Examples of using Secure systems in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
We need secure systems.
We really do know how to build secure systems.
ISEC 740 Secure Systems Analysis.
Designing and building secure systems.
Our highly secure systems are available every second of every day.
There are no secure systems.
Requirement 6: Secure systems and applications needs to be developed and maintained.
It is necessary for companies to develop secure systems.
Use the most secure systems available.
These models allow you to build highly secure systems.
Develop and maintain secure systems and applications.
It is then stored encrypted in Kindred's secure systems.
Develop and maintain secure systems and applications.
INTERPRETER forges an opportunity to electronically compare data between these highly secure systems.
Developing and maintaining secure systems and applications.
To develop secure systems and use industry standard tools and techniques…[-].
Requirement 6: Develop and maintain secure systems and applications.
The Secure Systems and Network Engineering is a one-year master program which was originally brought to Innopolis University from University of Amsterdam(SNE at UvA).
We would been hacking into secure systems, screwing with people's credit cards.
Those requirements fall under Requirement 6: Develop and maintain secure systems and applications.
Delivering proactive and proven solutions and services that help secure systems and networks around the world, McAfee protects consumers and businesses of all sizes from the latest malware and emerging online threats.
The emphasis of this program ison applying proven and innovative practices for building industry-standard secure systems, applications and networks.
The programme will expose students to the concept of modeling, simulating, and solving computational problems using appropriate theoretical and experimental methods,producing reliable and secure systems.
The objective of the course is to give an introduction to the basics of cryptography, to explain how basic building blocks work,and to demonstrate how secure systems can be engineered by properly using them.
HP Protected Systems- applies the technology in HP-UX Security Containment to isolate data incompartments and allow customers to automatically configure and deploy more secure systems.
Maintaining a vulnerability management program(i.e., step 5: using and regularly updating antivirus software,and step 6: developing and maintaining secure systems and applications).
This medieval castle type strategy being put forward during our discussion contradicts the strategy used at airports,where open, secure systems are applied.
Requirement 5: Protect all systems against malware and regularly update anti-virus software or programsRequirement 6: Develop and maintain secure systems and applications Threads 35.
The technological topics covered include security of smart environments, system and network security, securityof communication systems and applications, and designing secure systems.
