• This article presented a set of pages to work with virtual machine images, running instances of those images, and the key pairs and security groups that allow you to manage them.

    本文呈现页面处理虚拟映像,映像运行实例以及允许管理实例安全

    youdao

  • The security and administrative advantages are significant; for instance, there's simply no way for an attacker who's penetrated one virtual machine to affect another.

    安全性优势很显著的;例如渗透到虚拟攻击根本没有办法影响另一台虚拟机。

    youdao

  • In this paper, we identify eight application-level security architectures based on the following three elements: Virtual Machine, Control Set, and Distribution Style.

    本文基于三个因素虚拟控制以及分发类型迄今为止的应用安全结构分为八种

    youdao

  • Caution Enabling all Shared folders can pose a security risk because a Shared folder might enable existing programs inside the virtual machine to access the host file system without your knowledge.

    注意:使用所有共享目录暴露安全风险因为共享目录可能会使虚拟中的程序知情的情况下存取主机文件系统

    youdao

  • Fault containment is proposed to construct a survivable kernel of the network security device based on the IBM virtual machine.

    提出IBM虚拟机器的架构,使用错误围堵策略建立可生存的网络安全设备内核思想。

    youdao

  • The design of a script language and its virtual machine is explained in detail. The compiling and security test of the proofing rules are realized by the back-end system.

    详细描述了脚本语言脚本编译设计方法,监控后台实现五防规则的编译和安全测试

    youdao

  • The design of a script language and its virtual machine is explained in detail. The compiling and security test of the proofing rules are realized by the back-end system.

    详细描述了脚本语言脚本编译设计方法,监控后台实现五防规则的编译和安全测试

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定