英语人>网络例句>network security 相关的网络例句
network security相关的网络例句

查询词典 network security

与 network security 相关的网络例句 [注:此内容来源于网络,仅供参考]

This system ensures the security of database server by certificating authority and tuple-level mandatory access control based on network isolation.

该系统在网络隔离的基础上通过身份认证和元组级强制访问控制来保证数据库系统的安全,可提高数据库系统安全性。

The paper closely combines with practice to study and analyzeseveral key security technology and measures which must be implemented. Forinstance, firewall technology, net virus prevention, PKI/PMI identity authenticationtechnology, gap technology, enciphering VPN channel, intranet managementmeasures, etc. The paper brings the design and implement of dual-usage monitoringsystem to a focus. Finally, this paper put forward the construction of the intrusiondetection system in the police network, of the police terminal monitoring system.

本文联系实际,研究分析了几个关键性的、必须实施的安全技术和措施,如:防火墙技术、网络病毒防治、PKI/PMI身份认证技术、物理隔离技术、加密VPN通道建设、内部网管理措施等;重点研究了内网外联监控系统的设计和实现;最后提出在公安网上建立入侵检测系统、在因特网上建设公安脱网终端监控系统的设想。

As the network enlarges, resource management and security turn to be more intractable.

网格中的节点既可以是资源提供者,也可以是资源使用者。

Since twenty century, with the rapid development of internet, all the countries of the world link as a whole. Internet inflects the structure and running manner of economy, society, culture continually, but as it makes people more convenient, highly efficient and sharing information, it also leads to many problems related to network information security.

二十世纪以来,互联网技术的迅猛发展,已经把整个世界连为一个整体,并且不断地改变着经济、社会、文化的结构和运行方式,但是互联网技术的发展在给人们带来方便、高效和信息共享的同时,也给网络信息安全带来了许多问题。

The researches on intellectual copyright protection of network manufacture products, manufacture resource sharing and information security involve in many fields and several subjects intercrossing such as manufacturing engineering, information technology and computer science and so on.

根据网络信息技术的最新进展和研究成果,在分析网格计算相关理论和技术的基础上,结合网络制造资源共享和信息安全的应用,首次提出了面向制造的开放式网格计算层次结构模型,并根据该模型构建了网络制造资源共享安全平台。

Interworking Between IP Security and Performance Enhancing Proxies for Mobile Network.

在这方面,目前的加密技术中私钥加密技术能够提供比较好的性能。

With the rapid development of the network, the online security especially the invading detection technique is becoming a hot topic.

随着网络的迅速发展,网络安全问题日益突出,入侵检测技术也成为当今社会关注的焦点。

There are many interesting papers presented on this conference,however,we only selected 3 topics to summarize,i.e.large scale power system modeling,utility computer network cyber-security,and power system optimal islanding technique for preventing a blackout.These 3 topics are selected because it is more practical for the readers in China.

在有关调度自动化方面的论文中,重点选取了对我国电力行业比较实用的三部分,即大型网络模型的管理、计算机网络的信息安全和防止大面积停电的措施等,以供读者参考。

The paper bat around the technology base of website implement, the basic theory and key technology of Web-based network synthesis management. Also it lucubrates the problems occur in the use of e-mail service, such as e-mail security, e-mail rubbish.

本文详细讨论了网站构建的技术基础和基于WEB的网络管理系统的基本原理和实现中的关键核心技术,深入研究了邮件服务中现存的主要问题,如安全问题、垃圾邮件问题,并实现了一个完整的WEB管理平台下的邮件服务系统。

Presently, Internet spreading all over the world and it is a low-cost and shareware resource. Along with newly technology- Virtual Private Network maturated, its performance can entirely reached security demand of data transfer.

目前,Internet已经遍布到世界的每一个角落,这是一个廉价的共享资源,随着新技术--虚拟专用网技术的逐渐成熟和应用,其性能可以完全达到数据安全传输的要求。

第58/63页 首页 < ... 54 55 56 57 58 59 60 61 62 ... > 尾页
推荐网络例句

The split between the two groups can hardly be papered over.

这两个团体间的分歧难以掩饰。

This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.

这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。

The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.

聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力