| 1. | Discussion on the physical safety of the data inside computer 浅议计算机数据的物理安全 |
| 2. | Application of radiation monitors to the control and physical security of special nuclear material 特种核材料的控制和物理安全用辐射监控器的应用 |
| 3. | It is organized into ten major sections ; one of these sections is for physical security 主要包括10个部分,其中有一个部分讲述的就是物理安全问题。 |
| 4. | Physical security is concerned with protecting hardware from possible human and natural disasters 物理安全涉及到保护硬件免遭可能发生的人为或自然灾难的破坏。 |
| 5. | How much physical security you need on your system is very dependent on your situation , and / or budget 有多少您需要考虑的物理安全问题与您的职位和/或预算有关 |
| 6. | Biotechnology - laboratories for research , development and analysis - containment levels of microbiology laboratories , areas of risk , localities and physical safety requirements 生物技术.研究开发和分析实验室.微生物实验室的抑制等级,风险区,选点,物理安全要求 |
| 7. | This course is intended to provide some specifics concepts such as the methodology of hacking , incident handling , encryption , physical security , database security , e - commerce security 这个课程的目标是为学员提供一些深入的概念:如黑客攻击手段、安全事件的处理响应、加密技术、物理安全、数据库安全、电子商务安全等。 |
| 8. | There are corresponding security limitations in physical security layer network security layer server security layer application security layer application designing elements security layer , and ensure absolute security of the whole system 从物理安全层、网络安全层、服务器安全层、应用程序安全层、应用程序设计元素安全层都有相应的安全限制,保证了系统的绝对安全。 |
| 9. | Aiming at this problem , the paper expatiates the security policy of the mobile ip technology from four aspects including physical security policy , authentication of the mobile terminal , multilateral - authentication on entities of the mobile ip system and encryption of user data 接下来,论文第一次系统的从物理安全策略、移动终端身份安全、移动ip各实体间的多层认证、用户数据传输安全四个角度论述了移动ip技术的安全策略。 |
| 10. | In order to implement security target , this article gives a design on security system of the special inforn1ation system in our departn1ent based on the security policy , and discusses the system security solution in lbur sides that is physical security 然后,制定了安全策略、安全机制以及安全功能要求,并为实现安全目标进行了基于安全策略的安全体系设计,最后,从物理安全、网络安全、应用系统安全、管理安全等四个方面论述了系统安全的解决方案。 |