单词 | information security |
释义 | 例句释义: 信息安全性,信息保密,资讯安全,信息安全课程,信息安全专家 1. Producing high-quality, easy-to-use, the protection of the public information security software products is Hongyu's social mission! 出品高质量,简单易用,保护的大众信息安全软件产品是宏宇的社会使命! www.01hr.com 2. Facts have proved that information security is not just a technical problem, a greater degree of dependence on personnel management. 事实证明,信息安全并不仅仅是技术上的问题,更大程度的依赖于人员的管理等方面。 www.594wm.com 3. One of my responsibilities as Chief Information Officer is to ensure that information security is not to be compromised. 资讯总监的职责是确保资料不会外泄或被滥用。 www.icac.org.hk 4. The paper analyzes the concept of information safety and discusses the relationship among member parts of information security system frame. 叙述信息系统安全的概念,讨论信息系统安全体系框架的各个组成部分及其之间的关系。 www.iaeej.com 5. And a great deal of network bank theft affairs happened recently knocked the alarm bell for information security of network bank system. 而近期发生的网银大盗横行网络的一系列事件,也再一次为网络银行系统的信息安全敲响了警钟。 www.fabiao.net 6. With the continuous developement of computer science and network technology, information security has been a quite important problem. 随着计算机及网络技术的不断发展,信息的安全已是一个至关重要的问题。 kns50.chkd.cnki.net 7. This paper proposes a fine-grained radio-map localization based information security boundary in sensor network. 提出一种利用传感器网络精细电子地图定位建立信息安全边界的方法。 www.dictall.com 8. Key management is an important field in information security. Key agreement is one of the core problems in the key management. 密钥管理是信息安全中的一个重要领域,密钥协商是密钥管理中的一个重要方面。 www.ceps.com.tw 9. Do you think China, in terms of ideology, differentiates between information security and cybersecurity? 从意识形态上讲,你认为中国是区别看待信息安全和网络安全的吗? dongxi.net 10. Information security, especially in financial industry, is always the focus theme of both national leaders and common people. 信息安全,尤其是金融行业的信息安全,一直是上至国家领导、下至黎民百姓都十分关注的话题。 www.fabiao.net 1. Until the scope of the information security management system is defined, it is impractical to attempt to define a meaningful policy. 在确定信息安全管理体系的范围之前,试图确定一个有意义的方针是不实际的。 wenku.baidu.com 2. Does the Company have documented procedures in place to protect INFORMATION SECURITY (computer access, systems, documents and forms)? 工厂有书面程序确保信息安全(进入电脑系统,文件和表格信息) wenku.baidu.com 3. The company's information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data. 该公司的信息安全团队几乎立即发现了攻击,并采取积极的行动来保护所有系统和数据。 www.etiri.com.cn 4. As one of the pivotal technologies of information security, digital signature provides authentication, integrality and incontestableness. 数字签名提供认证性、完整性和不可否认性,是信息安全的核心技术之一。 www.fabiao.net 5. Using JXTA Security protocol to protect information security of the system offers the system a good safety, reliability and robustness. 应用JXTA的安全协议保障系统信息安全,使该系统具有良好的安全性、可靠性及鲁棒性。 www.ceps.com.tw 6. As a primary means of authentication in Information security technology, digital signature has been widely used. 作为信息安全技术中一种主要的认证手段,数字签名得到了广泛的应用。 www.zidir.com 7. However, most businesses do not treat the information security cycle as a high priority until an event happens. 但是,绝大多数的企业只有在出现情况时才会高度重视信息的安全处置。 wenda.tianya.cn 8. Multi-user privilege control is one of the ways to protect information security in enterprise information system. 在企业的信息系统中,多用户权限管理是保护数据安全的途径之一。 www.ceps.com.tw 9. Focus on network security protection, and cyber-crime evidence had been obtained, involving information security and legal regulation. 侧重网络安全防护和网络犯罪证据提取,涉及信息安全法律规制。 goabroad.zhishi.sohu.com 10. Develop and document a robust information security architecture as part of a process to establish an effective protection strategy. 制定和文件作为一个进程的一部分,健全信息安全架构,以建立一个有效的保护战略。 blog.sina.com.cn 1. The paper analyzed information security, which face up to many menaces under the network environment, and put in relevant measures. 本文分析网络环境下信息安全保护所面临诸多方面的威胁,提出了相应的防范策略。 dictsearch.appspot.com 2. Network security is no longer exclusively the domain of dedicated information security teams. 网络安全不再只属于专用信息安全团队领域。 www.cisco.com 3. Efforts have been made to improve post safety monitoring system to ensure postal services and information security. 健全完善邮政安全监管机制,邮政通信和信息安全得到有效保障。 www.kouyi.org 4. Information security management standards are guidelines for the organization and implementation of information security management systems. 信息安全管理标准是组织建立并实施信息安全管理体系的指导性准则。 www.ztxb.net.cn 5. Chip is an infrastructure of information storage, transmission and application. Its security is an important part of information security. 芯片作为信息存储、传输、应用处理的基础设备,其安全性是信息安全的一个重要组成部分。 lib.cqvip.com 6. Among the mass information security technology, cryptography does undoubtedly play an important role. 在保障信息安全的众多技术中,密码技术无疑扮演着举足轻重的角色。 www.fabiao.net 7. And I did not even dare to mention information security! 我甚至都没敢提信息安全! www.infoq.com 8. Public Key Cryptosystems is one of the most key technology to achieve information security. 公钥密码体制是实现信息安全保密的关键技术。 www.fabiao.net 9. Ensure using laptops information security, not carry any information about client information out of office. 