英语人>网络例句>network security 相关的网络例句
network security相关的网络例句

查询词典 network security

与 network security 相关的网络例句 [注:此内容来源于网络,仅供参考]

In addition to providing basic services other than GPS, but also to provide remote video monitoring video, communications equipment, security equipment, digital home, ERP, GIS, 3G, multimedia and other value-added services, with "China GPS Operations Center","Jianfeng vehicle network "," hypermetropia pass "," STARSOFT stars soft "and other famous brands.

除提供基本GPS业务以外,还提供远程视频监控录像、通信器材、安防器材、数字家庭、ERP、GIS、3G、多媒体等多种增值业务,拥有"中国GPS运营中心"、"剑峰车网"、"远视通"、"STARSOFT星软"等著名品牌。

This paper mainly studies the financial crisis that under the background of the financial network, this paper studies the impact of China's financial security and financial supervision of the new direction of development.

本论文主要研究金融危机的背景下金融网络化所受到的影响,着重研究我国金融安全和金融监管的新的发展方向。

So the most important thing is detecting and controlling the worm in time for the security of network.

对人们的正常工作和社会的安定都造成了巨大的危害,因此如何对网络蠕虫进行及时准确的检测和控制,已成为网络安全领域的一个重要课题。

We have a lot of security technology in the network.

我们在网络中有许多安全技术。

Network information stream, similar to the blood in human being, can function as the indicator of security and health status.

血液成份的变化反映了人体健康状态的改变,借鉴医学中的血液检查机制诊断网络的健康状态,提出了基于血检机制和网络信息流分析的网络健康状态分析框架BETA。

Under the condition of making the best of informationization resource inexistence, it made detail design to computer network, system platform of software and hardware, database management system, operation management function module and security safeguard system.

在充分利用现有信息化资源的约束条件下,对计算机网络及系统的软硬件平台、数据库管理系统、业务管理功能模块和安全保障系统作了详细设计。

Intrusion detection systems are an integral and necessary element of a complete information security infrastructure performing as "the logical complement to network firewalls."

入侵检测系统是信息安全平台的必要和不可或缺的组成部分,担任着网络防火墙的逻辑构成的角色。

Jakes channel model in a WSN real network space is established with NS-2 software. Using this model, security of S-LAECH is verified.

最后在NS-2软件中建立了WSN真实网络空间的Jakes信道模型,利用该模型验证了S-LEACH协议的安全性。

The key technologies used to support self-organizing of IP based base stations involve several aspects, including self-organizing of base stations on demand, joint radio resource scheduling mechanism, routing, security and network management.

支持IP化基站自组织的关键技术包括按需的基站自组织技术、联合无线资源调度机制、路由技术、安全技术、网络管理技术等。

network teaching ; public key system ; digital signature ; authentication ; information security

在网络教学过程中采应用适当安全措施,确保网站信息

第47/63页 首页 < ... 43 44 45 46 47 48 49 50 51 ... > 尾页
推荐网络例句

The split between the two groups can hardly be papered over.

这两个团体间的分歧难以掩饰。

This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.

这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。

The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.

聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力