• Wireless hubs make attacks on the shopper's computer network the better choice because most wireless hubs are shipped with security features disabled.

    无线hub使攻击购物者计算机网络成为更好的选择因为大多数无线hub都禁用安全特性

    youdao

  • The problem of computer system security is discussed with emphasis on distributed system and computer network security in this paper.

    本文讨论了计算机系统安全问题重点放在分布式系统网络的安全方面。

    youdao

  • By the development of computer science and network technology, the circumstances on the security of information and network are increasingly rigorous.

    随着计算机信息技术网络技术迅猛发展信息与网络的安全形势日趋严峻和复杂化。

    youdao

  • To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.

    模型透明计算机系统基础,利用透明计算技术计算机内部安全问题进行控制。

    youdao

  • As the foundation of the study on network security, how to discover and handle computer system vulnerabilities have always been one of the focuses of the field.

    作为网络安全研究基础计算机系统脆弱性发现应对等相关工作始终是网络安全研究的焦点之一

    youdao

  • This article from the computer system of information on the importance of the issue of security, focused on the impact of computer information network security factors and preventive measures.

    该文论述计算机系统信息安全问题重要性出发,重点探讨影响计算机信息网络安全的因素防范对策

    youdao

  • Information security is the precondition and basis of everything that can work regularly based on the computer network communication.

    信息安全一切基于盘算网络通信活动得以正常运行的前提基本

    youdao

  • With the wide application of computer and network technology on libraries, the security problem of the library information network becomes unavoidably more and more important.

    随着计算机网络技术广泛应用图书馆,使得图书馆信息网络安全问题成了不容回避重要课题。

    youdao

  • A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    youdao

  • Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.

    指挥自动化网络安全系统基于信息存储通信信道计算机病毒及电磁辐射安全性分析

    youdao

  • This paper introduces the enterprise computer network organization and security requests in our country, and gives security scheme for enterprise network based on cryptography.

    该文试图通过对企业网络构成安全需求的分析,提出基于自主密码技术企业广域网系统安全方案

    youdao

  • At present, the problem of network security such as information leakage, network viruses, such as a direct impact on the normal computer applications.

    目前网络安全问题信息泄密、网络病毒直接影响计算机正常应用

    youdao

  • Regaining the initiative of computer safe protection is required for Information Age. People pay more attention to network security tactics based on cheating technology.

    信息时代到来需要计算机安全防护由被动防御转向主动,因此基于欺骗网络安全策略日益受到重视

    youdao

  • The construction of postal agent insurance computer system is given in brief. Based on service architecture and function, the network architecture, application system and security are demonstrated.

    简单介绍邮政代理保险计算机系统建设情况,以业务结构功能为基础网络结构、应用系统及安全等方面进行了说明。

    youdao

  • This article on the impact of computer network system security the main factor analysis combined with practical work, and put forward countermeasures and the majority of peers to explore.

    本文影响计算机网络系统安全主要因素结合工作实际进行分析提出相应的对策广大同行共同探讨。

    youdao

  • Based on many years' experience of network management the author, analyzes the common methods of network invasion and offers advice on security frameworks for management of secret computer.

    本文根据多年网络信息系统安全管理实践经验分析了目前网络攻击入侵手段,详细论述了构建涉密计算机信息系统安全体系的基本思路。

    youdao

  • Starting from the computer network security and the commercial trade security, basing on the technology of network security and commerce security, this paper is presenting the security system model.

    电子商务系统计算机网络安全,商务交易安全性出发,在分析网络安全技术交易安全技术基础上,给出了一种保证电子商务安全的体系结构。

    youdao

  • How to discover, fix and exploit computer system vulnerabilities has been one of the focuses of the study on network security.

    如何发现修补利用计算机漏洞网络攻防研究焦点问题之一

    youdao

  • During the university computer network security teaching process needs some viruses, the hacker programs and so on to carry on the teaching demonstration.

    高校计算机网络安全教学过程中需要一些病毒黑客程序进行教学演示

    youdao

  • German security officials have said last year's assault on the Bundestag's computer network was also carried out by Russia-backed hackers seeking ammunition for electoral meddling.

    德国安全部门官员表示去年德国联邦议会计算机网络袭击同样来自于俄罗斯支持的黑客,其目的在于寻找影响大选的途径。

    youdao

  • To be meaningful, a custom permission must be added to the security policy on the computer (or computers, in the case of a network) where the application using the permission runs.

    若要让自订使用权限具有意义必须使用这个使用权限应用程序执行时所在电脑(如果网路,可能有多部电脑),将它加入安全性原则

    youdao

  • Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.

    本文通过大量网络弱点分析,结合网络的特性建立安全性分析模型生成网络攻击

    youdao

  • The vast information was processed by computer and transmitted on network about the traditional VPN products, the key problem was how to assure information security.

    传统VPN产品中,大量的信息计算机中处理网络中传输,从而带来的一个关键问题如何保证信息的安全性

    youdao

  • Since the rapidly development of the computer network and communication technology, the security of data that transfer on the network attracts more and more attentions.

    计算机网络通讯技术飞速发展今天,网络传输数据安全性成为人们日益关注的问题。

    youdao

  • Since the rapidly development of the computer network and communication technology, the security of data that transfer on the network attracts more and more attentions.

    计算机网络通讯技术飞速发展今天,网络传输数据安全性成为人们日益关注的问题。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定