保证使用的笔记本电脑信息安全,不携带任何关于客户信息的资料出办公室。 www.0799.tv 10. National information security expert, academician Shen Chang-xiang first proposed the idea of trusted storage does not rely on encryption. 国内信息安全专家沈昌祥院士首次提出了不依赖于加密的可信存储思想。 www.fabiao.net 1. One way this protection can be accomplished is through the use of an Information Security Management System (ISMS) . 完成此项保护的一种途径就是采用信息安全管理体系(ISMS)。 www.bing.com 2. If tough love is the best way to fix the world's software, then Wu Shi may be one of the information security industry's unsung heroes. 如果说修复世界上软件的最好办法是对其深切的爱的话,那么WuShi应该称得上是信息安全领域里未曾被歌颂的伟大英雄之一! www.bing.com 3. Additionally, the report found federal compliance with information security guidelines to be poor. 此外报告还发现联邦机构很少遵循信息安全指导准则,意识相当贫乏。 www.etiri.com.cn 4. Medical services industry is an information-intensive area, and information security is particularly important. 医疗行业是一个信息密集化的领域,信息安全尤为重要。 www.fabiao.net 5. Cryptography is one of important tools to guarantee information security. 密码学是保证信息安全的重要工具之一。 degree.fzu.edu.cn 6. The risk evaluation of information security and system risk synthetical assessment method was also theoretically concluded. 对信息安全风险评估和系统风险的整体评价进行了理论归纳。 science.scu.edu.cn 7. The public-key cryptology is widely adopted for the information security on the electrical business, internet communication etc. 公开密钥密码体制广泛应用于电子商务、电子政务、身份认证、网络通信中,起着不可替代的作用。 www.fabiao.net 8. Digital watermarking technique is an important research field multimedia information security. 数字水印技术是多媒体信息安全领域的一个重要研究课题。 www.ceps.com.tw 9. At present, information security and structure optimization of workflow management systems draws plenty of research interests. 目前,信息安全技术和工作流管理系统结构的最优化引起了广大研究人员的关注。 www.fabiao.net 10. Those factors are leading to a crisis in information security that will demand new solutions from the security specialists. 这些因素导致了信息安全危机,从而需要来自安全专家的新的解决方案。 www.bing.com 1. The access to information and the assurance of information security are two highest priorities of governments around the world. 信息获取能力和信息安全保障能力是当今世界各国奋力抢占的制高点。 www.juhe8.com 2. The fourth Chapter base on the status of our information security protection of information security countermeasures. 第四章基于我国信息安全的近况探讨保障我国信息安全的对策。 www.zidir.com 3. The information security tends to be the most urgent question for not only individuals, enterprises but also for the country. 信息安全问题无论是对个人,企业还是国家都成了最为迫切的问题。 www.594wm.com 4. Some Information Security Groups without a proactive risk management program may rely on fear to motivate the organization. 某些没有前瞻性风险管理计划的信息安全组可能依赖于恐惧来推动组织。 yeebang.com 5. The course "Secure Programming" is an important obligatory course for the major of network and information security. 《安全编程》是网络与信息安全专业学生的主干专业课。 ccst.jlu.edu.cn 6. This paper takes an application example, to provide organization the best practice of information security risk evaluation. 本研究所提供的应用实例可供各组织信息安全风险评价实践参考。 www.ceps.com.tw 7. In general, information security means protecting information from unauthorized access, disclosure, or destruction. 一般而言,资讯安全意指保护资讯不被未经授权的程序窃取、洩漏或破坏。 www.usa-degree.com 8. Computer and network are the major research objects of the information security technology at present. 计算机与网络是目前信息安全技术的主要研究对象。 www.fabiao.net 9. This standard does not include participant identifier associated with the use of personal information security and privacy protection. 本标准不包含与使用参与者标识符相关的个人信息安全和隐私保护等内容。 www.showxiu.com 10. Information security of the C3I system includes communication security, information authentication, intrusion detection and virus defence. 指挥控制系统的信息安全包括保密通信、信息认证、入侵检测和病毒防范。 www.gongkong.com 1. Firstly it introduces the principal conceptions of information security and its domestic and overseas status. 文中首先介绍了信息安全的基本概念和国内外现状。 www.lw23.com 2. We have to active defense, comprehensive prevention and improve information security capability. 我们要积极防御、综合防范,提高信息安全保障能力。 zhidao.baidu.com 3. This paper introduces the network construction, the software setup, user management and authorize, and information security measurement. 介绍了该系统的网络结构方案、软件调试与设置、对用户的管理与授权及信息安全措施。 d.wanfangdata.com.cn 4. In recent years, the human rights' dependence on information is increasing, and information security is increasingly concerned on. 近年来,人类社会对信息的依赖程度不断增大,人们对信息的安全性也越来越关注。 www.fabiao.net 5. Encryption keys are a crucial aspect of information security in the delivery of assured communications to military personnel. 加密密钥是信息安全的关键环节,保障军事人员的通信传递。 www.etiri.com.cn 6. Information Security: Your information is in secure locations that we password protect. 信息安全:信息是您在安全的地点,我们的密码保护。 64.233.179.104 7. Classification protection is a great demand for the current situation of information security. 因而,等级保护工作是当前信息安全工作的客观需要和紧迫需求。 www.fabiao.net 8. Ken Berman is the director of information security at the Broadcasting Board of Governors, the parent agency of the Voice of America. 肯恩?