SECURITY TECHNIQUES 中文是什么意思 - 中文翻译

[si'kjʊəriti tek'niːks]
[si'kjʊəriti tek'niːks]
security techniques

在 英语 中使用 Security techniques 的示例及其翻译为 中文

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
ISO/IEC 11770 Information technology- Security techniques- Key management.
ISO/IEC11770-1信息技术-安全技术-密钥管理.
We employ various security techniques to safeguard such data from unauthorized access.
我们利用几种不同的安全技术来保护数据免遭未经授权的访问。
That's because 64-bit applications can use more advanced security techniques to fend off malicious code.
这是因为64位应用程序可以利用更先进的安全技术屏蔽恶意代码。
Information technology- Security techniques- A framework for identity management- Part 3: Practice.
信息技术-安全技术-身份管理框架-第3部分:实践.
The Secret Service regularly consults with experts fromother agencies in utilizing the most advanced security techniques.
特勤局特工还经常利用一些最先进的安全技术向其他安全专家咨询。
Encryption and other privacy and security techniques will become more important than ever.
加密和其他隐私、安全技术将变得越来越重要。
Security techniques, prisoner profiles, and other training materials are often based upon the model of a male prisoner.
保安技术、囚犯个人概况,以及别的培训材料往往都是根据男性囚犯的样本。
We utilize several different security techniques to protect data from unauthorized access.
我们利用几种不同的安全技术来保护数据免遭未经授权的访问。
Temporal Key Integrity Protocol(TKIP)is used to wrap WEP in sophisticated cryptographic and security techniques to overcome most of its weaknesses.
临时密钥完整性协议(TKIP)是使用包装在WEP上的动态加密算法和安全技术来克服它的缺点。
We employ many different security techniques to protect such data from unauthorized access.
我们利用几种不同的安全技术来保护数据免遭未经授权的访问。
International Information Technology Guideline 1 describes the principles of information security andapproaches to the implementation of security techniques.
第1号国际信息技术准则》说明了信息安全的原则和落实安全技术的方法。
Information technology-- Security techniques-- Guidelines for ICT readiness for business continuity.
信息技术-安全技术-业务连续性的ICT准备能力指南.
We have well-trainedprofessionals who are working around the clock implementing security techniques that will help Americans thwart cyber-attacks.
我们拥有训练有素的专业人员,他们正在全天候实施安全技术,帮助美国人阻止网络攻击。
Information technology- Security techniques- Information security management systems- Requirements.
信息技术-安全技术-信息安全管理体系-要求.
One of the Vicnum OWASP projects,a simple framework that guides security developers to learn security techniques for different needs and game-based approaches.
OWASP项目之一,简单框架,针对不同的需求,并基于游戏的土土法子来引导安全开发者学习安全技术
Information technology- Security techniques- Network security- Part 1: Overview and concepts.
信息技术-安全技术-网络安全-第1部分:概述和概念.
There are different security systems for Wi-Fi, ZigBee and Bluetooth, as well as proprietary wirelessnetworks such as Dust that have their own security techniques.
Wi-Fi,ZigBee和蓝牙有不同的安全系统,以及具有自己的安全技术的专有无线网络,如Dust。
We are using some really advanced security techniques that would have taken much longer to implement.
我们正在采用一些真正高级的安全技术,它们本来需要花费更长时间来部署。
Security techniques will also have to change- application security will become integrated with applications, while network security will become integral to the forwarding process.
安全技术也必须发生改变,应用程序安全性将与应用程序进行集成,而网络安全性将成为转发过程的一部分。
ISO/IEC 15816:2002 Information technology- Security techniques- Security information objects for access control.
ISO/IEC15816-2002信息技术.安全技术.访问控制的安全信息对象.
Traditional security techniques using ownership and control rather than trust will not work in the digital world.
传统的安全技术使用所有权和控制权而不是信任,在数字世界中是行不通的。
This program offers a unique opportunity to learn about specialist security techniques and use real-world networking equipment in a security context.
该计划提供了一个独特的机会,以了解专业安全技术,并在安全环境中使用现实的网络设备。
Existing link security techniques are often applied within wireless networks to reduce security threat.
现有链路安全技术有些已应用于无线网络中来减小安全攻击。
ISO/IEC 27042:2015 Information technology- Security techniques- Guidelines for the analysis and interpretation of digital evidence.
ISO/IEC27042:2015Informationtechnology-Securitytechniques-Guidelinesfortheanalysisandinterpretationofdigitalevidence(《信息技术安全技术数字证据分析与解释指南》).
Information technology- Security techniques- Network security- Part 6: Securing wireless IP network access.
信息技术-安全技术-网络安全-第6部分:保护无线IP网络访问.
Information technology Security techniques IT network security Part 2: Network security architecture.
信息技术安全技术IT网络安全第2部分:网络安全体系结构.
Information technology- Security techniques- Cryptographic techniques based on elliptic curves- Part 1: General.
信息技术-安全技术-基于椭圆曲线的密码技术-第1部分:总则.
Information technology-- Security techniques-- Network security-- Part 2: Guidelines for the design and implementation of network security.
信息技术-安全技术-网络安全-第2部分:设计和实施网络安全指南.
Cyber Security uses security techniques and information systems and is focused on the fight against cybercrime and the establishment of a cyberdefense.
网络安全使用信息系统安全技术,并以和网络犯罪的斗争以及建设网络防御为基础。
Information technology- Security techniques- Network security- Part 3: Reference networking scenarios- Threats, design techniques and control issues.
信息技术-安全技术-网络安全-第3部分:参考网络情境-威胁、设计技术和控制活动.
结果: 52, 时间: 0.4329

单词翻译

顶级字典查询

英语 - 中文