查询词典 network security
- 与 network security 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The Ministry of Public Security is communal censorial bureau was in safety of website sth resembling a net a few days ago Tianjin was released countrywide information network is safe 2008 state and findings of computer virus epidemic situation.
公安部公共信息网络安全监察局日前在天津发布了2008年全国信息网络安全状况和计算机病毒疫情调查结果。
-
It is not only compositive part of west social safeguard system but also one of important contents of financial security network.
它是西方社会保障体系的组成部分,也是金融安全网的重要内容之一。
-
In our country, the information war mainly based on Internet detection during the peace period, it detects the network information, finds out the criminalities, and collects the criminous witness in security.
在国内,和平时期的信息战主要体现在网络侦察上,对网络信息进行检测,发现可能的犯罪行为,针对特定目标,秘密获取其犯罪证据。
-
FastNet takes DHRLM as routing model, it implements a diffluent multi-point distribution algorithm like Bittorrent, but FastNet is different from Bittorrent which is an unstructured P2P system, it implements the idea according to the characteristics of resource locating algorithm in structured P2P network. Moreover FastNet adopts periodic fault-tolerant algorithm to ensure active, quick and reliable distribution of security-related content.
FastNet以DHRLM为路由模型,实现了类似于Bittorrent的多点分流内容分发算法,与Bittorrent不同的是,FastNet在结构化的P2P网络中根据定位算法的特点实现了该算法:同时,FastNet采取了周期性的容错算法保证在P2P节点动态失效的情况下仍然能够主动、快速、可靠地分发安全内容。
-
NET Framework class library. It is the backbone of partially trusted code and is not restricted to file access, but rather affects everything from network access to windowing and more. When you use it in your own component code, users will be able to execute code regardless of origin, and their systems will remain safe. This allows you to write code that is featureful, executes in native machine language, and is distributed across a LBN or even over the Internet. You can take advantage of this feature with only a minimal exposure to the underlying mechanics of code access security.
NET框架类库来施用他是半信托代码的根蒂根基而且不受限于文件拜候,可是对路程经过过程收集拜候窗户或其它的不论什么情况都有至关的影响当您在您本身的组件代码中施用它时,用户可以在不消留心来历的情况下执行代码(好比从1个英特网网站),她们的体系仿照还是是安全的这似的您可以开具富有特征的、路程经过过程本机执行的而且漫衍拜候局域网甚至是英特网的代码您可以哄骗这些特征在代码拜候安全的根蒂根基下最小限度的袒露您的信息
-
In military strategy, internally they may consolidate the security of west border area, perfect the transportation network of army; foreignly, they may break through blockade by US.
在军事战略上:对内,可巩固西部边疆安全,完善共军战略交通网;对外,可突破美国对中共的围堵。
-
The main application fields of our activity are:· Environmental Monitoring · Safeguard of waters and sea species · Monitoring of agricultural and forestal resources · Risk Prevention and Civil Protection · Fleet Management · Network Technologies · Cartography via Internet · Security and Defense · Planetary Exploration
我们主要经营的业务有:环境检测,水资源与海洋生物保护,农业和森林资源检测,风险管理和群众防护,船舶管理,网络技术,网络地图,安全与风险防护,行星探索与主营图像技术,地理地图数据库的企业建立业务
-
User security is group based and meets requirements outlined in NISPOM, Chapter 8, as well as Sarbanes-Oxley and HIPPA. Standalone or multi-system network use is supported.
用户安全能够定义系统政策,登录上网时间,网络共享时间,网站限制,和对诸如程序和文件的本地资源的访问。
-
With the continued increasement of applications and the requirements of variety using, the security of the network is becoming more and more important.
随着网络技术应用的急剧增加和对业务多样性要求的提高,网络的安全性问题日益突出。
-
With the continued increasement of applications and the requirements of variety using, the security of the network is becoming more and more important.
中文摘要:随着网络技术应用的急剧增加和对业务多样性要求的提高,网络的安全性问题日益突出。
- 推荐网络例句
-
Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.
在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。
-
In fact,I've got him on the satellite mobile right now.
实际上 我们已接通卫星可视电话了
-
The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.
世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。