• 另外首席安全首席信息可能需要表述控制其他业务指示

    There are other businesses directives that a Chief Security Officer or a Chief Information Officer might need to express and control.

    youdao

  • 文档控制安全:目的是为了管理业务为主的信息访问以及使用数字签名验证文档的真实性。

    Document control and security: for managing access to business-critical information and certifying document authenticity with digital signatures.

    youdao

  • 有关如何使用registrySYSTE m属性控制用户登录更多信息阅读AIX安全指南”和参考资料部分所列出文章

    For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.

    youdao

  • 包含针对所有Cognos对象安全名称空间信息以及访问控制策略

    It also contains security namespace information and access control policies on all the Cognos objects.

    youdao

  • 本文将向介绍如何TechnologyExplorer中使用db2auth安全插件控制db2用户身份验证(参见参考资料了解db2auth的详细信息)。

    This article teaches you how the Technology Explorer can control user and group authentication to db2 through the use of a security plug-in called db2auth (see Resources for more about db2auth).

    youdao

  • 全局变量另一重要方面考虑信息安全问题时,可以控制信息访问

    Another important aspect of global variables is that when security of the information is an issue, controlling access is possible.

    youdao

  • 架构需要涉及许多问题安全访问控制服务水平协议,直到业务工作流事件处理信息管理和业务规则。

    The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.

    youdao

  • 规则控制如何安全进行专门化每种新的信息类型必须映射一个已有信息类型,而且必须允许内容更多限制

    Rules govern how to specialize safely: Each new information type must map to an existing one, and must be more restrictive in the content that it allows.

    youdao

  • 多种来源信息整合在一起将带来包括访问控制在内的安全问题

    Pulling together information from a variety of sources also carries with it security concerns, including access control.

    youdao

  • 全局变量另一重要方面考虑到信息安全时,可以访问进行控制

    Another important aspect of global variables is that where security of the information is an issue, controlling access is possible.

    youdao

  • 解锁信息可以混合转换符合环境应用程序特定需求要求安全控制通过企业标准进行管理。

    The "unlocked" information can be mixed and transformed to meet specific needs and the demands of situational applications, while security and governance are managed to enterprise standards.

    youdao

  • 操作系统安全与否直接决定着信息是否安全因而系统文件系统安全方面在系统资源使用方面的控制就变得越来越重要

    Whether the security of operating system is determining directly safety of information, thus the control for in system resource use and file system safe become more and more important.

    youdao

  • 访问控制模型信息安全领域研究重点之一。

    The research of access control model is a topic of information security area.

    youdao

  • SiteMinder一种安全软件解决方案,能实现整个组织安全身份管理控制企业信息资产访问

    SiteMinder is a security software solution that securely manages identities across an organization, controlling access to enterprise information assets.

    youdao

  • 使命制造(Mission Maker)”网络安全方案包括将网络安全嵌入指挥控制增加作为态势感知要素提高信息作战能力

    The “Mission Makerinitiatives for cyber security include embedding cyber security into command and control, adding it as an element of situational awareness, and enhancing information operations.

    youdao

  • 大多数Facebook用户可能不知道,网络实际上提供了一些私有控制安全功能帮助,是你信息变得更安全

    Unbeknownst to most mainstream Facebook users, the social network actually offers a slew of privacy controls and security features which can help you batten down the hatches, so to speak.

    youdao

  • 为了应对挑战,Max同事一起,以分布式信息控制(DecentralizedInformationFlow Control, DIFC)模型为基础,开发了开源web应用安全基础设施flume

    To respond to these challenges, Max and his colleagues have developed Flume, an open source web application security infrastructure based on a Decentralized Information Flow Control (DFIC) model.

    youdao

  • LulzSec同时分别发布条消息索尼攻击辩护这家公司控制敏感信息方法丢脸安全的”。

    LulzSec also separately posted a message justifying its attack on Sony, saying the company's approach to handling sensitive data was "disgraceful and insecure".

    youdao

  • 电力监控系统安全防护要求所建立生产控制大区管理信息大区的系统分区,较成体系地构建核电厂的系统分区框架

    Based on the system partition of the large area of production control and the area of management information, the system partition framework of the nuclear power plant is established.

    youdao

  • 身份认证访问控制信息系统防御主动攻击主要安全机制

    Identity authentication and access control are the major security mechanisms to defend active attack.

    youdao

  • 按照等级保护安全技术设计要求建立工业控制信息安全管理平台

    According to the design requirements of safety technology, the establishment of industrial control information security management platform.

    youdao

  • 网络安全目前信息系统应用重要研究方向如何确定用户身份控制用户对信息资源的访问,是其中的一个重要问题。

    Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.

    youdao

  • 评价公司内部控制系统有效性包括信息技术安全控制

    Consider the effectiveness of the company's internal control system, including information technology security and control.

    youdao

  • 这些导致企业无法成熟IT信息安全技术直接应用于工业控制系统信息安全保护

    All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.

    youdao

  • 通过分析提供信息负责人选择安全有效方式控制被识别出来危险

    With the information provided by analysis, responsible officials can determine the safest, most efficient means of controlling the hazards identified.

    youdao

  • 即使操作系统自身没有被屏蔽储存完全访问权限,所以入侵者即便控制了操作系统信息也是安全的。

    Even if the operating system itself are not shielded stored fully access control, so the invaders even operating system information is safe.

    youdao

  • 安全控制保障信息资源共享系统正常运行重要手段

    Security Control is an important means to ensure Information Resource Sharing System running in gear.

    youdao

  • 访问控制一直信息安全重要保证之一

    The access control is always one of the important guarantees of information security.

    youdao

  • 提出基于角色权限人员项目文档权限分配策略支持信息交流安全控制

    Furthermore - the security management policy of project document, based on role - security-personnel, is presented to support information communication and security control.

    youdao

  • 同时,通过划分用户权限编制安全控制软件保证整个罐区信息系统的安全

    At the same time we can set up different authority for different client and build security control software to guarantee the whole tank area information security.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定