第一种脆弱水印方案更适合于数据精度要求高、集中式网络模式的数据完整性保护;
The first fragile watermarking scheme is more suitable for high precision data in the traditional network model of integrity protection;
讨论了第3代移动通信系统的空中接口安全保护技术,包括数据机密性保护、数据完整性保护。
The air interface security technologies for the protection of data confidentiality and data integrity in 3g are discussed.
此外,EMCEFD也使用全双工错误修正码(ECC)数据完整性保护和离线电源备份来保护数据。
Additionally, EMC EFDs safeguard data with full round-trip error correcting code (ECC) data integrity protection and destage power backup.
以前的NFS版本都没有这种能力,因此不能对保护的质量、数据的完整性、认证的要求或加密类型进行协商。
Past NFS versions did not have this ability and therefore could not negotiate for the quality of protection, data integrity, the requirement for authentication, or the type of encryption.
需要用某种形式的加密技术保护数据的机密性和完整性。
Some form of encryption is needed to protect confidentiality and integrity of data.
更重要的是,您知道当对相关表执行DML操作时这些规则如何保护数据完整性吗?
More importantly, do you know how these rules work to safeguard data integrity when DML operations are performed against tables that are related?
ZFS内嵌入的是重要功能集(如快照、即写即拷克隆、连续完整性检查和通过RAID - Z的数据保护)的实现。
Embedded within ZFS is an implementation of an important set of features such as snapshots, copy-on-write clones, continuous integrity checking, and data protection through RAID-Z.
DB 2既可阻止此类操作被执行,也尝试以这种保护数据完整性的方式执行这些操作。
DB2 can either prevent such operations from being performed, or it can attempt to perform these actions in a way that will safeguard data integrity.
但是在您定义RI时,要记住,当对相关表执行dml操作时,需要一些规则来保护数据完整性。
But when you define ri constraints, keep in mind that there are rules in place to safeguard data integrity when DML operations are performed against related tables.
对于非原子we b流还是强烈推荐使用乐观锁来保护每个用户操作的数据完整性。
Optimistic locking is still highly recommended for non-atomic Web flows to protect the data integrity of each user action.
这个标准为每扇区都增加了一个数据完整性字段(DIF)以保护介质上的数据。
This standard adds a data integrity field (DIF) to each sector to maintain data protection on the medium.
另外,所有XML数据都受到用于保护传统关系数据的安全和数据完整性控件的保护。
In addition, all XML data is protected by the same security and data integrity controls that protect the traditional relational data.
事务通过撤销所有潜在的不完整操作来保护数据库中的数据完整性。
A transaction protects data integrity in your database by undoing any potentially incomplete operations.
在这些环境中 ——特别是在Internet上,保护Domino服务器的安全对于确保数据的完整性和 Web站点的可用性来说至关重要。
Securing the Domino server in these environments is very important to ensure both the integrity of the data and the availability of the Web site, especially on the Internet.
逻辑完整性是指对数据库逻辑结构的保护,包括数据的语义完整性与操作完整性。
Logical integrity refers to the logical structure of the database protection, including the semantic integrity and operational integrity.
当网络数据包在客户端和服务器之间进行传输时,使用RSA_TLS加密可保护它们的保密性和完整性。
RSA_TLS encryption protects the confidentiality and integrity of network packets as they pass between the client and the server.
在可信计算平台的维护过程中,需要保证保护数据的完整性,安全性和可用性。
In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.
结果表明该算法能够满足保护需求,初步解决了通信数据的完整性和一致性问题。
Analysis results show that this algorithm satisfied the requirement of protection and solve the consistency and integrity problem of communication data.
数据完整性是数据库保护的重要内容。
The data integrity is an important content of the database protection.
反曲目7是您保护您的隐私,敏感数据,联机身份和维护您的计算机的完整性完整的解决方案!
Anti Tracks 7 is your complete solution for protecting your privacy, sensitive data, online identity and maintaining the integrity of your computer!
数据通信的机密性和完整性保护对LDAP目录服务具有重要意义,通常采用数据加密和消息摘要技术来实现,LDAP自身对此的支持还不太完善。
Confidentiality and integrity are very important to LDAP services, often implemented with encryption and message digest techniques. LDAP does not support these two well.
它可以提供256位高强度数据加密、完整性验证、基于PKI的身份认证以及抗重播保护功能,最大限度地对上层应用提供安全保护。
It can provide high strength (with key of 256bits) encryption, integrality validation, identity authentication based on PKI, and anti-replay protection for upper layer application.
鉴于存储器是数据最主要的驻留场所,因此,防范攻击首要的是对处理器的片外存储器进行保护,其关键技术手段包括存储器的机密性和完整性保护。
Since memory is the primary place to store the data, the most effective way to against attack is the protection of off-chip memory, i. e. confidentiality protection and integrity protection.
即使是近期的内存保护技术,例如数据分割、分页、保护秘钥和模拟分割都无法确保数据的完整性。
Even recent memory protection techniques like segmentation, paging, protection keys and simulated segmentation flunks to assure data integrity.
在介绍了内存数据库的组织形式之后,本文重点分析了索引HASH算法以及数据完整性和一致性保护。
After introducing the organization form of the memory database, it focuses on the HASH arithmetic of index and protection of integrity and consistence of the data.
SSL保护数据不被改变(数据完整性),保护用户的标识(保密性),并保证数据来自预期客户(身份验证)。
SSL protects against data being altered (data integrity), protects a user's identity (confidentiality), and assures that data originates from the expected client (authentication).
没有被完全记录的那个事务不能被滚回,为保护数据库完整性,操作系统结束该事务并将它自动滚回。
A transaction that is not fully recorded cannot be rolled back. To preserve database integrity, the operating system ended the transaction and rolled it back automatically.
此安全协议能够有效保护数据完整性、保护信息的不可抵赖、防止重发攻击等。
This security protocol can effectively protect the integrity of the data, protect data keep from bluff it, and prevent heavy hair attack, etc.
新控制器使以太网的传送比率提高了十倍,包括保护数据完整性的信任文件系统。
The new controllers also feature a 10 times increase in Ethernet throughput for greater data transfer rates, and they include Reliance file system support to protect data integrity.
新控制器使以太网的传送比率提高了十倍,包括保护数据完整性的信任文件系统。
The new controllers also feature a 10 times increase in Ethernet throughput for greater data transfer rates, and they include Reliance file system support to protect data integrity.
应用推荐