• Application design and implementation: Actions that are taken by developers and designers during development that are crucial to security but might have little impact on the deployment process.

    应用程序设计实现开发人员和设计人员在开发期间所采取安全性至关紧要操作但是这些操作可能部署过程没有影响

    youdao

  • The rules in the new model are reasonable and secure by analysis, and will rise the positive effect to design information security architecture model.

    分析表明模型定义规则合理的、安全信息安全体系结构模型的构建起到积极作用

    youdao

  • First, security problems faced by mainstream OS that haven't enhanced security mechanism are analyzed in detail, and the limit of traditional design theory is concluded too.

    本文详细分析了未经安全增强主流操作系统所面临安全问题,对安全操作系统设计理念局限性进行了总结

    youdao

  • In the design process, system security and data integrity are ensured by user authentication and encryption respectively.

    设计过程中通过对用户认证数据加密机制来确保系统安全性数据完整性

    youdao

  • By means of special design, the EIM system chooses fledged security technology and equipments for the present to ensure the safety of network and network information.

    设计系统对于网络安全和网络信息安全还给予了充分的考虑,并采用了目前较为成熟安全技术设备使EIM网络信息安全得到了可靠的保障。

    youdao

  • As for the flaws of the SSL handshake protocol part in the SSL based security communication model, the thesis proposes a PMI based solution and analyzes the design by using the BAN logic.

    针对基于SSL安全通信模型中ssl握手协议部分访问控制方面的缺陷本文提出了一个基于pmi的全解决方案对改进设计进行分析BAN逻辑证明。

    youdao

  • Meanwhile, we can make sure the security of all company's data information by the design of uniform access control service.

    统一访问控制服务设计有效保证公司所有数据信息安全性

    youdao

  • Therefore we have further design and study RIL layer and CSP layer in PKI system of mobile phone by applying the high security of SIM cards.

    进一步结合SIM卡安全性手机PKI系统CSPRIL层进行详细的设计与实现。

    youdao

  • The design of a script language and its virtual machine is explained in detail. The compiling and security test of the proofing rules are realized by the back-end system.

    详细描述了脚本语言脚本编译设计方法,监控后台实现五防规则的编译和安全测试

    youdao

  • Then the detailed design and the realization of this security model and how one implements this security model step by step in ours platform is introduced.

    然后介绍了安全模型详细设计实现以及如何我们的平台一步步实施这个安全模型。

    youdao

  • Service Levels and running flow of wireless transport layer security are described. WTLS state machine is designed by message event driven, design and implement WTLS of mobile terminal.

    阐述无线传输安全协议服务类型、运行流程,采用消息事件机制设计WTLS状态,并移动终端上设计且实现了WTLS。

    youdao

  • On analysis of the principle and application mode of des, a des module which fits for embedded security system such as IC card is realized by topdown design methods.

    详细分析DES基本原理应用模式的基础上,结合DES硬件实现的特点,采用正向设计的方法实现了适用于IC嵌入式安全需要的系统中的DES模块

    youdao

  • By adopting the thought of module design, this paper implements the SSL protocol on the CDMA wireless communication module, and resolves the security of the data transmission in the wireless channel.

    采用模块化设计思想CD MA无线通信模块实现了SSL协议,保证了数据在无线网络中的安全传输

    youdao

  • Since the present design methods for security protocol are characterized by being abstract, narrow application range and complexity, this paper presented a new approach to design security protocol.

    针对目前安全协议设计方法存在方法抽象适用范围复杂特点提出一种新的安全协议设计方法

    youdao

  • May cause accidental physical harm, significant economic loss of equipment and conditions should be adopted by the security design.

    可能造成意外人身伤害重大经济损失设备情况采用安全性设计

    youdao

  • Connect the characteristics - glass plate by the four sides of the hook plate under wind pressure, structural sealant structure of the design features a dual security protection.

    连接特点——玻璃板块主要四边承受风压结构密封胶的设计使结构具有双重安全保护功能

    youdao

  • The security of systems that use JSON is determined by the quality of the design of those systems.

    使用JSON系统安全与否,取决于系统自身设计好坏

    youdao

  • It was mainly introduced the design solution by the digital watermark technology solving keys security of dynamic encryption and decryption.

    介绍一种结合数字水印技术解决动态解密密钥安全性设计方案

    youdao

  • As the IoT concept transforms plant architecture, defence-by-default security strategies will give way to defence-by-design solutions.

    随着联网概念改变了工厂架构,默认防御安全策略位于设计防御解决方案。

    youdao

  • Backed by a three-year warranty, the UPS features an easy-to-install design and benefits security applications with extended run times for critical loads.

    本产品拥有有年质量保证具有容易安装、在设备达到临界负荷时可以长时间稳定运行优点

    youdao

  • This is a safe security lock. It is the safest and most reliable padlock. It's special design of double line night-lock exactly reduces the ratio of being opened by accident or similar keys.

    一款现在国际上最为安全可靠挂锁具有的弹子设计。大为提高测验可以达到90万把以上不误开比例。并且做工精细。

    youdao

  • We get the achievements by excellent material, competitive price, lifelike modeling, novel design, environmental and security.

    产品材料精良价格合理造型逼真环保安全,款式新颖

    youdao

  • We get the achievements by excellent material, competitive price, lifelike modeling, novel design, environmental and security.

    产品材料精良价格合理造型逼真环保安全,款式新颖

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定