贝尔曼是广播理事会情报安全处的理事,该理事会也是美国之声的母公司。 voa.yeshj.com 9. The boss is worried about information security, so he sends his messages one alphabet letter at a time in random sequence. 老板很在乎信息安全问题,因此,他发信息时随机地发字母。 www.bing.com 10. Digital watermarking is a new information security technology, providing effective copyright protection for multi-media digital works. 数字水印技术是一种全新的信息安全技术,可认为多媒体数字作品的版权维护提供有效的解决手腕。 www.qk114.net 1. China and Russia want the United Nations General Assembly to adopt an "International Code of Conduct for Information Security" . 中国和俄罗斯希望联合国大会通过一个“国际信息安全的行为守则”。 www.bing.com 2. CPC information security work documentary: intelligence is civil wars, the book is best-seller sino-foreign intelligence books of top grade. 中共情报捍卫工作纪实:情报战史乃畅销书之最,本书乃中外情报书籍之上品。 www.cntingshu.com 3. After current problems being solved, encrypted file system will have broad application prospect in information security field. 加密文件系统如能克服现有的一些缺点,将来必能在信息安全领域有广阔的应用前景。 www.fabiao.net 4. The four-dimensional hyper-chaotic system is applied to the information security technology. 本文将该四维超混沌系统应用于信息安全技术中。 www.boshuo.net 5. By learning this course, students should understand the fundamental principles and related technology of information security. 要求学生通过本课程的学习,了解信息安全的基本原理,掌握相关的技术。 jwc.sysu.edu.cn 6. Speak of add secret technology, have to carry company of RSA information security. 谈到加密技术,就不能不提RSA信息安全公司。 www.nwpu.net 7. Network and information security systems generally include network security and information content security. 网络信息安全一般包括网络系统安全和信息内容安全。 kns50.chkd.cnki.net 8. We have our own information security Committee and will regularly on our system to be checked. 我们拥有自己的信息安全委员会并且会定期对我们的系统进行检查。 www.bing.com 9. Only the operating system to ensure the safe and reliable network security, this makes the computer information security faced a new topic. 只有操作系统安全可靠,才能保证整个网络的安全,这就使计算机信息安全面临着新的课题。 www.duw8.com 10. The above security deployments met the requirements of the information security in the secrets, integrity and usability. 上述的安全部署解决了用户对信息安全保密性、完整性、可用性的要求。 blog.sina.com.cn 1. Strengthen post financial management of information security needs have become increasingly prominent. 加强邮政金融信息安全管理的需求日益突出。 www.fabiao.net 2. Current information security defense for security issues of the storage appeared polarization. 当前针对存储安全问题的信息安全防御出现了两极分化。 www.fabiao.net 3. In its settlement with BJ's, the FTC used its broad "fairness authority" to penalise bad information-security management. 美国联邦贸易委员会在与BJ的和解中,使用了他宽泛的“公证权威”用来惩罚信息安全管理不当的公司。 www.ecocn.org 4. Intrusion detection is a new technology which developed with the network technology and information security technology. 入侵检测技术是随着网络技术和信息安全技术的发展而诞生、发展的; kns50.chkd.cnki.net 5. The course can help students use right method to protect their information system. And students may be interest in information security. 帮助学生掌握信息系统安全防护的基本方法,启发学生进行信息安全研究和应用的兴趣。 jwc.sysu.edu.cn 6. Therefore, to information security risks, dispel banking information Ann risk is a pressing, difficult and complicated and long-term task. 因此,做好要信息安全风险防范、化解银行业信息安风险是一项紧迫、艰巨、复杂和长期的任务。 goabroad.zhishi.sohu.com 7. The article concentrates on searching and analyzing the website construction technology and the information security technology. 本文着重探析其中的网站建设技术和信息安全技术。 kns50.chkd.cnki.net 8. Information techniques provide us with many conveniences; meanwhile, they put forward high demands of information security. 信息技术给人们带来巨大便利的同时也对信息安全提出了更高的要求。 www.lw23.com 9. Strengthen safety monitoring, and other information security infrastructure construction, to ensure the security of information systems. 强化安全监控等信息安全基础设施建设,来保证信息系统的安全性。 zhidao.baidu.com 10. Legislation of information security is so important for personal privacy, corporation interests and even state security. 信息安全立法可以说关系到个人隐私、企业的利益及国家的安危。 www.594wm.com 1. From the aspect of information security assurance, the paper also puts forward some security defense measures for the state. 最后从信息安全保障角度出发,提出了针对该技术的安全防御措施。 www.ceps.com.tw 2. Cloud computing is a new technology, and provided the opportunities and challenges brought by cloud computing to information security. 云计算是一个新的技术,给信息安全提供了挑战和机遇。 www.lunwenchina.net.cn:8080 3. But, by the opening and sharing of the computer network, information security has also become a growing issue in our society. 然而,盘算机网络所具有的开放性与共享性,使得信息安全题目也日益成为人们关注的焦点。 www.starlunwen.net 4. Intrusion detection and prevention, at both the host and network layer, are staples of information security infrastructure today. 同时在主机和网络层面进行入侵监测和预防,这是当今信息安全基础设施建设的主要内容。 shi-wei.net 5. It could even be a requirement for insurance coverage, allowing a market for information security to emerge. 这些信息甚至可作为保险责任范围的一项必要条件,以利于信息安全市场的形成。 www.ecocn.org 6. Faced with increasingly thinner profits and free voice, personal network information security market has become a veritable "the Red Sea. " 面对日益变薄的利润和免费的呼声,个人网络信息安全市场已经成为一个名副其实的“红海”。 