• Then, the importance of implementation security is discussed. Furthermore, we study how to apply cryptographic primitives to embedded security engineer.

    进一步分析嵌入式安全密码算法实现安全性以及密码算法嵌入式安全工程中的应用

    youdao

  • This view is useful for debugging purposes but should not be enabled in production, as it might compromise security by revealing implementation details.

    视图对于调试过程非常有用,但是生产中启用因为披露实现细节,可能会影响安全性

    youdao

  • As mentioned above, the message flow security implementation depends on an external security provider.

    上文所述,消息安全性实现依赖外部安全性提供者

    youdao

  • You're responsible for making sure that everyone "gets this" by creating detailed project plans and budgets that make clear and reflect exactly what an SOA security implementation entails.

    负责通过制定详细项目计划预算清楚地说明和反映soa安全实现所必需的东西确保每个人都对此心里有底。

    youdao

  • All these standards generate their own set of specific requirements that affect the overall SOA security implementation.

    所有这些标准都有自己一组特定需求,会总体soa安全实现造成影响

    youdao

  • The main advantage of using the GSS-API is that by writing to this generic API, your implementation can interoperate with various security systems.

    使用GSS - API主要优点通过使用这种通用API编写代码,实现可以不同安全性系统操作。

    youdao

  • Completeness: How complete is the security implementation?

    完整性安全实现完整程度

    youdao

  • The services are managed for identity and compliance through proper service-level security design and implementation.

    通过适当服务水平安全性设计实现对服务进行标识遵从性管理

    youdao

  • Implementation: at this level, you define the security identity of the SCA component.

    实现级别可以定义sca组件安全标识

    youdao

  • Roles assigned to users can be used in the design and implementation of custom security policies, as well as custom workflow and event escalation flows.

    分配用户角色可以定制安全策略设计实现中,以及定制的工作流事件升级流中。

    youdao

  • Centralizing the implementation of security policies, log analysis and reporting is a good thing.

    安全策略日志分析报告中心化实现是个不错主义。

    youdao

  • The report focuses on security program management, implementation and system administration of intelligence activities.

    报告主要针对安全计划管理以及情报活动执行系统管理

    youdao

  • The practical strategy for a security implementation is much more likely to be developed through a more prescriptive process.

    安全政策执行首要策略有可能通过一个约定俗成过程开发的。

    youdao

  • For example, these proprietary IOR components could encode the ORB type and version or help support an ORB implementation of the OMG Security Service.

    例如这些专用IOR组件可以编码OR b类型版本或者帮助支持OMG安全服务OR B实现

    youdao

  • A review of security requirements and implementation is an important part of this stage of the assessment.

    安全需求实现检查一阶段评估的重要部分

    youdao

  • Stay tuned for the upcoming articles in this series, which will continue to explore warehouse ETL process design and implementation, warehouse performance, security, and more.

    继续系列中的一篇文章其中继续探索仓库ETL过程设计实现、仓库性能安全性等。

    youdao

  • Implementation must be done properly to avoid any security issues.

    必须对其进行正确的实现避免产生任何安全问题。

    youdao

  • Active involvement in selecting technology standards, evaluating and selecting tools, macro and micro design, development, testing, implementation, reuse, and security aspects.

    积极参与选择技术标准评估挑选工具宏观微观设计开发测试实现重用以及安全方面等等

    youdao

  • The metadata model is also tightly integrated with the definition and implementation of the event validation and security.

    元数据模型事件检验安全性定义实现紧密集成

    youdao

  • In the implementation process of SOA, security related problems occur every minute, every place on everybody.

    SOA实现过程,几乎每时以及每一个位置都会发生安全性有关问题

    youdao

  • This implementation offers no level of security.

    这种实现毫无安全性可言。

    youdao

  • The bottom line is that a well-constructed HLD is crucial for any successful SOA security implementation, and the SEA is ultimately responsible for leading the SOA security team toward its creation.

    基本的观念对于任意成功SOA安全实现而言,构造良好的HLD非常关键,SEA带领 SOA 安全团队进行创建工作负有最终责任

    youdao

  • And, counter-intuitively, much of the SOA security services implementation must be understood simultaneously.

    而且必须同时了解SOA安全服务实现大部分内容

    youdao

  • The COE has built-in competency in developing SOA security reference architectures, security standards, scenario-based security implementation strategies, and best practices.

    COE具备开发soa安全参考体系架构、安全标准基于场景的安全实现策略最佳实践的内在能力

    youdao

  • The implementation of a customized security plug-in is left to your discretion.

    定制安全性插件实现则有待决定

    youdao

  • The wrong transport can cause serious problems with scalability, implementation difficulty, security, and reliability.

    错误传输协议可能导致伸缩性实现难度安全性可靠性方面严重问题

    youdao

  • Follow an SDLC process for an SOA security implementation.

    遵循soa安全实现的SDLC流程

    youdao

  • As far as the average program is concerned, the details of the security implementation don't matter very much.

    一般程序来说安全性实现细节并不重要

    youdao

  • A full implementation of all three security requirements would include.

    所有这三个安全性需求完整实现包括

    youdao

  • Defining the security identity at the implementation level.

    实现级别定义安全标识

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定