计算机资源
- 与 计算机资源 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Include detinue, use, natural resources of system of filch computer information, system of information of filch, diddle, capturing computer controls right, do sth without authorization publishs other email address and material of other individual information to tripartite, date of filch other Zhang and password, or do sth without authorization publishs other Zhang date and code to tripartite, sham other name sends message, make intentionally, the ruinous program such as software of transmission ill will.
包括非法占有、使用、窃取计算机信息系统资源,窃取、骗取、夺取计算机信息系统控制权,擅自向第三方公开他人电子邮箱地址和其他个人信息资料,窃取他人账号和密码,或者擅自向第三方公开他人账号和密码,假冒他人名义发送信息,故意制作、传播恶意软件等破坏性程序等。
-
" Byelaw " proclaimed in writing prohibits detinue, use, natural resources of system of filch computer information, system of information of filch, diddle, capturing computer controls right, do sth without authorization publishs other email address and material of other individual information to tripartite, date of filch other Zhang and password, or do sth without authorization publishs other Zhang date and code to tripartite, sham other name sends message, make intentionally, the ruinous program such as software of transmission ill will.
条例》明文禁止非法占有、使用、窃取计算机信息系统资源,窃取、骗取、夺取计算机信息系统控制权,擅自向第三方公开他人电子邮箱地址和其他个人信息资料,窃取他人账号和密码,或者擅自向第三方公开他人账号和密码,假冒他人名义发送信息,故意制作、传播恶意软件等破坏性程序。
-
Byelaw is right a series of malfeasant undertake proclaimed in writing prohibits, include detinue, use, natural resources of system of filch computer information, system of information of filch, diddle, capturing computer controls right, do sth without authorization publishs other email address and material of other individual information to tripartite, date of filch other Zhang and password, or do sth without authorization publishs other Zhang date and code to tripartite, sham other name sends message, make intentionally, the ruinous program such as software of transmission ill will.
条例对一系列不法行为进行明文禁止,包括非法占有、使用、窃取计算机信息系统资源,窃取、骗取、夺取计算机信息系统控制权,擅自向第三方公开他人电子邮箱地址和其他个人信息资料,窃取他人账号和密码,或者擅自向第三方公开他人账号和密码,假冒他人名义发送信息,故意制作、传播恶意软件等破坏性程序等。
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
-
The network is liable to be attacked by the hacker and virus because of the fluidness of information, the distribution of resource, the opening of connection and diversity of connection forms. So the security problem is become more and more serious.
由于计算机网络具有信息的流动性,资源的分布性,连接的开放性和连接形式的多样性等特征,致使网络易受到黑客和病毒的攻击,因此计算机网络的安全问题变得越来越突出。
-
The author introduced to design a language for dominant with Visual Basic 6.0, combine Access2003 of tiring-room relation database, build Xinjiang the principle of system of information of database of feral fruiter resource and method, the database technology development that uses the computer goes the complete feral fruiter that can apply extensively at service of fruiter production, scientific research, education, society to wait is planted program of qualitative resource database.
笔者介绍了以Visual Basic 6.0为主导设计语言,结合后台关系数据库Access2003,建立新疆野生果树资源数据库信息系统的原理和方法,运用计算机的数据库技术开发出一套完整的可广泛应用于果树生产、科研、教学、社会服务等的野生果树种质资源数据库程序。
-
Development of web teaching resources is one of the important and key components of remote instruction system.
0引言现代远程教育是随着计算机网络技术、现代信息技术的迅速发展而产生的一种新型的教育形式,这种以计算机网络等高科技手段为载体的双向交互式教学形式在现代教育中扮演了重要角色,在网络环境下为学习者提供丰富的多媒体教学资源和有效的学习情境,是远程教育、教学首先面临
-
Virtual multi-channel system makes the most use of computer resource, so it has many virtues such as shareable resource, use flexible, friendly interface, cost lowness, easy to extend and modify.
虚拟多道系统充分利用了计算机丰富的软硬件资源,具有资源共享、使用灵活、界面友好、成本低、易于扩充和修改等优点。
-
With the development of computer and Internet,especially the Internet used widely ,the distributing and municipalism of Enterprise Information System becomes more and more prominence.
随着计算机与网络技术的迅速发展,特别是Internet应用日益普及的情况下,现代企业信息系统的分布性、异构性和自治性的特征越来越显著,相应的企业信息资源也分布在异构的计算机环境中,信息源之间的连接表现出松散耦合的特点。
-
At present, for the experimental teaching of computer software, rich virtual experiment, together with the Universities computer and network resources for the creation of virtual experiments to provide the necessary basic conditions.
目前,用于实验教学的计算机虚拟实验软件非常丰富,加上高校计算机及网络资源,为虚拟实验的开设提供了必要的基础条件。
- 推荐网络例句
-
Do you know, i need you to come back
你知道吗,我需要你回来
-
Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.
1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。
-
Chapter Three: Type classification of DE structure in Sino-Tibetan languages.
第三章汉藏语&的&字结构的类型划分。