• 通过网络运行软件软件解决方案中,身份验证授权私密性完整性不可否认性主要安全组件

    Authentication, authorization, privacy, integrity, and non-reputation are the major security components of software or a software-based solution working over the network.

    youdao

  • 利用DELPHI 6.0软件及其提供各种面向对象开发工具建立完整性安全好的数据库开发功能完备使用应用程序

    Delphi 6.0 and the use of object-oriented software development tools, the establishment of strong integrity, good safety database developed functions, easy to use applications.

    youdao

  • 而在系统健壮性方面采用系统进程隐藏硬件结合软件保护方法,保证系统自身安全完整性

    In system robust respect, this paper USES process hidden and software protected technical which combining software with hardware to insure system's integrality and security.

    youdao

  • 恶意主机环境下,主机可以软件系统进行逆向工程或者肆意的篡改,安全完整性可用性都受到了很大的威胁

    Reverse engineering has become possible or distorted wilfully for software system in malicious host surroundings, the security, integrity and availability of software system are threatened.

    youdao

  • 恶意主机环境下,主机可以软件系统进行逆向工程或者肆意的篡改,安全完整性可用性都受到了很大的威胁

    Reverse engineering has become possible or distorted wilfully for software system in malicious host surroundings, the security, integrity and availability of software system are threatened.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定