• 解决方案:调出安全组件

    The solution: Calling out to secure components.

    youdao

  • 使用安全组件并且只采用安全方式

    Use only secure components and only in secure ways.

    youdao

  • 集合安全组件一个例子企业中的部门

    An example of set security component is the departments in an organization.

    youdao

  • 安全组件一个例子企业运营区域

    An example of tree security component is the regions of operation of the organization.

    youdao

  • 使用XML文件导入安全组件

    Importing Security Components Using XML Files.

    youdao

  • 满足我们安全需求,需要运行三个安全组件

    Three security components came into play to meet our security requirements.

    youdao

  • 一个安全策略最多可以16个不同安全组件

    There can be a maximum of 16 unique security components in a security policy.

    youdao

  • 数组安全组件一个例子企业数据敏感级别

    An example of an array security component is the sensitivity level of data in an organization.

    youdao

  • DBSECADM 可以像下面这样创建安全组件

    The tree security component can be created by DBSECADM as follows

    youdao

  • 单单配备安全组件无法满足客户需求

    Safety components alone are not enough to satisfy customer needs.

    youdao

  • DBSECADM可以像下面这样创建集合安全组件

    The set security component can be created by DBSECADM as follows.

    youdao

  • DBSECADM可以像下面这样创建数组安全组件

    The array security component can be created by DBSECADM as follows.

    youdao

  • 可以确保公共语言运行时识别新的安全组件

    This ensures that the new security component will be recognized by the common language runtime.

    youdao

  • 根据安全组件复杂性目的可能需要更改配置

    Depending on the complexity and purpose of the new security component, you might need to change its configuration.

    youdao

  • 硬件安全组件专业方干扰存储器安全硬件密钥管理

    Hardware security Module: dedicated security hardware for tamper proof storage and management of keys.

    youdao

  • 实验结果表明机制有效地实现网络安全组件协同响应

    The experimental results demonstrate that the mechanism can implement the collaborative response of security components effectively.

    youdao

  • 安全组件上下文中的一个列表,包含组件允许0多个元素

    A value in the context of a security component is a list of zero or more of the elements allowed by that component.

    youdao

  • 一个系统TCB系统安全关键所有安全组件集合

    The TCB of a system is the set of all components that are critical to its security.

    youdao

  • 构建安全组件开发人员需要开发环境设置与生产环境类似安全机制。

    Developers who are building security components require that security be set up in their development space similar to how it will be in production.

    youdao

  • 安全标签归属于一个安全策略,并且安全策略中的每个安全组件包含一个值。

    A security label belongs to a security policy and contains a value for each security component in that security policy.

    youdao

  • 业务流程策略管理组件使用下面安全组件实现业务应用程序安全职责

    The business process and policy management component USES the following security components to fulfill its security obligations to the business applications.

    youdao

  • 因为XML安全组件使用XML文件规范形式语义不重要差异忽略。

    Because the XML Security Suite USES the canonical form of the XML documents, the semantically insignificant differences are ignored.

    youdao

  • 运用机制对网络安全组件协同响应进行评估实验获得各个阶段时间开销

    An evaluation experiment on the collaborative response of security components was performed with this mechanism, and the time costs of each process were obtained.

    youdao

  • Shiro框架核心充当保护伞”,引用多个内部嵌套安全组件,它们形成对象

    It is the heart of Shiro's architecture and ACTS as a sort of 'umbrella' object that references many internally nested security components that form an object graph.

    youdao

  • 黑客领域,真正的挑战可以更好,我可以清楚掉你的系统上装所有入侵安全组件

    In hacking, it is more like a challenge that I can do better than you, I can eliminate all the security components you've installed on your system to prevent hacking.

    youdao

  • 这种情况下应用程序可能包含一个xml格式文本文件其中含有安全组件相关信息

    In this case, the application might also include a text file that contains information about the security component in XML form.

    youdao

  • 通过网络运行软件软件解决方案中,身份验证授权私密性完整性不可否认性主要安全组件

    Authentication, authorization, privacy, integrity, and non-reputation are the major security components of software or a software-based solution working over the network.

    youdao

  • 由于发送方用于签名(确保完整性不可否认性),因此我们需要更改我们对安全组件使用PKI方式

    Because the sender's private key is used for signing (integrity and non-repudiation), we don't have to change the way we use PKI for that component of the security.

    youdao

  • 由于发送方用于签名(确保完整性不可否认性),因此我们需要更改我们对安全组件使用PKI方式

    Because the sender's private key is used for signing (integrity and non-repudiation), we don't have to change the way we use PKI for that component of the security.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定