dictsearch.appspot.com 7. Make the enterprise information security get effectively protect to have the important meaning. 使企业信息安全得到有效地保护具有重要意义。 zhidao.baidu.com 8. Enterprises have long relied on signature-based antivirus technology to protect them from information security threats. 许多企业长期以来都是依靠基于签名的防病毒技术保护自身免受信息安全威胁的侵害。 shi-wei.net 9. Currently, his concentration is information security technology and management. 目前,他的工作重点是信息安全技术和管理。 www-128.ibm.com 10. Information security framework system is the basic approach of information security management. 架构信息安全体系是信息安全管理的基本方法。 www.dictall.com 1. Cryptology is the kernel technology in the field of information security, it has extensive commercial prospect in many fields. 密码技术是信息安全领域的核心技术,在当今社会的许多领域都有着广泛的商业应用前景。 www.lw23.com 2. Guiding principles providing a good starting point for implementing information security. 指导原则提供最佳的实施信息安全的起始点。 sbin.cn 3. The thesis researches on the identity authentication and access control in information security technology. 本文从身份认证、访问控制等方面对信息安全的相关技术进行了分析和研究。 www.fabiao.net 4. Authentication, which is the foundation of secret communication and information security, has been the focus of study of network security. 身份认证是保密通信和信息安全的基础,一直是网络安全研究重点。 www.ceps.com.tw 5. The algorithms and protocols are the base of modern information security technology. 这些算法和协议构成了现代信息安全技术的基础。 www.fabiao.net 6. This paper explains the interesting inspirations provided by these features to information security system. 本文探讨了这些特点为信息安全系统所带来的启示。 www.chemyq.com 7. One key to winning government business is complying with the Federal Information Security Management Act (FISMA). 赢得政府交易的关键是符合《联邦信息安全管理法案》(FISMA)。 dongxi.net 8. As a security professional, it is important to understand how to implement an information security program. 作为一名安全专业人员,了解怎样实现一个信息安全程序是重要的。 www.loveunix.net 9. All of these implied its great potential in information security field. 因此,在信息安全领域有较大应用潜力。 cjig.cn 10. Network security from its essence, is the network information security. 网络安全从其本质上来讲就是网络上的信息安全。 zhidao.baidu.com 1. The network information security into the network security and information security two levels. 网络信息安全分为网络安全和信息安全两个层面。 www.bing.com 2. SECG members include leading technology companies and key industry players in the information security industry. SECG成员包括信息安全行业的一些领军技术公司和密钥行业成员。 www.certicom.com 3. Trusted computing solution is from the origin of information security problems, is to issue "pass" . 可信计算则是从本源上解决信息安全问题,就是要发放“通行证”。 www.bing.com 4. Digital watermarking is a new technology of information hiding and information security protection in digital age. 数字水印技术是数字化时代信息隐藏和信息安全保护的一种新型技术。 www.jukuu.com 5. This thesis researches above two aspects, mix them into one system, and meet the demand of network information security troubles. 本论文针对这两方面进行了研究,并将两者有机地融合到一个系统中,很好地适应了上述两项急需解决的网络信息安全问题。 www.lw23.com 6. The information security construction final goal is serves the information, but its direct goal is for control the security risk. 信息安全建设的最终目的是服务于信息化,但其直接目的是为了控制安全风险。 www.juhe8.com 7. Information Security Management Systems Specification with Guidance for Use. 信息安全管理体系规范及应用导则。 www.benesino.com 8. Thus, certification is an important issue in information security field. 可见,认证技术在信息安全领域具有举足重轻的地位。 www.fabiao.net 9. Enterprises have to pay much more attention to protecting assets from being threatened in electronic information security level. 企业必须不断加强自身信息安全建设,特别是加强对网络和电子信息安全体系的防护。 www.fabiao.net 10. The successful completion of the Banking Olympic information security work. 圆满完成银行业奥运信息安全保障工作。 dictsearch.appspot.com 1. Has the organisation implemented effective information security protocols? 公司有否推行有效的资料保安管理措施? www.icac.org.hk 2. There are many ways to protect information security, nowadays information encryption is in common use. 现在有很多种保护信息安全的方法,最常用的就是信息加密。 www.dictall.com 3. With the rapid development of information technology, information security problems have also highlighted. 随着信息技术的飞速发展,信息安全问题也随之凸显出来。 www.net2816.com 4. However, since no system can ever be 100 percent secure, a prevention-only approach to information security management is not enough. 然而,从来没有一些系统能保证100%的安全,仅仅阻止接近信息安全系统也是不够的。 blog.sina.com.cn 5. For too long, information security has been considered a separate discipline, isolated from the enterprise architecture. 长久以来,信息安全一直被认为是一门单独的学科,孤立于企业架构之外。 www.infoq.com 6. In the information age is very important information security issues, competition, commercial intelligence leak incident has happened. 在信息时代信息安全问题非常重要,商业竞争中情报泄密事件时有发生。 learning.zhishi.sohu.com 7. Access Control is an important component of information security. 访问控制是信息安全的重要组成部分。 kns50.chkd.cnki.net 8. Chaos is an important subdiscipline of nonlinear science. Cryptology is an important field of information security. 混沌学是非线性科学的一个重要分支,密码学是信息安全领域的重要学科。 www.13191.com 9. The conclusion is useful to solve information security problems when space data system standards of CCSDS are applied. 该结论对于采用CCSDS标准的空间数据系统如何解决信息安全问题,具有一定的参考价值。 