• Prior to each test, the system testers configured several product parameters to allow the memory leak analysis information to be collected during testing.

    每个测试之前系统测试人员配置许多产品参数允许测试过程收集内存泄漏分析信息

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • Unfortunately, many people fear the use of the Internet to pay for the payment of knowing that their personal information will leak, but a matter of fact, this is a very safe system.

    不幸地许多人民恐惧使用互联网付款相信他们个人信息泄漏但是实际上一个非常安全系统

    youdao

  • By actual test data, the leak detection system can rule out the stations affected by changes in working conditions can be accurately presented on the pipeline leak alarm and location information.

    通过数据测试系统能够有效的排除站内工况调整影响,并能够准确管道泄漏给出报警定位信息

    youdao

  • Covert channel can leak sensitive information in a manner that violates the system's security policy, so it will threaten the security of the system.

    通道一种违背系统安全策略的方式泄露秘密信息系统安全造成很大威胁。

    youdao

  • On the other hand, traditional document management system cannot protect secret documents of users effectively which results in the leak of document information.

    同时,传统文档管理系统还不能有效保护用户隐私文档造成隐私文档信息泄露。

    youdao

  • On the other hand, traditional document management system cannot protect secret documents of users effectively which results in the leak of document information.

    同时,传统文档管理系统还不能有效保护用户隐私文档造成隐私文档信息泄露。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定