桥梁安全结构的设计十分重要。
该网络安全结构具有良好的安全性。
论文研究的安全结构属于应用层安全性范畴。
Security structure in this paper belongs to application layer Security.
文章提出了一种支持应用类安全的操作系统安全结构框架。
This paper puts forward a new framework of operating system security supporting application class security.
正确分析风荷载对结构的动力作用是设计既经济又安全结构的重要保障。
Proper analysis of wind-force's dynamic effect on structures ensures economy and safety in designing structures.
RIM公司历经十数年研发创造出迎合全球企业用户最高安全需求的强大安全结构。
RIM has spent over a decade building a very strong security architecture to meet our enterprise customers' strict security requirements around the world.
本文对蓝牙技术的安全结构作了描述,详细介绍了蓝牙链路层和应用层的安全机制。
This paper presents the bluetooth security architecture, expounding the security system of the link layer and application layer.
研究了3gpp中移动通信的安全结构,对各个安全功能部分的基本需求进行了探讨。
A the security architecture of 3gpp is studied, the basic security requirements of each part are discussed.
从动态的观点来看,国家身份变动尤其是大周的身份变动将引起围际安全结构的变迁。
From a dynamic point of view, identity change of big powers can cause the transition of international security structure.
这意味着黑莓手机企业方案的用户不必担心妥协,在安全结构的整体结构中仍可保持隐私。
This means that customers of the BlackBerry enterprise solution can maintain confidence in the integrity of the security architecture without fear of compromise.
落物保护结构是在有坠落物体(如树木、岩石等)时,对司机提供适当保护的安全结构。
Falling-object protective structure (FOPS) can block objects (such as trees, rocks) so that it supplies protection for the operator.
展出的重点将是车身的安全结构部、汽车底盘的减振和转向系统以及发动机元件的多值性。
In particular we will be displaying intelligent safety parts for the body structure, damping and steering systems for the chassis, as well as engine components with added value.
本文基于三个因素:虚拟机、控制集以及分发类型,把迄今为止的应用级安全结构分为八种。
In this paper, we identify eight application-level security architectures based on the following three elements: Virtual Machine, Control Set, and Distribution Style.
本文描述AT M网络中的信息安全、可能受到的威胁、安全结构和端系统之间的鉴别技术。
This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.
通过对主动节点体系结构的分析,设计了主动节点安全结构模型,并对关键功能模块进行了详细分析。
Through analyzing the architecture of active nodes, the safe structure of the active node model id designed, and the key functional modules are analyzed.
从应用角度出发,介绍了SQLSERVER数据库系统的安全要求、安全结构以及安全性实现方法。
Starting with the application angle, the safe request, safety mechanism as well as the safe realization method of SQL SERVER database system were introduced in the article.
与传闻恰好相反,RIM的安全结构在世界各地同样安全,而且RIM不会向任何人泄露顾客的加密密匙。
Ontrary to any rumors, the security architecture is the same around the world and RIM truly has no ability to provide its customers' encryption keys.
随着第三代移动通信系统(3G)的出现,需构建一个能够解决3g将要面临的各种安全威胁的和谐同一的安全结构体系。
With the advent of 3g mobile systems a serious effort has been made to create a consistent security architecture based on the threats and risks a 3g system faces.
东北亚安全结构在冷战后呈现不稳定状态,进攻性现实主义关于建立均势和推卸责任的理论对东北亚安全竞争进行了较为全面深刻的理论分析。
The security structure in Northeast Asia, which has been instable since the end of the Cold War, is expounded in offensive realism, especially in the theory about balancing and buck? passing.
然后讨论了JDK的安全结构,着重比较了CDC和CLDC与JDK在安全方面的变化,分析这种变化所造成的CDC和CLDC设备在安全性方面的特点。
After that, we discuss the security architecture of JDk, compare the difference among CDC, CLDC and JDk, and analyse the resulting security characteristic of CDC and CLDC equipment.
这个域由两个安全结构主导:用户注册表(比如LDAP、LotusDomino或MicrosoftActiveDirectory)和一个授权策略数据库。
The domain is governed by two security structures: The user registry, such as LDAP, Lotus Domino, or Microsoft Active Directory, and a master authorization policy database.
只有在巴黎圣母院结构安全的情况下才能评估其损失总额。
The total amount of damage to Notre Dame Cathedral can be assessed only when its structure is considered safe.
然而,消防官员表示,在大教堂结构被认定为安全之前,不可能对其损坏情况进行全面清点。
However, fire officers have said a complete inventory of the damage will not be possible until the cathedral structure has been deemed safe.
这座教堂的结构不安全。
在不久的将来,他们将主要关注结构安全,更细粒度的层剥离和层迁移等。
In the near future, they will focus on on security by construction, finer-grained tier splitting, and tier migration.
它允许用户定义要使用的安全标签的结构。
It allows users to define the structure of the security label to be used.
安全函数存储在一个安全操作结构中,该结构包含必须受到保护的基本操作。
The security functions are stored in a security operations structure that covers the fundamental operations that must be protected.
安全函数存储在一个安全操作结构中,该结构包含必须受到保护的基本操作。
The security functions are stored in a security operations structure that covers the fundamental operations that must be protected.
应用推荐