TATA Advanced Systems, as the lead on the program, along with other TATA partners will be responsible for project management, security, software development, production, integration and delivery.
塔塔公司先进系统分部是该项目的领导者,它将与其他伙伴一起负责计划管理、安全、软件开发、制造、集成和交付等工作。
Some computer security experts propose that the best way to ensure computer security is to write software that isn't easily breached by viruses, worms and other hacker tricks.
一些电脑安全专家建议,确保计算机安全的最好方法是编写出一种不那么容易被病毒,蠕虫及其他黑客伎俩破环的软件。
Customers are increasingly demanding that IBM software be configurable to work seamlessly with other third-party software in their existing it and security infrastructures.
客户对IBM软件的可配置性需求不断提升,以便能与其现有的IT和安全性基础设施中的其他第三方软件实现无缝连接。
For free software, it offers a ton of features - syncing, sharing with other people, time travel between old and new notes, search, and encrypted security.
虽说是免费软件,但它还是提供了一大堆的功能——同步、和其他人分享、查看新旧条目、搜索和加密。
How software is configured and implemented can play just as pivotal a security role as any other steps that lead to that point.
软件如何配置和实现,像其他步骤那样扮演者关键的安全性角色。
Advancement in reverse engineering field upgrades the ability to analyze software, and on the other hand, it brings more challenge to software security.
逆向工程领域的进步,一方面提升了软件分析能力,另一方面,给软件安全带来更大的挑战。
We recommend that you install security software to help protect your computer from viruses and other security threats, and that you keep your security software up to date.
我们建议您安装安全软件,以帮助保护您的计算机免受病毒和其他安全威胁,并使您的安全软件更新。
According to the new XML Security specializations released by W3C and other software manufacturers, the functions such as XML Encryption, XML Signature and Security Tokens are accomplished.
本文根据W3C和其它软件标准化组织发布的最新XML安全性协议规范,实现了XML加密、XML数字签名和安全性令牌等功能。
In last month's newsletter, I introduced the notion of computer security, and explained how security testing is different from other types of software testing.
在上个月的通讯稿中,我介绍了软件保密性的概念,并且解释了保密性测试与其他类型的软件测试有何不同。
The way to design and implement security pattern library is given and it compares the method with other software design methods.
对安全模式库的构建方法进行分析,并与其他软件设计方法进行了比较。
Talk to your kids about the security and other risks involved with file-sharing and how to install the software correctly, if they're going to use P2P file-sharing at all.
如果你的孩子要使用P 2 P文件共享,告诉他们关于文件共享过程中的安全和其他风险,以及如何正确安装软件。
Talk to your kids about the security and other risks involved with file-sharing and how to install the software correctly, if they're going to use P2P file-sharing at all.
如果你的孩子要使用P 2 P文件共享,告诉他们关于文件共享过程中的安全和其他风险,以及如何正确安装软件。
应用推荐