zgkj.cast.cn 10. Taiji Information Security--Hammer "National Team of Information Security" 太极信息安全--打造“信息安全国家队” www.ilib.cn 1. As two types of watermark information are provided, the strength of information security is improved. 通过提供两种不同的水印信息,提高了信息安全的强度; ip.com 2. Also, the HKCERTCC periodically organizes training courses and awareness seminars on information security related topics. 而且,为提高公众对资讯保安的认识,并定期举办研讨会及培训课程。 www.info.gov.hk 3. Describes the backgrounds of the digital campus, and introduces what the information security issues faced. 阐述数字化校园的历史背景以及其面临的信息安全问题。 lib.cqvip.com 4. With the development of the information age, network information security is as important a matter as military and economic security. 随着信息时代的发展,网络信息安全已经变的像军队和经济安全那样重要。 blog.sina.com.cn 5. Information security problems are directly related to the informatization construction of Small and Mid-scale Enterprises. 信息安全问题直接关系到中小企业的信息化建设。 kns50.chkd.cnki.net 6. The human factor also is poses the network information security threat the principal aspect. 人为因素也是造成网络信息安全威胁的主要方面。 blog.sina.com.cn 7. In the field of information security, digital watermarking is considered as a new method to protect the intellectual property rights. 数字水印是近年来在信息安全范畴兴起的维护知识产权的新方式。 www.starlunwen.net 8. The information security of smart IC card is the base of its existing and developing. 智能IC卡的信息安全是其生存和发展的基础。 www.juyy.net 9. Sony is not the first big company to face embarrassment over information security leaks. 索尼并不是第一家遭遇信息安全泄密事件尴尬的大公司。 www.ftchinese.com 10. to undertake emergency coordination of information security and to coordinate the handling of major incidents. 承担信息安全应急协调工作,协调处理重大事件。 www.prcgov.org 1. The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology. 本文介绍的安全电子邮件系统通过信息安全技术对传统的电子邮件系统进行扩展和完善。 www.fabiao.net 2. They are either based on essential legislative requirements or considered to be common best practice for information security. 他们或是建立在基本的法律要求或被认为是公认信息安全的最佳实践。 sbin.cn 3. the method on how to establish the information security technology framework containing the main information security technology. 提出了建立涵盖主要信息安全技术的信息安全技术保障体系框架的方法。 www.71155.com 4. Information security in general and authentication in particular are key aspects for any IT-based solution. 信息(尤其是身份验证信息)的安全性是任何基于IT的解决方案的关键方面。 www.ibm.com 5. Information security culture has positive impacts on perceived information security effectiveness. 3. 资讯安全文化对知觉资讯安全有效性有正向显著影响。 www.teps.com.cn 6. The possible effects of tactical operations brought by information security are analyzed according to the proposed reference standard. 根据提出的影响等级判定参考标准,分析了在信息安全影响下作战行动可能产生的结果。 www.ceps.com.tw 7. Third, strengthen mutual trust and work together to safeguard information security. 增强互信,共同维护信息安全。 www.kouyi.org 8. We examine the investment of network and information security mainly from the perspective of economics. 主要从经济学角度来考察网络信息安全投资。 www.fabiao.net 9. Information security toolkit is used to produce information security program. 信息安全工具包用于开发信息安全应用产品。 lib.cqvip.com 10. Secure storage has become the concern of researchers in the information security domain in succession to secure communications. 安全存储是继通信保密问题之后信息安全领域的一个研究热点。 kns50.chkd.cnki.net 1. CAJ digital watermark in information security applications. CAJ数字水印在信息安全中的应用。 www.dssz.com 2. The Harris Sierra II? encryption technology provides the foundation for this level of information security. Harris公司的SierraII加密技术为信息安全水平奠定了基础。 www.etiri.com.cn 3. For an information security company, they really fucked up. 作为一家信息安全公司,这帮人也太TMD弱了。 dongxi.net 4. This paper suggests that information security should be fully considered in the process of arranging the smart grid. 文章认为智能电网的信息安全问题必须在智能电网部署的过程中充分考虑。 passport.zte.com.cn 5. The random number generator has abroad application at information security field. 随机数发生器在安全领域内有着广泛的应用。 www.ceps.com.tw 6. Banking and related financial services - Information security guidelines; Amendment 1. 摘要:银行业务和其他金融服务。信息安全使用导则。 www.souku.com.cn 7. It is a fundamental course in the subject of cryptography and information security. 它是计算机系密码学与信息安全方向的一门专业基础知识课程。 www.gs.sjtu.edu.cn 8. Therefore, how to set up an efficient modern information security system becomes a highlighted question increasingly. 因此,如何建立一个高效的现代信息安全体系,日益成为突出的问题。 www.fabiao.net 9. In the area of network information security, key agreement is essential between servers and clients. 在网络信息安全领域,服务器与客户机之间的密钥协商显得非常必要。 kns50.chkd.cnki.net 10. A motion to the ongoing National People's Congress suggested that an information security law should be developed as soon as possible. 正在召开的全国人大会议期间,一份提案建议应尽快制定一部《信息安全法》。文中的 www.enread.com 1. What Will Outside Package of Service Bring for Enterprises'Information Security? 外包服务将给企业的信息安全带来什么? www.ilib.cn 2. User authentication is the cornerstone of information security. 用户身份认证是信息安全的基石。 www.bing.com 3. The user identity authentication is the first protective wall of network and information security. 