• Study of Confidential Information Security Management Systems for High-technology Firms.

    高科技企业机密资讯安全内部控制制度研究

    youdao

  • Information security management standards are guidelines for the organization and implementation of information security management systems.

    信息安全管理标准组织建立实施信息安全管理体系指导性准则

    youdao

  • To ensure systems security must think over network, operating system, application and operation demand etc in the synthetical information management systems of electric power corporations.

    电力企业综合信息管理系统中,必须网络操作系统应用程序业务需求各方面保证系统的安全

    youdao

  • The security control of the information systems includes: hardware control, software control, data security control, system implementation control and management control.

    企业信息系统安全控制内容包括硬件设备控制、软件控制、数据安全控制、系统实施控制管理控制。

    youdao

  • As an essential part of information security Management, information Risk Assessment takes a very important role in securing the safety and security of fundamental information systems.

    风险评估作为信息安全管理重要环节,对保障企事业的基础信息系统安全有着非常重要作用

    youdao

  • Software engineering, network and information security and information systems project management.

    研究方向为软件工程网络信息安全和信息系统项目管理

    youdao

  • To ensure systems security must think over network, operating system, application and operation demand etc in the synthetically information management systems of electric power corporations.

    电力企业综合信息管理系统中,必须网络操作系统应用程序业务需求各方面保证系统的安全

    youdao

  • As the core of information systems, database management systems is the key to ensure the security of information.

    作为信息系统核心数据库管理系统保护信息安全关键

    youdao

  • The open-architecture systems work seamlessly with about 30 technology partners, including video management, access control and physical security information management systems.

    开放式架构系统,且大约30个技术合作伙伴有着密切的合作,包括视频管理访问控制实体安全信息管理系统。

    youdao

  • Then the security information management model in the SKJ2004 project is taken as an example to describe the implementation process of heterogeneous distributed database systems based on CORBA.

    以正在研发数字矿井项目中的安全信息管理模块介绍基于CORBA异构分布式数据库系统实现方法

    youdao

  • Then the security information management model in the SKJ2004 project is taken as an example to describe the implementation process of heterogeneous distributed database systems based on CORBA.

    以正在研发数字矿井项目中的安全信息管理模块介绍基于CORBA异构分布式数据库系统实现方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定