network and information security 中文意思是什麼

network and information security 解釋
網路安全技術
  • network : n. 1. 網眼織物。2. (鐵路、河道等的)網狀系統,網狀組織,廣播網,電視網,廣播[電視]聯播公司。3. 【無線電】網路,電路。4. 【計算機】電腦網路,網。
  • and : n. 1. 附加條件。2. 〈常 pl. 〉附加細節。
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. Special organization developed mechanism of jiangsu public security safety of network of information of key internet unit is checked greatly, check key internet information to serve an unit in all 2627, hidden danger of next safety of hairnet sth resembling a net rectify and reform advice note 104, still rent to mandatory lead plane and fictitious space safety administration has repair, outstanding to 4 problems internet data center is executed hang out one ' s shingle supervise and direct, the course is rectified and reform, delete bawdy pornography information in all 2570

    江蘇公安機關專門組織開展了重點網際網路單位信息網路安全大檢查,共檢查重點網際網路信息服務單位2627家,下發網路安全隱患整改通知書104份,還對託管主機和虛擬空間出租安全治理進行整治,對4家問題突出的網際網路數據中心實行掛牌督辦,經過整改,共刪除淫穢色情信息2570條。
  2. So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security

    但由於計算機網路具有連接形式多樣性、終端分佈不均勻性和網路的開放性、互連性等特徵,致使網路易受黑客、駭客、惡意軟體和其它不軌的攻擊,所以網上信息的安全和保密是一個至關重要的問題。對于軍用的自動化指揮網路和銀行等傳輸敏感數據的計算機網路系統而言,其網上信息的安全和保密尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。
  3. In the following chapters, the interoperable model of webgis, multi - level b / s architecture, multi - thread for network computing and concurrent access, dcom, intelligent agent, intelligent spatial search engine, information security are discussed in detail. with these key technologies, the system of publishment and analysis of city air quality based on webgis is designed and implemented

    借鑒這些關鍵技術,在arcims的基礎上,設計並實現了基於webgis的全國重點城市空氣質量發布系統,將空氣質量狀況與空間數據結合起來,生動直觀的反映了各主要城市的空氣質量狀況,方便了用戶的查詢,為環保事業作出應有的貢獻。
  4. Computer and network has spreaded all over the society. information security and sciential property right have been risen to a new level. it is a focused problem that how to protect data and software sciential property right in field of informational technology

    現代社會步入數字信息化高度發達的時代,計算機和網路遍及社會的每一個角落,信息安全和知識產權不可侵犯也提到了一個新的高度,如何保證數據信息的安全和軟體知識產權成了信息技術領域關心的熱點問題。
  5. Koal software, which is approved by the state secrets bureau, is one of the first qualification corporations on computer information system integration related to national secrets. koal software, a pilot unit of computer network security services authentication by the computer network and information security administrtion office, has an experienced team for information system integrated security construction and services management and implementation. to users, it is a reliable long - time system security provider

    格爾軟體是國家保密局批準的首批「涉及國家秘密的計算機信息系統集成」資質單位,是國信安辦認定的首批計算機網路安全服務試點單位,擁有一支經驗豐富的信息系統整體安全建設與安全服務的項目管理與實施隊伍,是用戶信息系統能夠得到長久安全保障的可信賴的信息安全服務商。
  6. Priority must be given to develop the olympic organizing committee management system, games management system ( gms ), olympic games information retrieval system ( info2008 ), games result information system, public information service system, computer network and security system, etc

    重點開發完成好奧運會組委會管理系統、奧運會管理系統( gms ) 、奧運會信息檢索系統( info2008 ) 、奧運會競賽成績信息系統、公眾信息服務系統、奧運會計算機網路及安全系統等。
  7. With the imbursement of realization of information security and engineering project, we studied the security holes scanning technology. and we designed an active security holes scanning system based on technology of network and plugins, and realized an automatic builder of scripts in order to simplify the programming with plugins

    本論文在國防基礎研究項目:國防信息安全及其工程化實現技術研究的資助下,對安全漏洞掃描技術進行了深入地研究,並在此基礎上設計了一個基於網路的安全漏洞掃描系統。
  8. In this paper the design of network security architecture for the state monitor and management information system of housing private foundation is presented, including the comprehensive consideration of physical security, network security, operation system security, application and supporting platform security, and information security, etc ; it is carried on to analyze possible security threats, vulnerabilities and their risks, and a design scheme of network security architecture, especially the network regulations which have been adopted in the system implement, is proposed