用户身份认证是网络安全和信息安全的第一道屏障。 lib.cqvip.com 4. With this easier, open method of sharing information, security personnel need to be more vigilant. 有了这个轻松的、开发的信息分享方式,安全管理员需要更加警惕。 dongxi.net 5. But the software giant argues that counterfeit programs pose a far greater risk to information security. 但这个软件巨人辩称假冒程序给信息安全造成更大的风险。 blog.sina.com.cn 6. third, the development of government information resources and updating the system, and ensure network and information security. 制定政府信息资源组织和更新制度,并确保网络与信息安全。 www.xiami360.com 7. Accompanied with the convenience from the network, it still caused the problem of information security. 伴随着网络带来的便利,网络同时为人类带来了信息安全的难题。 kns50.chkd.cnki.net 8. Most of the compliance requirements (but not all) involve information security and the associated business risk. 大多数遵从性需求(但不是全部)都涉及信息安全性和相关的业务风险。 www.ibm.com 9. How to establish information security system according to various regions has become one of the tasks that are paid great attention. 如何因地制宜地建设信息安全体系成为税务系统备受关注的课题之一。 www.lw23.com 10. Description: Offers advice and information on information security and computer-related crime. 提供关于信息保安及电算机相关罪行的建议及一般资料。 search.hereuare.com 1. Objective To guarantee information security of hospital. 目的通过软件保障医院信息安全。 lib.cqvip.com 2. One key aspect is security, which includes digital information security. 法规遵从性的一个关键方面是安全性,包括数字信息安全。 www.ibm.com 3. These days, cryptograph has already been the kernel content for the field of network security and information security. 目前,密码技术已经成为网络安全和信息安全领域的一个十分重要的核心内容。 www.fabiao.net 4. The previous researchers placed emphasis on research from one side of information security management, or technical details. 以往的研究者多侧重于从某个侧面研究一医院信息安全管理或技术细节。 www.fabiao.net 5. Expect more of the same in 2012, maybe even worse. So says a new report (pdf) from the Georgia Tech Information Security Center. 估计2012年也好不到哪儿去,甚至可能更糟。佐治亚理工学院信息安全中心一份新的报告如是说。 www.kekenet.com 6. Therefore, how to deal with spam becomes an emergency task in the fields of the Internet and information security. 因此,如何有效过滤图片垃圾邮件,已经成为互联网与信息安全技术领域一个亟待解决的课题。 www.fabiao.net 7. I don't think any honest chief information security officer can say with certainty they haven't been hit. 我认为,任何一位诚实的首席信息安全官都无法肯定地说,自己的公司没有遭到攻击。 www.ftchinese.com 8. Let us now learn about public key cryptography and how to use it to satisfy the needs of information security. 现在,让我们一起认识公开密码匙密码技术及如何利用它来满足资讯保安的需求。 www.info.gov.hk 9. Describes how you can fill a test database with data that can produce meaningful test results without compromising information security. 描述如何在不危及信息安全的情况下,用可以生成有意义的测试结果的数据填充测试数据库。 msdn2.microsoft.com 10. It becomes an important research project that how to use the service of the network and reduce the loss in the network information security. 如何尽可能的利用网络的服务,而减少因网络信息安全方面的损失是一个很重要的课题。 kns50.chkd.cnki.net 1. The course "Network Security" is a required course for the students majoring Network and Information Security. 《网络安全》课程是网络与信息安全专业学生的必修课程。 ccst.jlu.edu.cn 2. Network information security is a dynamic, the overall project. 网络信息安全是一项动态的、整体的系统工程。 kns50.chkd.cnki.net 3. The core of information security is the cryptographic technique. 信息安全的核心是密码技术。 www.fabiao.net 4. First, information security. Let's make a comparison. 首先是信息安全。 www.putclub.com 5. Information security risk in the context of corporate governance. 公司管理环境下的信息安全风险。 yeebang.com 6. We will intensify our information security and secrecy, and improve management of information networks. 加强信息安全和保密工作,完善信息网络管理。 www.putclub.com 7. Thus, how to assess and evaluate the survivability of a system effectively is a crucial issue in the field of information security. 所以,有效地评估与衡量关键性网路系统的存活性,是现今资讯安全领域中亟需重视的议题。 dictsearch.appspot.com 8. For security major students, this course lays foundations of practical aspects of network and information security. 能针对具体实践问题,设计解决方法,为学生在计算机安全及网络安全方面打下坚实基础。 ccst.jlu.edu.cn 9. Independent review of information security. 信息安全的独立的回顾。 www.securitycn.net 10. Jetway Information Security Industry Co. , Ltd. 瑞达信息安全产业股份有限公司。 c.wanfangdata.com.cn 1. Education and training in information security. 信息安全的教育和训练。 www.securitycn.net 2. Where can I obtain more information about Information Security? 我可从哪里取得有关资料保安的资料? www.esd.gov.hk 3. Xu Guangbao, male, born in 1980, master, teaching assistant, His research interest include image processing and information security. 徐光宝,男,1980年生,硕士,助教,主要研究方向:图像处理,信息安全。 www.showxiu.com 4. Modern cryptological theory and cryptological technology are important basis of information security. 现代密码学理论和密码技术是信息安全的主要基本。 www.qk114.net 5. How to ensure the safety of electronic data during the processing of storage and management is a problem of information security. 如何有效的解决电子数据在存储与管理过程中的安全是信息安全领域一直在努力解决的问题。 kns50.chkd.cnki.net 6. It has brought conveniences for people, yet the information security has become a major concern for many people. 伴随它给人们带来便利的同时,信息安全的保证也成为大家十分关注的问题。 