| 1. | Research on intranet security and its solution 企业网络信息安全问题及其解决方案研究 |
| 2. | Introducing intranet security resolvent ' s goal , principia , constitutes and keystone 2 .提出网络安全设计的目标、原则、组成部分及侧重点。 |
| 3. | By default , clickonce applications run in the internet or intranet security zones 默认情况下, clickonce应用程序运行在internet或intranet安全区域中。 |
| 4. | An application that performs assembly binding redirection outside the trusted and intranet security zones requires a security permission 如果应用程序在受信任的区域和intranet安全区域外执行程序集绑定重定向,则需要安全权限。 |
| 5. | But the truth is that nine out of ten break - ins come from inside the organization - - a fact that most firms ignore when it comes to designing intranet security solutions 但实际的情况是十次入侵中九次是来自机构内部? ?这一事实在多数公司设计内特网安全方案时往往被忽视。 |
| 6. | To ensure network usability , at the same time , to protect network security , this paper has done a series of research on the design of intranet security of beijing education examine center as follows : 1 . introduce some prevalent intranet attack 本文对北京教育考试院的现有网络进行了分析,在即要保护网络中信息数据的安全又要保证网络的可用性的要求下,提出了相应的网络安全解决方案。 |
| 7. | Intranet attack include : information - detector , ip - deceive , dos , password - attack , man - in - the - middle - attack , application layer attack , network reconnaissance , trust exploitation , port redirection , virus . it is helpful to obtain complete and distinct security requirements with intranet security risk analysis . 2 主要包括数据包探测器、 ip电子欺骗、拒绝服务、密码攻击、中间人攻击、应用层攻击、网络侦察、信任利用、端口重定向、病毒和特洛伊木马。 |