• 避免拟人化安全策略

    This is a safety net to avoid anthropomorphism.

    youdao

  • 使用这种可以采用安全策略包括

    Strategies for preserving security when using this package include.

    youdao

  • 安全策略什么样子呢?

    What does a good security policy even look like?

    youdao

  • 某些系统安全策略可能允许其他用户泄露密码

    Having stated the previous, it may not be the security policy of some systems to divulge passwords to other users.

    youdao

  • 对于目标采用相同安全策略进行保护。

    Both source and target tables are protected by the same security policy.

    youdao

  • 可以用来检验修改安全策略效果

    It can also be used to verify the effect of a new or changed security policy.

    youdao

  • 使用服务之前最终用户应该评估服务提供商安全策略

    An end user should evaluate a service provider's security policy before entering into a relationship.

    youdao

  • 通过适当、良好定义安全策略可以阻止增加风险

    This increased risk can only be prevented with proper, well-defined security.

    youdao

  • 这里表格列示安全default 的安全策略

    The table here lists the security policies for the security group default.

    youdao

  • EJB技术可以任何EJ b组件方法上实施方法安全策略

    However, EJB technology allows method-level security on any EJB component or method.

    youdao

  • 一些认为对于普通用户账户使用随机密码良好安全策略

    Some people suggest using random passwords for ordinary user accounts is good security policy.

    youdao

  • 一个数据只能受到保护该表安全策略安全标签保护

    Data in a table can only be protected by security labels that are part of the security policy protecting the table.

    youdao

  • 接下来根据安全策略度量资产相关业务风险级别

    Next, measure the level of business risk associated with your assets according to your security policies.

    youdao

  • 存储单元整体信息比如单元范围安全策略票证有效期

    It also stores the information about the cell as a whole, such as cell-wide security policy, ticket lifetimes, etc.

    youdao

  • 为了适用参加协作工作企业安全策略标准工具达成一致意见

    To agree what security policies, standards and tools are applicable to the enterprises participating in the collaborative efforts.

    youdao

  • 创建请求响应处理规则按照要求操作SOAP消息遵循所需安全策略

    Request and response processing rules are created to manipulate the SOAP message as required to conform to the desired security policy.

    youdao

  • SOA编程模型必须确保每个服务调用都符合请求者服务端点均有效安全策略

    An SOA programming model must ensure that each service invocation adheres to security policies that are valid for both the requester and service endpoint.

    youdao

  • 管理员能够定于安全策略授权项目经理选择对于他们项目最好的安全策略

    Administrators can define security policies upfront, and empower project managers to choose the policy that best applies to their project.

    youdao

  • 安全配置向导允许创建基于XML的安全策略它们可以应用服务器上

    The security Configuration Wizard allows you to create XML-based security policies, which can then be applied to your servers.

    youdao

  • 已经提供者实现安全另一可用服务客户配置该服务满足增强安全策略

    Security already implemented by cloud providers is one more available service that customers can configure to satisfy the their enhanced security policies.

    youdao

  • 连接断开之前显示不必要调用者消息下降自己安全策略级别以下

    The message displayed to the unwanted caller before the connection is broken will be down to your own security policy. However, one could have a message as shown below

    youdao

  • 有时候系统管理员希望实施不同安全策略这时就可能需要修改替换身份验证方法

    At times, the authentication methodologies may need modification or replacement when system administrators want to enforce different security policies.

    youdao

  • 注意只是一个示例安全策略可能规定了其他参数,而不是这里使用参数。

    Note that this is an example; you or your security policy might dictate additional parameters than are being used here.

    youdao

  • 答案这些应用还是在.NET沙箱中运行,所以跟浏览器一样遵守同样安全策略

    The response is that these applications still run inside a .NET sandbox and are subject to the same security policies that apply when running in the browser.

    youdao

  • 在线协作漏洞范围取决于项目复杂程度相似项目相互关系以及是否存在合适安全策略

    The range of online collaboration vulnerabilities depends on project complexity, interrelationships with similar projects, and whether the security policies are in place.

    youdao

  • 实际上证书类型选择应该基于理想安全策略企业是否准备建立维护一个证书撤销列表

    The choice should really be made based on the desired security policy and whether the enterprise is prepared to set up and maintain a certificate revocation list.

    youdao

  • 就有困难为了使SELinux有效需要一个安全策略来由SELinux执行。

    And there's the rub: to use SELinux effectively, you need to have a good security policy for SELinux to enforce.

    youdao

  • 通过查看用户账户覆盖系统默认设置情况,可以判断用户属性对于实现安全策略是否合法有效。

    Looking at the users overrides of system defaults, one can then determine if the attributes for the users set are valid according to the implemented security policy.

    youdao

  • 例如如果服务提供者安全策略声明要求使用加密消息ESB可以自动配置一个encryption中介

    For example, if a service provider's security policy declaration requires encrypted messages, the ESB can configure an encryption mediation automatically.

    youdao

  • 精心制定安全策略应该描述计算服务使用者提供者应该做什么可以提供者减少很多管理时间

    A carefully crafted security policy Outlines what cloud computing service consumers and providers should do; it can save providers many hours of management time if they develop a security policy.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定