• 非授权访问,实施攻击技术包括目录攻击伪造消息

    Unauthorized access using techniques such as dictionary attack and falsified message.

    youdao

  • 员工们需要采取一切必要的措施阻止对于这些信息非授权访问

    Employees should take all necessary steps to prevent unauthorized access to this information.

    youdao

  • 大多数时间不会针对基础设施用户非授权访问内容进行保护

    Most of the time, its content is not protected against unauthorized access from the users in this infrastructure.

    youdao

  • 特定页面访问使用J2EE声明性程序性安全限制,以禁止对页面的非授权访问

    Access to specific pages is restricted with J2EE declarative and programmatic security to protect the pages from unauthorized access.

    youdao

  • 中国电信不会任何由于原因导致的经因特网的任何授权访问所造成的损失破坏负责

    China Telecom will not be liable for any loss or damage suffered by you as a result of any unauthorised access to your account over the Internet.

    youdao

  • 机制有效阻止EPCIS系统和资源授权访问,从而确保对EPCIS访问安全性

    The mechanism can guarantee safe access to EPCIS system by preventing the unauthorized access to EPCIS system or resources.

    youdao

  • 我们感谢信任采取合理步骤保护在线提供个人信息,防止其丢失滥用非授权访问

    We acknowledge your trust and are committed to take reasonable steps to protect Personally Identifiable Information you provide online from loss, misuse, and unauthorized access.

    youdao

  • 可以配置WebspherePortal通过使用LDAP目录进行身份验证从而避免非授权访问

    You configure Websphere Portal to avoid unauthorized access by using an LDAP directory for authentication.

    youdao

  • 可以使用另一个未经授权处理任务用户身份登录确保不管是否应该To -do列表中显示任务,授权访问可以正常运行

    You will log on as another user not authorized to work on the task to make sure unauthorized access is also working as it should and not show the task in the user's To-Do list.

    youdao

  • 已经学习了如何ApacheGeronimo应用服务器创建并且部署应用程序保护目录内容非授权访问

    You've learned how to create and deploy an application on the Apache Geronimo application server, securing directory content from unauthorized access.

    youdao

  • 实现信息系统安全目标,需要系统能够提供相关安全服务身份标识认证服务、授权访问控制服务、否认服务、机密性服务、完整性服务。

    Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.

    youdao

  • 实现信息系统安全目标,需要系统能够提供相关安全服务身份标识认证服务、授权访问控制服务、否认服务、机密性服务、完整性服务。

    Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定