• Additionally, EMC EFDs safeguard data with full round-trip error correcting code (ECC) data integrity protection and destage power backup.

    此外EMCEFD也使用双工错误修正(ECC)数据完整性保护离线电源备份来保护数据。

    youdao

  • Past NFS versions did not have this ability and therefore could not negotiate for the quality of protection, data integrity, the requirement for authentication, or the type of encryption.

    以前NFS版本都没有这种能力因此不能保护质量数据完整性认证要求加密类型进行协商

    youdao

  • This standard adds a data integrity field (DIF) to each sector to maintain data protection on the medium.

    这个标准扇区增加了一个数据完整性字段(DIF)保护介质的数据。

    youdao

  • Embedded within ZFS is an implementation of an important set of features such as snapshots, copy-on-write clones, continuous integrity checking, and data protection through RAID-Z.

    ZFS嵌入重要功能(快照即写即拷克隆连续完整性检查通过RAID - Z的数据保护)的实现

    youdao

  • It also includes the management objective of internal audit, which includes not only the audit IS protection of asset security and data integrity, but also the effectiveness of IS.

    包括内部审计管理目标不仅包括被审计IS保护资产安全数据完整,且包括IS的有效性目标。

    youdao

  • The data integrity is an important content of the database protection.

    数据完整性数据库保护重要内容

    youdao

  • The air interface security technologies for the protection of data confidentiality and data integrity in 3g are discussed.

    讨论了第3移动通信系统空中接口安全保护技术,包括数据机密性保护、数据完整性保护。

    youdao

  • Analysis results show that this algorithm satisfied the requirement of protection and solve the consistency and integrity problem of communication data.

    结果表明算法能够满足保护需求,初步解决通信数据完整性一致性问题

    youdao

  • Even recent memory protection techniques like segmentation, paging, protection keys and simulated segmentation flunks to assure data integrity.

    即使是近期内存保护技术例如数据分割分页、保护秘模拟分割都无法确保数据的完整性

    youdao

  • After introducing the organization form of the memory database, it focuses on the HASH arithmetic of index and protection of integrity and consistence of the data.

    介绍内存数据库组织形式之后,本文重点分析了索引HASH算法以及数据完整性一致性保护

    youdao

  • Since memory is the primary place to store the data, the most effective way to against attack is the protection of off-chip memory, i. e. confidentiality protection and integrity protection.

    鉴于存储器数据主要驻留场所,因此,防范攻击首要是对处理器的片外存储器进行保护,其关键技术手段包括存储器的机密完整性保护。

    youdao

  • The first fragile watermarking scheme is more suitable for high precision data in the traditional network model of integrity protection;

    第一脆弱水印方案适合数据精度要求高、集中式网络模式数据完整性保护

    youdao

  • Confidentiality protection ensures that the data can't be understudied by attackers and integrity protection ensures that the data can't be tampered.

    存储器的机密性保证数据攻击者窃取,完整性保证了数据不攻击者篡改。

    youdao

  • Confidentiality protection ensures that the data can't be understudied by attackers and integrity protection ensures that the data can't be tampered.

    存储器的机密性保证数据攻击者窃取,完整性保证了数据不攻击者篡改。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定