EXAMPLE SENTENCES | ||
---|---|---|
电子欺骗可以解释成用于伪造的网络安全术语。 Spoofing can be interpreted as the network security term used for forging. | ||
保障网络安全就像保护国境的安全巡逻一样重要。 Internet security is as important to our national security as the border patrol. | ||
政府应该十分重视网络安全,它不断地受到攻击,却又对于国家安全十分重要。 Government should attach great importance to cyber security which is constantly under attack and is of great importance to national security. | ||
蜜罐技术是一种新兴的基于主动防御的网络安全技术。 Honeypot technology is a new initiative based on the defense network security technology. | ||
例如,您需要使用网络安全加密令牌控制对ejb的访问。 For example, you need to control access to EJBs using a network-safe encrypted token. | ||
方法:通过对参加医院网络安全培训人员及发函给医院有关部门进行填表调查。 Method: to investigate through the participants in the training course on network security of hospitals and sending questionnaires to sectors concerned in hospitals. | ||
个别不法分子利用网络中的一些安全漏洞进行破坏活动,由此,网络安全越来越受到人们的重视。 Vulnerabilities is used in some of the damage activities, thus, network security is more and more attention for people. | ||
然而,千兆高速网络的应用又给网络安全提出了新的挑战和更高的要求。 But the application of the high-speed network brings a new challenge to network security. | ||
在网络论坛上,他们齐聚一堂,分享诀窍;筹划着自己的网络安全事业——或“红客”,或“黑客”。 They gather in online forums, share tricks of the trade, and prepare themselves for a career in cyber security – either as a "good guy", or as a "bad guy". | ||