而系统的安全性关键在于CA的设计与规划。
这个模型的三个原则是透明程序码、安全性安全关键程序码和安全性关键程序码。
The three tenets of this model are transparent code, security-safe-critical code, and security-critical code.
请注意,启用全局安全性并没有保护所有网络链接,而只是大量关键的内部链接。
Be aware that enabling global security does not protect all network links, but rather a number of key internal links.
大型机多年来的一个关键特征是在硬件和软件级别具有可靠的安全性。
A key attribute of the mainframe over the years has been its rock-solid security at the hardware and software level.
大多数操作系统很少在其关键组成部分中包含加密处理,这使得它们先天就缺乏安全性。
Most operating systems include little or no encryption in key elements, which creates an inherent lack of security.
信息(尤其是身份验证信息)的安全性是任何基于IT的解决方案的关键方面。
Information security in general and authentication in particular are key aspects for any IT-based solution.
这些文件是系统关键型文件,它们失去完整性会威胁到总体系统安全性。
These are system-critical files and loss of their integrity threatens overall system security.
电动车的安全性也受到质疑,被普遍视为电动轿车商业化关键部件的锂离子电池有时可能出现过热甚至起火的现象。
Safety has also come into question, as some of the lithium-ion batteries — widely believed to be the key to making viable electric cars — have shown a tendency to overheat and sometimes catch fire.
法规遵从性的一个关键方面是安全性,包括数字信息安全。
One key aspect is security, which includes digital information security.
令人欣慰的是,大多数读者都能够认识到安全性是企业系统的一个关键方面。
Hopefully, most readers realize that security is a key aspect of enterprise systems.
令人欣慰的是,大多数读者都能够认识到安全性是企业系统的一个关键方面。
Hopefully, you already realize that security is a key aspect of enterprise systems.
本文概述了e - Commerce系统中的关键参与者,安全性攻击和防御。
This article outlined the key players and security attacks and defenses in an e-Commerce system.
其他关键SaaS需求,比如安全性、定制、面向服务的架构(SOA)和集成,也影响SaaS应用程序架构。
Other key SaaS requirements, such as security, customization, Service-Oriented architecture (SOA), and integration, also affect the SaaS application architecture.
使用WebSphereProcessServerWeb服务API涉及许多步骤,比如复制关键工件、生成代理客户机和确保安全性。
Using the WebSphere Process Server Web service API involves a number of steps, such as copying key artifacts, generating the proxy clients, and ensuring security.
SSL/TLS(后面统称为 SSL)是WebSphereApplicationServer安全性架构的一个关键组件,广泛用于安全通信。
SSL/TLS (hereafter referred together as SSL) is a key component of the WebSphere Application Server security architecture, used extensively for securing communication.
Metronome使用J 9虚拟机中的几个关键方法来实现确定的暂停时间,同时保证GC的安全性。
Metronome USES several key approaches within the J9 virtual machine to achieve deterministic pause times while guaranteeing GC's safety.
一个系统的TCB是对该系统安全性很关键的所有安全组件的集合。
The TCB of a system is the set of all components that are critical to its security.
这在测试负载和安全性时会变得非常关键。
This becomes critical when you're testing load and security.
在上一专栏中,我们从较高层次讨论了软体安全性的分析,介绍了软体安全性的方法,并且说明了风险分析的关键特性。
In our previous column, we discussed software security analysis at a high level, introduced a methodology for assessing software security, and explained the key characteristics of a risk analysis.
理解该问题答案的关键是使用SSL构建有意义安全性的关键。
Understanding the answer to that question is the key to building meaningful security using SSL.
明显的是,安全性是安全的事务管理服务中的关键部分。
Clearly, security is a critical part of a secure transaction management service.
软件如何配置和实现,像其他步骤那样扮演者关键的安全性角色。
How software is configured and implemented can play just as pivotal a security role as any other steps that lead to that point.
要么选择一个传统的密码系统,一个“USB作为关键驱动”系统,或为最大的安全性两者的结合。
Either choose a traditional password system, a "USB drive as key" system, or a combination of the two for maximum security.
全面的数据管理和商业智能平台,为运行关键的业务应用提供企业级的伸缩能力、高可用性和安全性。
A comprehensive data management and business intelligence platform providing enterprise class scalability, high availability and security for running business critical applications.
该书讨论了Model -View - Controller模式、单元测试、Web服务,安全性和对有效的Web应用程序的构建起关键作用的许多其他主题。
The book discusses the Model-View-Controller pattern, unit testing, Web services, security, and many other topics that are critical to building effective Web applications.
结论在正确认识疾病严重程度的基础上,熟练的分离、切割、结扎等技术及操作程序的规范化是保证LA手术安全性和疗效的关键。
Conclusions Base on the understanding of the severity of the disease, the safety and efficacy of LA depend on the skill of dissection, incision and ligation and the standardization of the operation.
勘误表1 - - -信息技术- - -安全性技术- - -关键管理- - -第2部分:使用对称技术机制。
Corrigendum 1 - Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques.
勘误表1 - - -信息技术- - -安全性技术- - -关键管理- - -第2部分:使用对称技术机制。
Corrigendum 1 - Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques.
应用推荐