In the case of Israel, security and encryption was always a strength, but that's not the growth industry that it was.
在以色列的案例中,安全和加密技术一直是他们的强项,但这不是像它过去一样是个增长行业。
Of course, security and encryption also come into play, since the proxy must be able to open the "package" to look at it or decode its contents.
当然,由于代理必须有能力打开“包”,看看其内部或者对其内容进行译 码,所以安全和加密也随之而来。
For example, any part of your application that deals with e-commerce, banking, or finances requires the heaviest data security and encryption you can get your hands on.
例如,处理电子商务、银行交易或金融的任何应用程序部分都需要所能提供的最高级别的安全性和加密。
The article introduces the network security and encryption techniques applied by the authors in the first examination system for the registered architects in China.
本文介绍了作者在全国第一个注册建筑师网络考试系统中所应用的网络安全与加密技术。
The 10 patents cover wireless data, speech coding, security and encryption and are "infringed by all Apple iPhone models shipped since the iPhone was introduced in 2007."
诺基亚的10项专利包括无线数据、语音编码、安全和加密,以及“所有出货的苹果iPhone机型中的技术。自2007年推出iPhone以来,所有的苹果iPhone机型都侵犯了诺基亚的专利”。
Compared with access authentication mechanism based on base mobile IP protocol, security and encryption for the mechanism are enhanced, which can resist common security att...
相比基本移动IP协议的接入认证方法,该方法的加密强度和安全性更高,可以更有效地抵御常见的安全攻击。
After theoretic analysis and simulation experiments, the system has higher sensitivity to initial conditions, better security and encryption effects, so it is adapt for images encryption.
理论分析和模拟试验可以看出,本系统具有较高的初值敏感性、较强的安全性和较好的加密效果,可用于实际的图像加密系统。
The other one is to analyze Address Resolution Protocol (ARP) and implement the transparency of the security and encryption route platform to the original network structure by ARP cheat technology.
其二,分析ARP协议的实现细节,采用ARP欺骗技术实现安全加密路由平台对原有网络结构的彻底透明。
Encryption is a tradeoff between speed and security.
加密是速度和安全性之间的折衷。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
With both security configurations, symmetric encryption is used for the messages exchanged between the client and the service.
通过这两种安全性配置,客户端和服务之间的消息交换使用了对称加密。
It information security professionals in the medical industry appear to be reluctant to deploy document authentication and encryption for users.
似乎医疗产业的IT信息安全专家们很不情愿为用户提供文档认证和加密功能。
Common security features are ensuring passwords that are at least six characters long and encryption of sensitive data.
一般的安全特性是确保至少六个字符的密码,并且对敏感数据进行加密。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
Wireless banking is security sensitive and it's essential to find the right balance between speed and encryption.
无线银行对安全性的要求非常高,必须找到速度和加密之间正确的平衡点。
We'll then slowly increase the complexity of the security requirements and explain the XML Encryption schema and the use of its different elements.
然后我们将慢慢地增加安全性需求的复杂程度,并解释xml加密模式及其不同元素的使用。
Fingerprint readers, onboard data encryption, and other hardware-based security features, now common on laptops, have yet to be incorporated in smartphones and other "post-PC" devices.
指纹识别器、板载数据加密,以及其他基于硬件的安全功能,现在在笔记本电脑上很普遍,但智能手机和其他“后pc”设备依然有待支持。
They include patents on wireless data, speech coding, security, and encryption, according to Nokia.
按诺基亚的说法,它们包括无线数据、语音编码、安全和加密方面专利。
It is helpful (but not necessary) for you to be familiar with basic concepts of security such as private and public keys, signatures, and encryption.
熟悉安全的基本概念(比如私钥和公钥、签名、加密)会有帮助,但不是必需的。
Setting security plays an important part in your GRUB configuration; setting a password and using MD5 encryption pays dividends to your overall system security.
在GRUB配置中,设置安全性非常重要;设置口令,并使用MD 5加密,可以保证整个系统的安全。
This simple implementation demonstrates how XML Encryption can be a viable security framework for larger and more complex business applications.
这个简单实现演示了XML加密如何能够成为用于较大型以及比较复杂业务应用程序的可行的安全性框架。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
Address XML security using XML encryption and signatures.
使用xml加密和签名解决XML安全。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
Next we need to create the keys and certificates for the Web services security signatures and encryption.
接下来,我们需要为Web服务安全性签名和加密创建密钥和证书。
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
WebSphereApplicationServer的安全基础结构,比如基于角色的访问控制和加密。
WS-Security allows the user to use a variety of security elements, such as user names, signature and encryption mechanisms and security tokens.
WS - Security允许用户使用多种安全性元素,比如用户名、签名和加密机制以及安全令牌。
For WS-Security authentication, encryption and signing are supported.
对于WS - Security身份验证,支持加密和签名。
signencr: WS-Security signing of body and headers, with timestamp, and encryption of body
signencr:主体和头部的WS-Security签名,使用时间戳和主体加密
As discussed in "Axis2 WS-Security signing and encryption," you use your private key to sign messages and the recipient's public key to encrypt messages.
正如在“Axis2WS - Security签名和加密”中所介绍的,您可以使用您的私钥对消息进行签名,并使用接收者的公钥对消息进行加密。
应用推荐