• This view is useful for debugging purposes but should not be enabled in production, as it might compromise security by revealing implementation details.

    视图对于调试过程非常有用,但是生产中启用因为披露实现细节,可能会影响安全性

    youdao

  • Cloud service security can be threatened by poor credentials, protocol exposure, and implementation flaws in remote management.

    远程管理中的劣质凭证协议暴露实现缺陷都可能威胁服务安全性

    youdao

  • Roles assigned to users can be used in the design and implementation of custom security policies, as well as custom workflow and event escalation flows.

    分配用户角色可以定制安全策略设计实现中,以及定制的工作流事件升级流中。

    youdao

  • Stay tuned for the upcoming articles in this series, which will continue to explore warehouse ETL process design and implementation, warehouse performance, security, and more.

    继续系列中的一篇文章其中继续探索仓库ETL过程设计实现、仓库性能安全性等。

    youdao

  • In the implementation process of SOA, security related problems occur every minute, every place on everybody.

    SOA实现过程,几乎每时以及每一个位置都会发生安全性有关问题

    youdao

  • The HLD must serve to communicate clearly what they have in mind in terms of providing overall security for the SOA implementation.

    HLD必须清楚SOA实现总体安全性角度说明其设想。

    youdao

  • LBAC is an implementation of Mandatory Access Control (MAC), which provides a reasonable level of security assurance for sensitive data stored in database.

    LBACMandatoryAccessControl (MAC)一个实现存储在数据库中的敏感数据提供了较高级别的安全保障

    youdao

  • SCA policy sets, defined in the definitions.xml file, can be attached to the implementation to enforce authorization and security identity policies.

    xml文件定义SCA策略可以附加这个实现实施授权安全身份策略

    youdao

  • In the current JCA 1.5 specification, and in the Geronimo implementation, inbound connections do not interact with the container's security subsystem.

    目前JCA 1.5规范以及Geronimo实现入站连接容器安全子系统交互

    youdao

  • The service implementation can verify that WS-Security has been properly applied to incoming messages, but clients need to know in advance what they must implement in order to use the service.

    服务实现可以检验WS - Security是否恰当应用传入的消息但是客户机需要提前知道它们必须实现什么才能使用服务。

    youdao

  • JBoss used to have a concept of SecurityProxy for EJBs, where you could provide an implementation of the EJB business interface that could execute these security checks in code.

    JBoss曾经一个概念EJBSecurityProxy可以其中提供EJB业务接口实现实现可以在代码中执行这些安全检查

    youdao

  • You are discussing some of the aspects of security in the Synapse description, including WS-Security implementation.

    描述Synapse时,讨论了安全某些方面包括WS - Security实现

    youdao

  • Security is not directly addressed in the Atom API specification, but one would expect an implementation to support HTTP-based authentication for the various Atom API operations.

    AtomAPI规范没有直接处理安全问题,预计出现用于各种Atom API操作支持基于HTTP验证实现

    youdao

  • Active involvement in selecting technology standards, evaluating and selecting tools, macro and micro design, development, testing, implementation, reuse, and security aspects.

    积极参与选择技术标准评估挑选工具宏观微观设计开发测试实现重用以及安全方面等等

    youdao

  • The COE has built-in competency in developing SOA security reference architectures, security standards, scenario-based security implementation strategies, and best practices.

    COE具备开发soa安全参考体系架构、安全标准基于场景的安全实现策略最佳实践的内在能力

    youdao

  • The implementation of a customized security plug-in is left to your discretion.

    定制安全性插件实现则有待决定

    youdao

  • The security is defined differently than in previous versions of the product due to the implementation of the JEE 5 specifications.

    由于JEE5规范实施,使得安全性定义不同早期版本

    youdao

  • Bring your organization into the future with RFID in the Supply Chain, which explains business processes, operational and implementation problems, risks, vulnerabilities, and security and privacy.

    使用RFID intheSupplyChain引领组织走向未来其中解释了业务流程操作实现问题风险漏洞以及安全性和隐私。

    youdao

  • In addition, some related network security technologies are adopted so as to ensure the security of information exchanges during the implementation procedure.

    同时该系统采用相关网络安全技术保证执行任务过程信息交互安全性

    youdao

  • Security vulnerabilities are on security agreement in the concrete implementation errors, is the accident appear abnormal conditions.

    安全漏洞在对安全协议具体实现中发生的错误意外出现非正常情况。

    youdao

  • As a major agricultural province, Hebei province medical security coverage is very low, and there are a lot of problems in the process of the implementation of cooperative medical system.

    河北省作为一个农业大省,包括合作医疗形式在内农村医疗保障覆盖率实施合作医疗的过程出现很多问题

    youdao

  • The paper mainly studied the establishment and the technical implementation of information security strategy in CIMS.

    论文主要研究了CIMS系统信息安全策略建立及其技术实现问题。

    youdao

  • In the detail implementation, several techniques are adopted to insure the system security, including TLS protocol and a Local Application Service Token creation method.

    具体实现上,采用多种技术保证系统安全性包括TLS协议本地应用服务令牌生成方法等。

    youdao

  • The key of the electronic commerce implementation is that it must guarantee the system security in the entire commercial process.

    电子商务实施关键保证整个商务过程系统安全性

    youdao

  • Finally, the design and implementation of security Ethernet chip based on SOPC are described in detail, which ensures the higher security and better control of networks.

    最后本文基于SOPC技术设计实现了一块安全以太网芯片,从根本上保证网络安全性可控性

    youdao

  • This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.

    本文介绍了用户信息系统数据库安全性控制基本概念控制模型,以及在多用户信息系统中安全性控制的实现方法

    youdao

  • Finally, based on J2EE security framework, the design and implementation of the security management subsystem are given in detail.

    最后设计实现基于J2EE分布式安全框架网管系统的安全管理解决方案。

    youdao

  • Design and implementation approaches for IKE protocols in the security VPN server are studied in this paper.

    研究了安全VPN服务器ike协议设计实现方法

    youdao

  • In this paper, based on provable security theory, a provable security cipher DFC is improved on speed without lost of security by means of fast implementation of square hash function.

    介绍基于对称密码系统的可证明安全理论,利用平方哈希函数实现技术,对一种可证明安全算法DFC实施改进后,安全性没有损失,但是速度得到了提高。

    youdao

  • Gallagher Security Management Systems is committed to applying these standards in all product development and implementation.

    加拉格尔安全管理系统致力于应用所有产品开发执行这些标准

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定