• Most of the time, though, it pays to elevate your gaze a bit and think about security at the application architecture level.

    不过大多数时候,如果能将所关注内容提升一下考虑应用程序架构级别安全性,将颇有裨益。

    youdao

  • There are strict corporate security guidelines that are rigorously enforced,, including application architecture and code inspections, to ensure compliance.

    具有严格的企业安全指南得以严格执行确保这些指南得到了遵从,包括应用程序体系结构代码检查

    youdao

  • Consider the following skill and competency milestones for any application architecture security effort.

    对于任何应用程序架构安全工作,都要考虑以下技能能力里程碑

    youdao

  • The security architecture is made of a security gateway and an operating system library which tags data as it is being used by the web application.

    整个安全架构个安全网关操作系统组成,Web应用可使用该操作系统库标记数据

    youdao

  • Other key SaaS requirements, such as security, customization, Service-Oriented architecture (SOA), and integration, also affect the SaaS application architecture.

    其他关键SaaS需求比如安全性定制面向服务架构(SOA)集成影响SaaS应用程序架构。

    youdao

  • Other key SaaS requirements, such as security, customization, Service-Oriented Architecture (SOA), and integration impact the SaaS application architecture.

    其他重要SaaS需求安全自定义面向服务体系结构 (SOA)集成都会影响 SaaS应用程序的体系结构。

    youdao

  • It's important to understand the current security model, user roles, permissions and capabilities of the application. The following points helps in evaluating the maturity of security architecture.

    重要的是理解当前安全模型用户角色权限应用程序功能

    youdao

  • To address application-level security requirements of SaaS, your architecture should address authentication and authorization requirements. Two scenarios in this article illustrate.

    处理SaaS应用程序级安全需求体系结构应该处理身份验证授权需求。

    youdao

  • Suffice it to say that with the introduction of the J2EE Web application security architecture, we're reaping the rewards of nearly 10 years of trial and error, and it shows.

    可以说随着J2EEWeb应用程序安全体系结构引入我们不断10的反复试验有所收获,事实也表明了这一点。

    youdao

  • This paper presents the bluetooth security architecture, expounding the security system of the link layer and application layer.

    本文蓝牙技术安全结构作了描述,详细介绍了蓝牙链路应用层的安全机制

    youdao

  • The construction of postal agent insurance computer system is given in brief. Based on service architecture and function, the network architecture, application system and security are demonstrated.

    简单介绍邮政代理保险计算机系统建设情况,以业务结构功能为基础网络结构、应用系统及安全等方面进行了说明。

    youdao

  • Then we expound the principle and architecture of WAP, security of mobile devices and application fields of mobile electronic commerce.

    然后阐明无线应用协议WAP原理体系结构,以及移动设备安全技术和移动电子商务的应用领域

    youdao

  • The paper analyses a kind of terminal architecture of trusted computing platform, and discusses it's possible application mode. It can reference terminal security.

    文章分析了可信计算平台终端安全体系讨论了可信计算平台可能应用模式终端的安全防护能够起到一定的指导意义。

    youdao

  • With more application systems joining unified identity authentication serve, this system will play a more important role in the CERNET info security architecture. And network management is simpler.

    随着更多应用系统加入到统一认证服务系统将会在教科网信息安全体系发挥重要作用而且网络管理更加简单。

    youdao

  • With more application systems joining unified identity authentication serve, this system will play a more important role in the CERNET info security architecture. And network management is simpler.

    随着更多应用系统加入到统一认证服务系统将会在教科网信息安全体系发挥重要作用而且网络管理更加简单。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定