Audit network access control and secure remote access systems.
审计网络访问控制和安全远程访问系统。
Thus, most cable TV Internet access systems will not be ready for several years.
因此,多数有线电视网络进入系统不会准备好几年。
Similarly, electronic card access systems are used in many hotels and office buildings.
同样,电子卡接入系统是用在许多饭店和办公楼。
Local Multipoint Distribution access system is representative of broadband wireless access systems.
本地多点分配接入系统是宽带无线接入系统的代表。
We introduce a hybrid radio network which consists of a backbone network and several access systems.
首先提出了一个未来网络的体系结构,即复合无线网,它由一个骨干网和几个接入网络组成。
The wireless local loop system is one of tbe access systems that have emerged these years, and has many advantages lacking in other cable systems.
无线本地环路系统是近年来兴起的接入系统之一,它具有许多有线系统所没有的优点。
To make life faster and more convenient, people eager to speak can be resolved through a number of matters, such as voice dialing, voice access systems, voice input and so on.
为了使生活更加快捷、方便,人们渴望通过说话就可以解决一些事务,如语音拨号、语音门禁系统、语音输入等。
Because of the ability to combat multipath interference and high spectral efficiency, OFDM has become the first choice of physical layer technology in future broadband wireless access systems.
OFDM技术以其良好的抗多径干扰能力和高频谱利用率成为未来宽带无线接入系统的首选物理层技术。
Then introduces the pulse waveform, the architecture of the UWB transceiver, the fading models of the signal, the indoor channel models, at last some multiple access systems are presented as follow.
接着介绍了超宽带的脉冲形成方式、调制方式、收发机系统结构、信号衰减模型、室内多径信道模型以及各种多址系统,为后面的章节做好铺垫。
The codes—which typically range in price from $80 to $155 per course—give students online access to systems developed by education companies like McGraw Hill and Pearson.
这些访问码的价格通常在每门课程80美元到155美元之间不等,学生需要通过这些访问码才能在线使用麦格劳·希尔和培生等教育公司开发的系统。
Intruders might invade your systems for one of two reasons: to gain access to information that they should not have or to alter the behavior of a system.
入侵者入侵您的系统可能是出于这两个原因之一:为了获取他们本不应该拥有的信息,或者为了改变系统的行为。
All too often breaches are caused by simple blunders, such as failing to separate systems containing sensitive data from those that do not need access to them.
很多情况下,破坏是由简单的失误造成的,比如未能将包含敏感数据的系统与不需要访问这些数据的系统分离开来。
Developers also have easy access to operating systems they might not otherwise be able to install on their desktops.
开发者也可以容易的访问平时在他们的桌面系统上不易安装的操作系统。
Now you can access the cloned file systems.
现在可以访问克隆的文件系统。
Describe their location, systems, access approaches, source data traffic and update frequency, data security, and data quality.
描述其位置、系统、访问方法、源数据流通和更新频率、数据安全性和数据质量。
Access to other operating systems.
访问其他操作系统。
Double key secure authentication is one of the protection methods used to verify access across different systems.
双重密钥安全认证是用于验证跨不同系统访问的保护方法之一。
Answer: With a J2EE application, all users of the application use the same login to access backend systems.
答:对于J2EE应用程序,所有用户都使用同样的登录信息来访问后端系统。
The portal can access disparate systems, aggregate content and data, and then present it to the end user with one common look-and-feel.
门户可以访问完全不同的系统、汇总内容和数据,以及将内容和数据以一种常见的外观呈现给最终用户。
That is, by tricking the human beings that work for your organization, attackers are able to gain access to systems and information to which they should not have access.
也就是说,通过欺骗在您的组织中工作的人员,攻击者可以获得权限以访问他们本不应该访问的系统和信息。
What you'd really like is some way to allow the developers to access the systems while shielding them from the details.
您真正需要的是,让开发人员能够访问业务系统,同时他们又不需要接触到细节。
In proprietary access control systems, information about these entities and their attributes is kept in repositories.
在专有访问控制系统中,这些实体及其属性的信息保存在资料库中。
You need to determine at what levels users and groups can access the systems and be granted based on their roles, responsibilities and applicable regulations and laws.
需要确定用户可以在哪些级别访问系统,并基于其角色、职责和适用法律法规来授予权限。
With version 3, considered the current version since 2004, the standard was improved with explicit authentication and access control systems.
对于版本3(自从2004年以来的最新版本),该标准已通过显式身份验证和访问控制系统进行了改进。
That is, attackers are often able to gain access to systems and information to which they should not have access by tricking the human beings that work for an organization.
也就是说,通过欺骗在组织中工作的人员,攻击者可以获得权限以访问他们本不应该访问的系统和信息。
All APM systems access performance data sources and include facilities for collecting and tracing.
所有APM系统都能访问性能数据源并提供数据收集和跟踪实用工具。
The business requirement was to provide internal applications on disparate systems access to enterprise databases on legacy systems.
业务需求是,在完全不同的系统之上提供内部的应用程序来访问遗留系统中的企业数据库。
The business requirement was to provide internal applications on disparate systems access to enterprise databases on legacy systems.
业务需求是,在完全不同的系统之上提供内部的应用程序来访问遗留系统中的企业数据库。
应用推荐