• Cryptography is a unique measure for combating data compromise.

    密码无与伦比防止数据泄漏手段

    youdao

  • This data is moved to external disks to free up DASDs, and at the same time, the performance for external disks should not compromise the response time experienced by end users.

    数据移动外部磁盘释放DASD同时,外部磁盘性能应对终端用户体验到响应时间造成负面影响。

    youdao

  • Deferring disk writes to a more opportune time can greatly improve application throughput, but it needs to be done in a manner that doesn't compromise data integrity.

    磁盘写入延迟比较适宜时间可能会大大改善应用程序吞吐量但是需要采用损害数据完整性的方式执行。

    youdao

  • Be careful when you select the server because an incorrect selection here can compromise data integrity.

    选择服务器请注意错误的选择操作破坏数据的完整性。

    youdao

  • Now an attacker (external or internal) needs to compromise only a single system to get access to all master data.

    现在攻击者(外部内部仅需入侵系统可以访问所有主数据。

    youdao

  • Applications can crash, disks can fail, and often users can make mistakes that compromise data.

    应用程序可能会崩溃磁盘可能出故障用户经常错误,以致损坏数据。

    youdao

  • With the system compromised, the attacker carries out whatever the next step may be-whether it's to gather data or compromise another system.

    系统破坏后,攻击者实施以下任一步骤——收集数据破坏另一个系统。

    youdao

  • While this does not protect data from a root compromise that can monitor the user inputting the password, it can provide protection for a lost device without file system encryption.

    并不保护数据以防可以监听用户输入密码权限入侵,可以丢失没有文件系统加密设备提供保护

    youdao

  • Designed to provide a small overhead check of the physical consistency of the table, this check can also detect torn pages, and common hardware failures that can compromise data.

    选项旨在以较开销检查物理一致性,同时,此项检查可以检测可能危及用户数据安全的残缺常见硬件故障

    youdao

  • Results of the test using field data show that the spline fitting can make a better compromise of best fitting and smoothness, and the algorithm performs better in short-term traffic flow forecasting.

    经过实测数据仿真试验表明样条好地兼顾最优拟合曲线光滑度选择,算法预测效果良好

    youdao

  • It has especially significant effect on conducted interference and compromise through radiation from other information products in some fields where data processing is widely applied.

    特别是有些数据处理应用较多的地方,对于传导干扰其他信息产品辐射泄密有着非常明显效果

    youdao

  • It needs to go against the grain and train itself to focus on the value of data and the likelihood it will be compromised, rather than on how a compromise might occur.

    IT人员需要不走常规路,自己进行培训,以便关注数据价值以及数据受到危及可能性不是关注如何可能受到危及。

    youdao

  • It needs to go against the grain and train itself to focus on the value of data and the likelihood it will be compromised, rather than on how a compromise might occur.

    IT人员需要不走常规路,自己进行培训,以便关注数据价值以及数据受到危及可能性不是关注如何可能受到危及。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定