"PRC Computer Information System Security Protection Ordinance." 翻译结果2复制译文编辑译文朗读译文返回顶部 "PRC Computer Information System Security Protection Ordinance." 翻译结果3复制译文编辑译文朗读译文返回顶部 People's Republic of China computer information system security protection Ordinance ...
Computer virus (Computer Virus) in the People's Republic of China computer information system security is explicitly defined in the regulations on the protection of 翻译结果4复制译文编辑译文朗读译文返回顶部 Computer Virus (Computer Virus) in the People's Republic of computer information system safety...
Therefore, the computer secrecy system lowers down the possibility of decrypt and further improves the secrecy effect of computer system information.王进波袁广东黄种棋CN101110096A Jul 21, 2006 Jan 23, 2008 鸿富锦精密工业(深圳)有限公司;鸿海精密工业股份有限公司 Computer information security system...
The construction activities near to a computer room shall not endanger the safety of computer information system. Article 11 A computer information system connected to the international network shall be reported by its using organization to public security organs of the people’s government at the pro...
Analysis and Research of Enterprise Information System Security Based on e-Commerce Information security in e-commerce includes not only computer network security, but also information integrity, identity confirmation and non repudiation. This paper describes the security of enterprise information system base...
Define Computer information system. Computer information system synonyms, Computer information system pronunciation, Computer information system translation, English dictionary definition of Computer information system. n. The study of computation and co
A longitudinal study of information system threat categories: the enduring problem of human error Taxonomies of information security threats usually distinguish between accidental and intentional sources of system risk. Security reports have paid a grea... GP Im,RL Baskerville - 《Data Base for Advance...
A security system monitors a computer system for process events to perform verification related to the event. A thread related to an event is identified and a set of software modules of the computer system are enumerated. The thread is verified by determining whether the thread corresponds to one...
Tograntaprincipalaccesstocertaininformation. Capability Inacomputersystem,anunforgeableticket,which whenpresentedcanbetakenasincontestableproof thatthepresenterisauthorizedtohaveaccesstothe objectnamedintheticket. Certify Tochecktheaccuracy,correctness,andcompleteness ofasecurityorprotectionmechanism. Completeisolation A...
Part I:Overview of System and Network Security: A Comprehensive Introduction Part II:Managing Information Security Part III:Encryption Technology Part IV:Privacy and Access Management Part V:Storage Security Part VI:Physical Security Part VII:Advanced Security ...