• 例如需要使用网络安全加密令牌控制ejb访问

    For example, you need to control access to EJBs using a network-safe encrypted token.

    youdao

  • 例如难以正确使用root用户还是可以从中脱离而且它根本不去控制网络访问

    For example, it's hard to use correctly, root users can still escape from it, and it doesn't control network access at all.

    youdao

  • 应该使用控制信息访问策略保护社交网络应用程序收集到的信息。

    Information gathered by social network applications needs to be protected by policies which control access to information.

    youdao

  • 使用中的一个BuildForge控制运行自己的网络中的代理系统作业以便代理系统能够访问您的ClearCaseClearQuest系统。

    Using a Build Forge console in the cloud to run jobs on agent systems in your own network so that the agent systems can access your ClearCase or ClearQuest systems.

    youdao

  • 例如如果信任的系统一个专用隔离网络运行,那么使用telnet这个网络进行远程访问(控制工作)是非常合适的。

    For example, if your most trusted systems run on a dedicated and segregated network, it makes perfect sense to use Telnet for remote access within that very network zone (or working from the console).

    youdao

  • 在对控制访问列表作用规则作了概括性介绍后,给出应用实例,具体分析访问控制列表的使用方法,对于网络安全中的应用给了一些建议

    This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.

    youdao

  • 入网访问控制保证网络资源被非法使用, 是网络安全防范保护主要策略

    Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.

    youdao

  • 本文通过SSL及其关键技术研究,提出了网络数据库系统用户访问控制使用基于SSL证书的双向身份认证

    Through study on SSL and its key technology, it is recommended that the SSL-based certificate authentication can be used as client access control method in database systems.

    youdao

  • 访问控制启用核心业务使用简单网络发布交易系统单点解决方案

    Access: Enable transactions against core business systems using simple Web publishing and point solutions.

    youdao

  • 规划网络时,必要实施严格身份认证、访问控制、数据加密、数字签名服务,逐步普及使用数字证书

    In planning network, it is necessary to implement strict identity approval, visit-controlling, data-encrypting, figurative signature, etc, popularize and use the digital certificates progressively.

    youdao

  • 访问控制作为网络安全防范保护主要技术主要任务保证网络资源非法访问使用

    The main purpose of Access Control, a major technique of network security prevention and protection, is to safeguard network resources from being illegally visited and used.

    youdao

  • 无线传感器网络中,介质访问控制MAC协议决定无线信道使用方式,在节点之间分配有限无线通信资源

    In wireless sensor networks, MAC layer Protocols are capable of determining the wireless channel utilization and allocate the limited wireless communication resources between the nodes.

    youdao

  • 无线传感器网络中,介质访问控制MAC协议决定无线信道使用方式,在节点之间分配有限无线通信资源

    In wireless sensor networks, MAC layer Protocols are capable of determining the wireless channel utilization and allocate the limited wireless communication resources between the nodes.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定