goabroad.zhishi.sohu.com 7. Focuses on information security issues about the pip, gives a solution for reference. 重点阐述工程项目信息门户面临的安全问题,给出解决的方法,以供参考。 kns50.chkd.cnki.net 8. In the third chapter, emphasizes the overview of network information security legislation system both home and abroad. 在第三章的内容里,着重论述了国内外网络信息安全立法体系的概况。 www.594wm.com 9. Intrusion Detection is an important way to protect information security. It has great influence on the development of network application. 入侵检测是保护信息安全的重要途径,对网络应用的发展具有重要意义与深远影响。 www.magsci.org 10. And as the world increasingly goes digital, information security professionals will be the digital security guards of the future. 随着世界加速数字化,信息安全专家将成为未来的数字安全卫士。 www.bing.com 1. It is their difficulty to grasp that makes primes the basis for our modern information security. 正因为他们非常难把握,质数成为我们现代信息安全的基础。 www.bing.com 2. Internatioanl Journal of Information Security and Privacy. 国际信息安全与保密杂志。 www.wpcsh.com.cn 3. Information Security refers to all aspects of protection for information. 资料保安意旨资料受到全面保护。 www.esd.gov.hk 4. Information Security Professionals Train Entered a "Period of Upsurge" 信息安全人才培养进入“热潮期” www.ilib.cn 5. So putting a lot of attention on Internet information security is definitely necessary. 所以注重网络资讯安全是绝对必要的。 blog.hjenglish.com 6. It introduces combination information security model based on network and system security. 从网络和系统安全的角度介绍了一种信息安全系统的组合模型。 www.ceps.com.tw 7. The laws for anti-badware and individual information security must be made in administrative laws. 行政法上制定反流氓软件的专门法律和个人信息安全法; www.ceps.com.tw 8. So, it's significant to design an information security manufacture based on home high-strength arithmetic. 因此,设计研发一种采用国产高强度加密算法的网络安全产品具有重要的意义。 www.juhe8.com 9. Also network information security insurance is the outcome of information economy developing to some level. 网络信息安全保险也是信息经济发展到一定阶段的产物。 www.lw23.com 10. The course "Information Security Technology" is an important elective course for the major of computer science and technology. 《信息安全技术》课程是计算机科学与技术专业学生的专业教育的选修课。 ccst.jlu.edu.cn 1. The firm has agreed to fix these problems and undergo information-security audits for 20 years. 这家公司已经同意着手解决这些问题并接受20年的信息安全监审。 www.ecocn.org 2. As people's increasingly improved attention to information security, the electronic seal will be applied in e-government system more widely. 相信随着人们对信息安全的重视程度不断提高,电子印章在电子政务系统中的应用一定会越来越广泛。 www.waiwenfanyi.com 3. This paper analyzes the conditional access system based on the cryptology and the information security. 从密码学的角度及信息安全的角度对数字电视条件接收系统进行了分析。 dictsearch.appspot.com 4. Information security is the precondition and basis of everything that can work regularly based on the computer network communication. 信息安全是一切基于盘算机网络的通信活动得以正常运行的前提和基本。 www.starlunwen.net 5. This article emphases research E-mail information security problem that based on Web in E-mail system . 本文重点研究基于Web的电子邮件系统中的邮件信息的安全问题。 www.bing.com 6. Software patch management will act much more on network information security with the development of technology. 随着技术的发展,软件补丁管理将会在网络信息安全中发挥重要作用。 www.ceps.com.tw 7. Satyam China is one of the first IT Companies in China to achieve the latest IT Information Security Standard ISO 27001 in 2006. 萨蒂扬中国是在中国第一家通过最新信息安全标准ISO27001的IT公司。 www.itjob888.com 8. Because the specificity of information technology itself, a huge information security risks would occur in the process of information. 由于信息技术本身的特殊性,在整个信息化进程中,必将带来巨大的信息安全风险。 ccst.jlu.edu.cn 9. Key agreement is the basic element of cryptography, and it is also an important research content of information security. 密钥协商是密码学中的基本要素,也是信息安全领域的一个重要研究内容。 www.fabiao.net 10. Exapnsiveness With the Information Security Strategy of U. S. A. 论美国信息安全战略的扩张性。 www.ilib.cn 1. Information security management of digital library is not only a technical issue, but also an issue of management. 数字图书馆信息安全管理不仅是技术问题,更是管理问题。 www.ztxb.net.cn 2. Information security problems are related to national security, public safety and security of all aspects of individual citizens. 信息安全问题涉及国家安全、社会公共安全和公民个人安全的方方面面。 ccst.jlu.edu.cn 3. Without doubtful, Cryptology is a important research work in the domain of information security. 密码学作为信息安全领域的重要内容不容置疑。 dict.veduchina.com 4. Information hiding is a novel technique in the field of information security in this years, and it is significant to covert communication. 信息隐藏技术是近些年来信息安全领域出现的一种新技术,该技术对于隐秘通信有着重要的意义。 www.dictall.com 5. So it is very essential to evaluate the information security from the aspect of management. 因此,对信息系统从管理层面上的安全性进行评价十分必要。 paper.pet2008.cn 6. With the widespread of E-business, E-administrative affairs and networks, information security is becoming more and more important. 由于电子商务、电子政务及网络的普及,信息安全变得越来越重要。 www.fabiao.net 7. It refers to professionals who fight hackers in order to protect people's information security in the online world. “白客”指在网络世界中打击黑客以保护人们信息安全的网络专业人员。 www.qnr.cn 8. In order to ensure the safe and smooth, information security research and precautions of LAN is imminent. 