On the other hand introduced the network layer security program, Chapter VI describes the operational phase of the system implementation and application of policy analysis, through analysis of data services to customers to carry out various marketing activities in order to obtain a good application effect. 另一方面介绍了网络层安全方案。第六章主要阐述了系统运营阶段的策略实施与应用分析,通过对客户的数据业务分析开展各种营销活动,从而获取良好应用效果。
Analyzed the network security problems and designed a program to better ensure the system safety according to the safety requirements of the online examination system. 根据网上考试系统的安全要求,对网络安全问题进行了分析,并设计出一种能较好保证系统安全性的方案。
Secondly, an algorithm of network reconfiguration with security constraints is proposed. This program has been run on three example systems, the results show that this method is effective and fast, the reduction of line loss is remarkable, and the voltage profile is improved. 其次,提出了一种考虑安全约束的配电系统最优网络重构的算法,分别对三个算例进行了计算,结果表明,方法是快速有效的,大大降低了网损,改善了系统电压分布。
The implement of EFW has been tested in LAN environment, and it is able to filter the data in and out of EFW network card according to the security strategy defined by the program. EFW包过滤程序的编写与调试等工作。该嵌入式防火墙在局域网环境中进行了测试,它能够根据程序中定义的安全策略对进出EFW网卡的数据进行过滤。
At present, network security defending measures, such as data encryption, anti-virus program, firewall and intrusion detection, become more and more mature. 如今数据加密、病毒防护程序、防火墙、入侵检测等网络安全防护措施日趋成熟。