在 英语 中使用 Security techniques 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
ISO/IEC 11770 Information technology- Security techniques- Key management.
We employ various security techniques to safeguard such data from unauthorized access.
That's because 64-bit applications can use more advanced security techniques to fend off malicious code.
Information technology- Security techniques- A framework for identity management- Part 3: Practice.
The Secret Service regularly consults with experts fromother agencies in utilizing the most advanced security techniques.
Encryption and other privacy and security techniques will become more important than ever.
Security techniques, prisoner profiles, and other training materials are often based upon the model of a male prisoner.
We utilize several different security techniques to protect data from unauthorized access.
Temporal Key Integrity Protocol(TKIP)is used to wrap WEP in sophisticated cryptographic and security techniques to overcome most of its weaknesses.
We employ many different security techniques to protect such data from unauthorized access.
International Information Technology Guideline 1 describes the principles of information security andapproaches to the implementation of security techniques.
Information technology-- Security techniques-- Guidelines for ICT readiness for business continuity.
We have well-trainedprofessionals who are working around the clock implementing security techniques that will help Americans thwart cyber-attacks.
Information technology- Security techniques- Information security management systems- Requirements.
One of the Vicnum OWASP projects,a simple framework that guides security developers to learn security techniques for different needs and game-based approaches.
Information technology- Security techniques- Network security- Part 1: Overview and concepts.
There are different security systems for Wi-Fi, ZigBee and Bluetooth, as well as proprietary wirelessnetworks such as Dust that have their own security techniques.
We are using some really advanced security techniques that would have taken much longer to implement.
Security techniques will also have to change- application security will become integrated with applications, while network security will become integral to the forwarding process.
ISO/IEC 15816:2002 Information technology- Security techniques- Security information objects for access control.
Traditional security techniques using ownership and control rather than trust will not work in the digital world.
This program offers a unique opportunity to learn about specialist security techniques and use real-world networking equipment in a security context.
Existing link security techniques are often applied within wireless networks to reduce security threat.
ISO/IEC 27042:2015 Information technology- Security techniques- Guidelines for the analysis and interpretation of digital evidence.
Information technology- Security techniques- Network security- Part 6: Securing wireless IP network access.
Information technology Security techniques IT network security Part 2: Network security architecture.
Information technology- Security techniques- Cryptographic techniques based on elliptic curves- Part 1: General.
Information technology-- Security techniques-- Network security-- Part 2: Guidelines for the design and implementation of network security.
Cyber Security uses security techniques and information systems and is focused on the fight against cybercrime and the establishment of a cyberdefense.
Information technology- Security techniques- Network security- Part 3: Reference networking scenarios- Threats, design techniques and control issues.