充足的财产保护:积累财产是一码事,但若他们没能受到充分的保护,你可能会惊讶而不快。
Adequate protection of assets: it is one thing to accumulate assets, but if they are not adequately protected you may be in for an unpleasant surprise.
此外,EMCEFD也使用全双工错误修正码(ECC)数据完整性保护和离线电源备份来保护数据。
Additionally, EMC EFDs safeguard data with full round-trip error correcting code (ECC) data integrity protection and destage power backup.
个人识别码,用来保护SIM卡中受保护的数据区,例如:限制访问的电话簿。
A personal identification number which provides access to protected areas of the SIM e. g. barred phone books.
图1.2是另一更复杂的实例,它显示了由防护码(G)和受保护代码(C)组成的网络,也包括它们在真实程序内存中的分配方式。
Figure 1.2 reports another real more sophisticated example where a network of Guards (g) and Guarded Code (c) is presented beside it's distribution into the real application's memory.
消费不支持个人识别码(PIN)保护。
Consumption doesn't support Personal Identification Number (PIN) protection.
采用了近似下三角校验阵的形式,构造了一类具有不等错误保护的非规则ldpc码。
This paper constructs irregular LDPC codes of unequal error protection with a parity check matrix in a lower triangular.
并着重对该系统文件库的结构、索引的安排、码的编制,数据的检索和保护及文件库的修改等实施方案进行了论述。
And it emphasizes the executive scheme of the file library's structure, the index arrangement, the data sorting and protecting, the code making and the file library's modification.
一种为持卡人进行消费、取现等交易而设计的支持个人识别码(PIN)保护的金融IC卡应用。
It is a financial IC card application which is designed for the cardholders to consume, withdraw and make other transactions and supports Personal Identification Number (PIN).
指令表随机化(isr)技术是一种新型的保护系统免遭任何类型注入码攻击的通用方法。
ISR (Instruction Set Randomization) is a new, general approach for safeguarding systems against any type of code-injection attack.
若要要求使用权限,您必须知道程序码会使用哪些资源和保护的作业,也必须知道保护这些资源和作业的是哪些使用权限。
To request permissions, you must know which resources and protected operations your code USES, and you must also know which permissions protect those resources and operations.
您可以建立闸道签入组建定义,保护部分或所有程式码基底避免此问题发生。
You can create a gated check-in build definition to guard some or all of your code base against this problem.
介绍了注册码软件保护技术,比较了几种注册码软件保护方案的安全性和实用性,对部分方案实施了成功的攻击。
This paper introduces the technology of register code soft protection, compares advantages and disadvantages among them about security and practicability and attacks some methods successfully.
提出一种不等级别差错控制(uec)方案,以实现对JPEG2000图像编码码流中不同质量层的不等级别差错保护。
An unequal error control (UEC) scheme is proposed to provide unequal error protection for different layers of JPEG2000 encoded multilayer bit streams.
用户安全模型使用消息鉴别码、加密和时间戳保护网管消息的传输安全。
Through MAC, encryption and timestamp, USM protects management messages from communication threats.
防护码技术的安全性在于其环环相扣――每个防护码所保护的代码段,都包含维护其他防护码的代码。
The security of the guards actually comes from guards watching each other's backs. Each guard protects fragments of code, and that includes protecting other guards.
提出一种新的不等保护分组码译码算法——树状图算法。
This paper presents a new decoding algorithm of unequal error protection (UEP) code, which is called tree topology.
说明如何协助保护方法不被部分受信任程序码呼叫。
Describes how to help protect methods from being called by partially trusted code.
首先回顾了LDPC码的有效编码,然后在此基础上提出了一种应用于不等错误保护的线性复杂度编码方法。
This paper firstly overviews the efficient encoding of LDPC codes, based on which we proposes a linear encoding for UEP.
本文采用了一种可生成多码率码的特殊的删余卷积码——RCPC码作为信道编码技术,以实现不等差错保护机制(UEP)。
Unequal error method is done. Rate compatible punctured convolutional code—RCPC is adopted as the channel coding to carry out the UEP.
保护栏位是为了帮助防止外部程式码变更它的值,但可让衍生类别存取。
The field is protected to help prevent outside code from changing its value while allowing derived classes to access it.
若要保护应用程序,请仔细研究这个主题,彻底了解程序码的安全性问题。
To protect your applications, you should thoroughly understand code security issues by researching the subject.
您不能编辑文件中受保护的部分,但是仍然可以在程序码编辑器中撰写程序码,让文件自动化。
You cannot edit the protected parts of the document, but you can still write code in the code Editor to automate the document.
例如,敏感资料(例如社会注册码或密码)需要加以保护,让任何未设定它的元件无法进行存取。
For example, sensitive data, such as a social registration number or a password, needs to be protected from access by any component that did not set it.
能够安全保护资源不受到参考组件中未受信任程序码存取的唯一方式,是使用没有包含这些使用权限的授权集来执行程序码。
The only way to securely protect resources from untrusted code in referenced assemblies is to execute that code with a grant set that does not include those permissions.
消费者权益保护机构本周调查了五大证件激增的网站,并且发现许多折扣码已经过时或者早已失效。
Consumer group this week investigated the five biggest voucher sites, and found that many discount codes are out of date or didn't work at all.
完全信任的使用权限集合会略过安全性检查,并授与程序码存取所有受保护资源的权限。
The full-trust permission set bypasses security checks and grants code access to all protected resources.
程序库开发人员必须保护程序码,防止部分受信任应用程序未经授权对其进行存取。
Library developers must protect their code from unauthorized access from partially trusted applications.
详细研究了无线at M交换机的信道特性,提出了对AT M信元进行保护的RS码编码方案,并且论证了该方案的可行性。
The channel characters of wireless ATM switcher have been discussed in detail, the rs coding scheme to protect ATM cells is put forward and the feasibility of this scheme is proved.
堆叠查核行程要求呼叫堆叠中的所有程式码都必须具有存取受保护资源的使用权限。
The stack walk requires that all code in the call stack has permission to access a protected resource.
堆叠查核行程要求呼叫堆叠中的所有程式码都必须具有存取受保护资源的使用权限。
The stack walk requires that all code in the call stack has permission to access a protected resource.
应用推荐