    本文對全國住房公積金監督管理信息系統網路安全體系進行設計,包括對物理安全、網路安全、操作系統安全、應用系統及應用系統支撐平臺安全、信息安全等各個層面進行綜合考慮,並對其中的用戶認證與訪問控制和網路隔離技術等關鍵技術進行了詳細分析。對網路中可能存在的安全威脅、安全脆弱點、以及由此產生的安全風險進行了分析,提出了相應的網路安全體系設計方案,尤其是明確提出了網路規則。
  9. 3, computer network installation and maintenance ; 4, security monitoring system ; 5, companies have joined : chinese wood products industry information network, jianyang electronic commerce network, and information dissemination

    2經營中國竹木製品行業信息網,為全國各地的竹木製品企業上游生產資料企業下游的采購商提供功能強大的電子商務服務。
  10. Companies from more than 95 % of existing staff internally renowned colleges and universities, including ph. d and master ' s degrees as high as 25 %, the proportion of senior personnel, which was a high, high - quality professional team ; chinese soft postdoctoral research workstations is approved by the state personnel department only 79 home postdoctoral research stations only in the direction of the software and information security research postdoctoral research stations and set up information and network security architecture laboratory

    公司現有員工95 %以上來自國內著名高校,其中博士、碩士等高級人才所佔比例高達25 % ,是一支具有高水平、高素質的專業團隊;中軟博士后科研工作站是國家人事部批準的僅有的79家博士后科研工作站中唯一的從事軟體與信息安全方向研究的博士后科研工作站,並成立了信息與網路安全體系結構實驗室。
  11. Wei zhang is a network and information security specialist

    Wei zhang是一名網路和信息安全專家。
  12. Problems of network and information security in hospital and solutions

    醫院網路與信息安全的問題和對策
  13. Network and information security law system in european union and its implementing scheme

    歐盟網路和信息安全法律規制及其實施方案
  14. Baseline requirements for network and information security of value - added telecommunication services

    增值電信業務網路信息安全保障基本要求
  15. With the arrival of information times and rapid development of the internet, the problem of network and information security is outstanding increasingly

    隨著信息時代的來臨,網路和通信技術飛速發展,網路信息安全問題日益突出。
  16. See regulation ( ec ) no 460 / 2004 of the european parliament and of the council of 10 march 2004 establishing theeuropean network and information security agency

    參見劉闖、王正興: 《美國全球變化數據共享的經歷對我國公益性科學數據共享決策的啟示》 ,載《地球科學進展》 2002年第1期第151 - 157頁
  17. An olympic information security system must be established to guarantee the network and information security of the games, guard against cyber crimes such as hacking and ensure the stable operation of all kinds of information systems

    建成奧運信息安全體系,確保奧運網路和信息的安全,防範黑客攻擊等網上犯罪行為,確保各類信息系統的穩定運行。
  18. He led a laboratory on information security when he worked in peking university before joining microsoft, and taught two graduate courses, “ component technology ” andnetwork and information security

    加入微軟前,他在北京大學計算機研究所擔任信息安全研究室主任職務,曾經在北京大學計算機系講授過「組件技術」 、 「網路與信息安全」兩門研究生課程。
  19. Along with the rapid development of computer technology and internet, computer system has been shifted from independent mode of computer to an open internet. the problems of network and information security are emerging increasingly. different kinds of attacking incidents on the internet keep on happening

    隨著計算機技術和internet的飛速發展,計算機系統已經由獨立的單機模式轉向開放、互聯的網路環境,網路安全和信息安全問題日益突出,網路上各種攻擊事件不斷發生,相應地各種安全措施也越來越多。
  20. It is important in theory and applications to study the detection and segmentation of object identifying character image in video sequence, which is used in content segmentation of image sequence, high efficient representation, transportation, storage and interactive control, image content searching, recognition and tracking, security barrier of communication network and information etc. in this thesis, is studied the segmentation and recognition of mobile identifying character image in video sequence

    序列圖像標識文本的檢測與分割技術的研究具有重要的理論和實際意義。比如,在圖像序列的內容分割、高效表徵方面;圖像信號的高效傳輸、存儲與按內容的互動式控制;特定內容的搜索、識別與跟蹤、以及按信息內容建立對信息和通信網路的安全屏障等。這里著重研究車流視頻圖像標識文本的分割與識別技術。
分享友人