• Audit network access control and secure remote access systems.

    审计网络访问控制安全远程访问系统

    youdao

  • Thus, most cable TV Internet access systems will not be ready for several years.

    因此多数有线电视网络进入系统不会准备好几

    youdao

  • Similarly, electronic card access systems are used in many hotels and office buildings.

    同样电子卡接入系统许多饭店办公楼

    youdao

  • Local Multipoint Distribution access system is representative of broadband wireless access systems.

    本地多点分配接入系统宽带无线接入系统代表

    youdao

  • We introduce a hybrid radio network which consists of a backbone network and several access systems.

    首先提出了个未来网络体系结构,即复合无线网,一个骨干网几个接入网络组成。

    youdao

  • The wireless local loop system is one of tbe access systems that have emerged these years, and has many advantages lacking in other cable systems.

    无线本地环路系统近年兴起接入系统之一,它具有许多有线系统所没有优点

    youdao

  • To make life faster and more convenient, people eager to speak can be resolved through a number of matters, such as voice dialing, voice access systems, voice input and so on.

    为了使生活更加快捷、方便,人们渴望通过说话就可以解决一些事务语音拨号、语音门禁系统、语音输入

    youdao

  • Because of the ability to combat multipath interference and high spectral efficiency, OFDM has become the first choice of physical layer technology in future broadband wireless access systems.

    OFDM技术以其良好抗多干扰能力频谱利用率成为未来宽带无线接入系统首选物理层技术

    youdao

  • Then introduces the pulse waveform, the architecture of the UWB transceiver, the fading models of the signal, the indoor channel models, at last some multiple access systems are presented as follow.

    接着介绍了超宽带脉冲形成方式、调制方式、收发机系统结构信号衰减模型室内信道模型以及各种多系统,为后面章节做好铺垫。

    youdao

  • The codes—which typically range in price from $80 to $155 per course—give students online access to systems developed by education companies like McGraw Hill and Pearson.

    这些访问码的价格通常门课程80美元155美元之间不等,学生需要通过这些访问码才能在线使用麦格劳·希尔培生等教育公司开发系统

    youdao

  • Intruders might invade your systems for one of two reasons: to gain access to information that they should not have or to alter the behavior of a system.

    入侵者入侵系统可能是出于这两个原因之一为了获取他们应该拥有信息或者为了改变系统行为

    youdao

  • All too often breaches are caused by simple blunders, such as failing to separate systems containing sensitive data from those that do not need access to them.

    很多情况下,破坏简单失误造成的,比如未能包含敏感数据系统需要访问这些数据的系统分离开来。

    youdao

  • Developers also have easy access to operating systems they might not otherwise be able to install on their desktops.

    开发者可以容易访问平时他们桌面系统上不易安装操作系统。

    youdao

  • Now you can access the cloned file systems.

    现在可以访问克隆文件系统

    youdao

  • Describe their location, systems, access approaches, source data traffic and update frequency, data security, and data quality.

    描述位置系统访问方法数据流通更新频率、数据安全性和数据质量

    youdao

  • Access to other operating systems.

    访问其他操作系统

    youdao

  • Double key secure authentication is one of the protection methods used to verify access across different systems.

    双重密钥安全认证用于验证不同系统访问保护方法之一

    youdao

  • Answer: With a J2EE application, all users of the application use the same login to access backend systems.

    对于J2EE应用程序所有用户使用同样登录信息访问后端系统

    youdao

  • The portal can access disparate systems, aggregate content and data, and then present it to the end user with one common look-and-feel.

    门户可以访问完全不同系统汇总内容数据以及内容数据以一种常见外观呈现最终用户

    youdao

  • That is, by tricking the human beings that work for your organization, attackers are able to gain access to systems and information to which they should not have access.

    就是说通过欺骗在组织工作人员攻击可以获得权限访问他们应该访问的系统信息

    youdao

  • What you'd really like is some way to allow the developers to access the systems while shielding them from the details.

    真正需要开发人员能够访问业务系统同时他们又不需要接触细节

    youdao

  • In proprietary access control systems, information about these entities and their attributes is kept in repositories.

    专有访问控制系统中这些实体及其属性信息保存资料库中

    youdao

  • You need to determine at what levels users and groups can access the systems and be granted based on their roles, responsibilities and applicable regulations and laws.

    需要确定用户可以哪些级别访问系统基于角色职责适用法律法规来授予权限。

    youdao

  • With version 3, considered the current version since 2004, the standard was improved with explicit authentication and access control systems.

    对于版本3(自从2004年以来最新版本),标准通过显式身份验证访问控制系统进行了改进

    youdao

  • That is, attackers are often able to gain access to systems and information to which they should not have access by tricking the human beings that work for an organization.

    就是说通过欺骗在组织中工作人员攻击可以获得权限访问他们应该访问的系统信息

    youdao

  • All APM systems access performance data sources and include facilities for collecting and tracing.

    所有APM系统能访问性能数据源提供数据收集跟踪实用工具

    youdao

  • The business requirement was to provide internal applications on disparate systems access to enterprise databases on legacy systems.

    业务需求完全不同系统之上提供内部应用程序访问遗留系统中的企业数据库

    youdao

  • The business requirement was to provide internal applications on disparate systems access to enterprise databases on legacy systems.

    业务需求完全不同系统之上提供内部应用程序访问遗留系统中的企业数据库

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定