• 对于binding . wsWSDL指定的端点,请输入CustomHttpEndpoints文本中的输入相同基础uri信息(协议主机端口)。

    For binding.ws or WSDL-specified endpoints, enter the same base URI information (protocol, host, and port) that you entered in the Custom Http endpoints text box.

    youdao

  • SOA借用了网络管理IT基础设施管理其他信息技术领域一些概念比如策略服务水平协议和服务质量

    SOA borrows concepts such as Policy, service Level Agreement and Quality of service from other aspects of Information Technology such as network management and managing it infrastructure.

    youdao

  • 正是这些案例中协议必须完全透明使民众能够获得完整信息基础形成自己判断

    It is precisely in these cases that the agreements must be fully transparent so that citizens can form their own judgment on the basis of full information.

    youdao

  • 大多数服务器协议一个这个基础第一X位的描述,它包含完整长度等详细信息

    The most common server protocol is a packet based protocol where the first X bytes represent a header and the header contains details of the length of the complete packet.

    youdao

  • Git一个定制有状态支持更快信息交换协议但是Google基础建设匹配

    Git also has a custom stateful protocol that supports much faster exchanges of information, but this is not a good match for Google infrastructure.

    youdao

  • 缺乏上下文国家信息使不能过滤用于数据包基础协议文件传送协议

    Lack of context or state information makes it impossible to use packet - filters for datagram-based protocols such as File Transfer protocol.

    youdao

  • 缺乏上下文国家信息使之不能把包过滤用于数据包基础协议文件传送协议

    Lack of context or state information makes it impossible to use packet-filters for datagram-based protocols such as File Transfer protocol.

    youdao

  • 这些算法协议构成了现代信息安全技术基础

    The algorithms and protocols are the base of modern information security technology.

    youdao

  • 本文主要掌握一定数据加密信息安全、身份认证等知识基础,对EKE协议CAPTCHA作了较为深入研究

    This paper deeply researches on EKE protocol and CAPTCHA on the base of the knowledge of Data Encryption and Information Security.

    youdao

  • PK I技术为基础应用ssl协议研究PK I技术保障网络信息传输安全上的应用

    In this paper, using SSL protocol we mainly research on the application of PKI in information security on network.

    youdao

  • 信息安全主要安全协议密码算法组成,其中密码算法信息安全的基础和核心技术。

    Information security is composed of security protocol and cryptographic algorithm, the latter is the base and core.

    youdao

  • 本文深入理解HTTP协议规范工作流程基础提出并实现种新型实时查找取证网络上存在的非法网站有害信息系统—“非法互联网网站服务实时监管取证系统”。

    In this article, a design of a real-time monitoring and controlling forensics system of illegal website and its services has been proposed on the basis of understanding working flow the HTTP.

    youdao

  • 首先论文SNMP基础理论作了必要介绍包括管理信息结构,管理信息以及协议操作过程

    In the first place, the paper introduces some knowledge about SNMP, include SMI (Structure of Management Information), MIB (Management Information Base) and protocol operations.

    youdao

  • 信息安全主要安全协议密码算法两方面组成,其中密码算法是信息安全基础核心技术

    Information security mainly consists of security protocols and cryptographic algorithm. Cryptographic algorithm is the basis and key technology of the information security.

    youdao

  • 简单网络管理协议(SNMP)及其管理信息(MIB)结构功能课程网络管理基础部分讲述。

    The Simple Network Management Protocol (SNMP) and its Management Information Base (MIB) structure and function are described in this foundation session for Network Management.

    youdao

  • 简单网络管理协议(SNMP)及其管理信息(MIB)结构功能课程网络管理基础部分讲述。

    The Simple Network Management Protocol (SNMP) and its Management Information Base (MIB) structure and function are described in this foundation session for Network Management.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定