storage, key renovation, key destruction, etc. Thereinto key distribution and key storage are the two most intractable taches of key management.
密钥管理问题是网络系统安全中首要的核心问题,它是处理密钥自产生到最终销毁的整个过程中的有关问题,包括系统的初始化,密钥的产生、装入、分配、存储、更新、吊销和销毁等内容,而密钥的分配和存储是密钥管理中最为棘手的两个环节。
- 推荐网络例句
-
The split between the two groups can hardly be papered over.
这两个团体间的分歧难以掩饰。
-
This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.
这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。
-
The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.
聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力