The costs include capital expenses such as the investment in software, hardware, security equipment and new vaults, implementation labor, labor support, ongoing management and support, and operations. 成本包括资金支出,如在软件、硬件、安全设备和新设施、实现人工、人工支持、持续管理和支持以及操作方面的投资。
Hardware security problems can be divided into two kinds of physical security, is the provision of a security. 硬件的安全问题也可以分为两种,一种是物理安全,一种是设置安全。
As we noted earlier, this abstraction layer also complicates the use of advanced security controls, such as hardware security modules, possibly leading to poor key management procedures. 我们前面也提到了,这个抽象层还让先进的安全控制像是硬件安全模块的使用更加复杂,结果就可能是蹩脚的密钥管理程序。
The trusted computing based on the hardware security module supporting is the platform to enhance the whole security broadly used in the computation and the communications system. 可信计算是在计算和通信系统中广泛使用基于硬件安全模块支持下的可信计算平台,以提高整体的安全性。
The provider improves the security of the Java 2 platform through hardware security devices. 通过硬件加密设备提高了Java平台的安全性。
With the hackers 'attacks changing from the desktop to embedded system, hardware and software security decision are leaded the whole design of the embedded systems. 随着骇客的攻击目标从台式计算机转向嵌入式系统,硬件和软件的安全决策将主导着嵌入式系统设计的流程。
Program Method for EPROM in Hardware Security 硬件加密时对EPROM的编程方法
The Sorts of the Hardware Security Techique of The Microcontroller System 单片机系统的几种硬件加密技术
This paper analyzes some factors of influencing library network security in the course of modern library networking, such as network hardware security, securities of network operating system and application system, data security, etc. and advances corresponding security tactics and solving schemes. 分析了现代图书馆网络化进程中影响图书馆网络安全的几个因素,如网络硬件的安全、网络操作系统和应用系统的安全、数据的安全等,并提出了相应的安全策略和解决方案。
Network security is very important in the construction of network, it includes hardware security and software security. 网络安全是网络建设中的重要内容.网络安全包括硬件安全和其上的软件的安全。
In the field of network communicate hardware security, the physical-conditions of computer-room must be paid attention to. In the field of network information security, visiting-control and encrypting must be reinforced. 在网络通信硬件设施的安全方面,应注重机房的物理环境和电气环境,在网络信息系统的安全方面,应加强访问控制和信息加密。
This paper introduced the history and development of the software dog first, then researched the software and hardware principle of security dog, and gave the application of some security dog in software protection? 简要介绍了软件加密狗的几个发展阶段,具体说明了加密狗的软、硬件原理,最后结合某型软件加密狗介绍了其在软件保护中的具体应用。
The Hardware Design of Security Separate Based on PCI Bus Security Technology of IC Card 基于PCI总线安全隔离卡的硬件设计
To manage and control numerous, various, complicated, and dynamic security hardware, security applications and security events in the large-scope network is named network security management ( NSM). 网络安全管理即指对大规模网络中数量众多、种类繁杂、动态变化的安全硬件、安全应用、安全事件的管理和控制。
Through the combination of the hardware and software security techniques, the security requirement of E-government system was satisfied. 最终,通过软硬件措施的结合,较好地满足了系统对网络安全的需要,保证电子政务系统的网络及信息安全,达到了安全性的要求。
Software and hardware scheme of security initialization are designed and implemented in emphasis in the thesis, and the difficulty about firmware design is described in detail. 本文重点讲述了设计和实现安全初始化的软、硬件方案,对其固件程序设计中存在的难点作了详细的论述。
With the emergence of hardware and software security elements on client devices, dynamic client-based access control schemes can be devised. 随着客户端设备软硬件的发展,出现了基于客户端的动态访问控制方案。
The hardware design of security policy database ( SPD) and security association database ( SAD) which are suitable for fast lookup. 适应快速查找需要的安全协议数据库(SPD)和安全关联数据库(SAD)的硬件结构设计。
The Study of Hardware Framework Security to the Network System of Production Management 生产管理网络系统的硬件架构安全性研究
Use of Hardware Security Devices on Java 2 Platform 在Java2平台上硬件加密设备的使用
At present, with the functions of network management improving ceaselessly, management port is becoming more and more complex. People start to attach importance to management circumstance and hardware security. 目前,随着网络管理功能的不断完善,管理端越来越复杂,人们开始重视管理的环境和硬件的安全。
And puts forward some strategies of financial information processing system software and hardware configuration and security design. 并提出学院财务信息处理系统软硬件配置和安全设计的一些策略。
Mainly for computer hardware security, software security, network security, data security, respectively, were described in four areas. 主要针对计算机硬件安全、软件安全、网络安全、数据安全四方面分别进行了阐述。
Within hardware security algorithm coprocessor, security smart card can provide encrypt, decrypt, signature and authentication functions. 安全智能卡中内置硬件安全算法协处理器,可以安全高效处理加密、解密、签名和认证等功能。
In this paper, hardware security, data security, software security and safety management system in four areas taken into account, analysis and design the security system. 本文从硬件安全、数据安全、软件安全和安全管理制度等四方面综合考虑,分析设计系统安全保障体系。
Meanwhile, since GS Mobile Data Network has just started its endeavor on information security, obvious insufficiencies exist in not only process, regulations, rules but also hardware security. 同时,由于甘肃移动数据网信息安全工作尚处于起步阶段,无论从流程、规章、制度方面还是从硬件安全性来说都有着明显的不足。
Third, Run IT service management software systems, hardware network and security systems design, and function of modules required to achieve the goal of a more complete design. 再次,对企业运行IT服务管理软件系统的硬件网络和安全系统进行了设计,并且系统的模块功能、以及要求达到的目标,提出较完整的设计方案。
Trusted computing is a hardware security module based on an information security technology to improve the security of the terminal computing environments. 可信技术是一种以硬件安全模块为基础、以提高终端计算环境的整体安全性为目的的信息安全技术。
With the development of computer remote access, communication and network engineering, hardware security can be attained. 随着计算机远程终端存取、通信和网络工程等新技术的发展,硬件安全是目前硬件水平所能达到的。
At present, the electronic information system security evaluation is mainly to its hardware and software security evaluation, the system environment, especially the electromagnetic environment evaluation is basically a blank. 目前,电子信息系统安全评估主要是对其硬件及软件安全的评估,对系统所处环境,尤其是电磁环境的评估基本属于空白。