Cryptography is a unique measure for combating data compromise.
密码是无与伦比的防止数据泄漏手段。
This data is moved to external disks to free up DASDs, and at the same time, the performance for external disks should not compromise the response time experienced by end users.
此数据将移动到外部磁盘以释放DASD,同时,外部磁盘的性能不应对终端用户体验到的响应时间造成负面影响。
Deferring disk writes to a more opportune time can greatly improve application throughput, but it needs to be done in a manner that doesn't compromise data integrity.
将磁盘写入延迟到比较适宜的时间可能会大大改善应用程序的吞吐量,但是,需要采用不损害数据完整性的方式执行。
Be careful when you select the server because an incorrect selection here can compromise data integrity.
当选择服务器时请注意,错误的选择操作可破坏数据的完整性。
Now an attacker (external or internal) needs to compromise only a single system to get access to all master data.
现在,攻击者(外部或内部)仅需入侵一个系统就可以访问所有主数据。
Applications can crash, disks can fail, and often users can make mistakes that compromise data.
应用程序可能会崩溃,磁盘可能出故障,用户也经常会犯错误,以致损坏数据。
With the system compromised, the attacker carries out whatever the next step may be-whether it's to gather data or compromise another system.
系统被破坏后,攻击者将实施以下任一步骤——收集数据或破坏另一个系统。
While this does not protect data from a root compromise that can monitor the user inputting the password, it can provide protection for a lost device without file system encryption.
这并不会保护数据以防可以监听用户输入密码的根权限入侵,它可以为丢失的没有文件系统加密的设备提供保护。
Designed to provide a small overhead check of the physical consistency of the table, this check can also detect torn pages, and common hardware failures that can compromise data.
此选项旨在以较低的开销检查表的物理一致性,同时,此项检查还可以检测可能危及用户数据安全的残缺页和常见的硬件故障。
Results of the test using field data show that the spline fitting can make a better compromise of best fitting and smoothness, and the algorithm performs better in short-term traffic flow forecasting.
经过实测数据仿真试验表明,样条拟合能较好地兼顾最优拟合与曲线光滑度的选择,算法的预测效果良好。
It has especially significant effect on conducted interference and compromise through radiation from other information products in some fields where data processing is widely applied.
特别是有些数据处理应用较多的地方,对于传导干扰和其他信息产品辐射泄密有着非常明显的效果。
It needs to go against the grain and train itself to focus on the value of data and the likelihood it will be compromised, rather than on how a compromise might occur.
IT人员需要不走常规路,对自己进行培训,以便关注数据价值以及数据受到危及的可能性,而不是关注如何可能受到危及。
It needs to go against the grain and train itself to focus on the value of data and the likelihood it will be compromised, rather than on how a compromise might occur.
IT人员需要不走常规路,对自己进行培训,以便关注数据价值以及数据受到危及的可能性,而不是关注如何可能受到危及。
应用推荐