为了确保信息的安全与畅通,研究局域网的安全以及防范措施已迫在眉睫。 www.22826.com 9. So it is may applied to all kinds of information security system to assure their security. 所以,它可以很方便地用于各种信息安全系统中,为这些系统的安全提供有力的保障。 www.ceps.com.tw 10. Want to know more about information security? 希望对资讯保安有更多的认识? www.gov.hk 1. In recently, information security becomes more and more important, so, there are many technologies what focus on information security. 近年来,信息安全变得越来越重要,许多技术专用于信息安全。 www.fabiao.net 2. As people pay more and more attention to the information assets, information security has become a hot topic among the IT industry. 在信息的价值越来越被人们重视的情况下,信息安全已经成为了业界讨论的热点话题。 www.fabiao.net 3. Information security bears upon not only national economy and people's livelihood but also international security and stability. 信息安全事关各国国计民生以及国际安全与稳定。 www.fmprc.gov.cn 4. In this case, how to get quality and efficient solutions security information security, became a lot of bank management problems. 在这种情况下,如何获得优质高效的解决方案保障信息安全,成为许多银行管理人员的困扰。 zhidao.baidu.com 5. training e-business professionals to learn how to protection of their information systems and information security. 培训电子商务人才,使其了解如何防护其信息系统和资料的安全。 www.jsjiashi.com 6. However, the development of a new technology will inevitably bring new problems, such as high costs, information security and other factors. 然而,一项新技术的发展必然也会带来新的问题,比如高昂的成本,信息安全等因素。 www.lwtxw.com 7. With the development and application of information technology, the problem of information security becomes more and more important. 随着信息技术的不断发展和应用,信息的安全性变得越来越重要。 g5.baidu.com 8. Up to 90% of enterprise network systems engineers do not have the expertise, the presence of information security risks; 高达90%的企业网络工程师不具备系统的专业技能,存在信息安全隐患; zaixian-fanyi.cn 9. Information technology -- Security techniques -- Information security management systems -- Requirements 信息技术。安全技术。信息安全管理系统。要求 www.jcw.com.cn 10. But the information security technology is in low level in our country , so we should do much research in this field. 但是,我国信息安全技术还处于低水平状况,因此我们在信息安全技术范畴还有良多工作要做。 www.starlunwen.net 1. Information technology -- Security techniques -- Information security management systems implementation guidance 信息技术—安全技术—信息安全管理体系实施指南 blog.sina.com.cn 2. information security for network being recognized and safeguarded in the point of view of national security; 从国家安全高度认识和保障网络信息安全; www.ceps.com.tw 3. Analysis on Network Information Security Problem of Coal Enterprise and Study of Its Countermeasures 煤炭企业网络信息安全问题分析及对策探讨 www.ilib.cn 4. Information technology-Security techniques-Requirements for bodies providing certification of information security management systems 信息安全管理体系审核和认证机构要求 blog.itsen.cn 5. The early study of information security architecture of electric power industry 电力行业信息安全体系结构初探 ilib.cn 6. An Analysis on Legal Concept of Information Security Law of China 我国信息安全法的法理念探析 service.ilib.cn 7. Establishment of Network and Information Security System and Its Function in Communication Equipment Certification 电信设备进网网络与信息安全体系的建设和作用 ilib.cn 8. This focused mainly on understanding information risk and information security form a social and organizational perspective; 这主要集中在理解信息的风险和信息安全形成了一个社会和组织的角度看; translate.google.com.hk 9. Information technology -- Security techniques --Information security risk management 信息技术—安全技术—信息安全风险管理 blog.sina.com.cn 10. Information security classified protection management requirements for information system operational security 信息安全等级保护信息系统运行安全管理要求 www.tc260.org.cn 1. Has studied the information security management elementary theory, the system, the standard and the appraisal method; 研究了信息安全管理的基本理论、体系、标准和评价方法; www.fabiao.net 2. Advancing the Construction of Information Classified Security Protection and Consummating Information Security Long-term Mechanism 加强信息安全等级保护制度建设进一步完善国家信息安全长效工作机制 www.ilib.cn 3. A Tentative Research into the Information Security Technology Used in Ecommerce Platform 电子商务平台的信息安全技术初探 www.ilib.cn 4. Information security; Digital Rights Management; Attribute-Based Access Control; Identity-Based Cryptography System; 信息安全;数字版权管理;基于属性的访问制约;基于身份的密码体制; www.zidir.com 5. Acknowledge all applicable requirements of information security and confidentiality for this position; 遵守公司信息安全的相关规定以及本岗位相关的保密要求; www.051291.com 6. Study of Information Security Model for Extended Services of China Railway Ticketing and Reservation System 客票系统延伸服务信息安全模型的研究 www.ilib.cn 7. Information technology -- Security techniques -- Code of practice for information security management 信息技术—安全技术—信息安全管理实用规则 blog.sina.com.cn 8. American Information Security Legislation and its Reference Significance to China 论我国信息安全立法的不足与完善 www.ilib.cn 9. Correctly handling relationship of both information publication and information security in e-government building 电子政务建设要处理好信息公开与保密的关系 www.ilib.cn 10. National Information Security Industrialization Base Training Center (Sichuan) 国家信息安全成果产业化(四川)基地培训中心 www.baike.com |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。