• 示例X.509二进制安全另外一个用户名令牌。

    The example adds an X. 509 binary security token in addition to a username security token.

    youdao

  • 一旦消息签名,X . 509证书本身作为二进制安全令牌包含soap了。

    Once the message has been signed, the X.509 certificate itself is included in the SOAP header as a binary security token.

    youdao

  • 为了满足这个需求设置Web服务安全WS-Security)提供消费应用程序(Consuming Application)的 X.509证书作为 Web 服务请求中的二进制安全令牌

    To address this need, WS-Security was set up to provide the Consuming Application's X.509 certificate as a binary security token within web services requests.

    youdao

  • 如果这些数据碰巧文本只需它们放到CDATA区域中,真正二进制数据需要一种安全可恢复的方式编码

    If the data happens to be text, you can dump it into a CDATA section and be done with it, but true binary data needs to be encoded in a safe and recoverable manner.

    youdao

  • 消息摘要安全单向哈函数,它可以接受任意大小的输入数据输出固定长度的二进制哈希值。

    Message digests are secure one-way hash functions that take arbitrary-sized data and output a fixed-length binary hash value.

    youdao

  • 这个安全令牌一个客户机证书采用 base64二进制编码形式

    This security token is the client certificate, in base64 binary-encoded form.

    youdao

  • 服务器崩溃再次启动XFS代码查看日志了解情况那些不完整数据填上二进制以预防安全问题。

    When the server started up again after the crash, the XFS code would look at the journal, realize the situation, and fill those incomplete data blocks with binary zeros as a security precaution.

    youdao

  • 大多数内容访问实现中安全是以二进制方式设置的——用户要么能够看到内容要么不能看到内容。

    In most content or access implementations, security is set in a binary fashionusers either see the content or they don't.

    youdao

  • 其他性能包括安全基于标准加密技术可同时单向双向加密的加密密码文本数字二进制文件

    Other features include high-security, standards-based encryption techniques, both for unidirectional and bidirectional encryption to encrypt passwords, texts, numbers and binaries.

    youdao

  • 近来Axis21.5.2版本就是例子二进制发布缺失安全处理所必需JAR文件因此没有一种简单方法使rampart一起工作

    The recent Axis2 1.5.2 release is an example: the binary distribution is missing a JAR file required for security handling, so there's no easy way to make it work with Rampart.

    youdao

  • 同时一些PHP扩展不是线程安全特别是如果他们执行一些外部二进制

    Also, some of PHP's extensions are not thread safe, especially if they execute some external binary.

    youdao

  • 注意,标志(token)隐性二进制数据只有底层安全机制才需要能够解释它们

    Note that the tokens are opaque binary data, and only the underlying security mechanism needs to be able to interpret them.

    youdao

  • 将该安全模式计算机病毒检测进行了应用,实现了一个简单基于二进制编码的计算机病毒检测模拟系统。

    The security model carried on an application in the detection of computer virus, for this purpose, we also developed a simple simulation program based on binary coding.

    youdao

  • 混沌映射驱动得到的伪随机二进制序列应确保有足够比特安全

    Sufficient bit security is necessary for pseudorandom binary sequences drived by chaotic maps.

    youdao

  • 然而大量使用的商业软件是以二进制代码形式存在的,使得以源代码分析对象的软件代码安全分析技术无能为力

    Nowadays, there are many analysis technologies and methods based on the source codes which have done well to enhance the software code security.

    youdao

  • 二进制搜索算法虽然识别效率比较高,但是泄露信息比较多安全比较差

    The identification of the binary search algorithm is more efficient. This algorithm exposes information and has poor security.

    youdao

  • 可以选择重新启动服务器执行其他安全扫描看看清理受感染所有启动脚本二进制文件

    You may optionally reboot the server and perform another security scan to see if you were able to clean up all startup scripts and infected binaries.

    youdao

  • 可以选择重新启动服务器执行其他安全扫描看看清理受感染所有启动脚本二进制文件

    You may optionally reboot the server and perform another security scan to see if you were able to clean up all startup scripts and infected binaries.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定