• Part two, authentication of document that "pillaging with dangerous weapon"and"struggling, pounding, pillaging" convert into robbery.

    第二部分:“携带凶器抢夺聚众“打砸抢转化抢劫罪的适用。

    youdao

  • For this document we will only discuss the first step of identifying the type of logon data, the rest is specific to the authentication source being supported and hence off topic.

    对于文档我们讨论一步(识别登录数据类型),其他步骤支持身份验证而异,因此超出了范围。

    youdao

  • By trial and error, the attacker can check the various child nodes of the XML document and gather information by seeing if this XPath expression results in a successful authentication.

    凑法,攻击者可以检查XML文档各个节点通过查看这个XPath表达式是否能促成成功身份验证以收集信息

    youdao

  • A full discussion of the nuances of common serviceshow they're started, how they react to client, inherent security issues and authentication methodsis beyond the scope of this document.

    常见服务之间细微差别完整讨论-它们怎么启动、它们如何客户机作出反应其内在安全性问题认证方法-超出本文的范围

    youdao

  • In this document the background of the authentication process is provided along with descriptive information on how to use the provided SDK to handle SSO.

    文档中提供身份验证过程背景知识描述如何使用提供SDK处理SSO

    youdao

  • A document may be signed by handwriting, facsimile signature, perforated signature, stamp, symbol or any other mechanical or electronic method of authentication.

    单据可以通过、签样印制、穿孔签字盖章符号表示的方式签署,可以通过其它任何机械电子证实的方法签署。

    youdao

  • The JDBCSample was chosen for this document only because it's the only example of a full authentication provider.

    文档选用JDBCSample作为示例只是因为完整身份验证提供者的惟一示例

    youdao

  • This document describes the use of Kerberos as an alternative authentication mechanism to AIX.

    文档介绍如何将Kerberos作为一种用于AIX的备选身份验证机制

    youdao

  • This document describes the use of Kerberos as an alternative authentication mechanism to AIX using Windows 2000/2003 Server Kerberos Service.

    文档介绍了如何通过Windows 2000/2003ServerKerberosService使用 Kerberos作为AIX备选身份验证机制

    youdao

  • This document is meant to supplement the TM1 9.5 Operations Guide as it describes the task of configuring LDAP authentication for TM1 9.5 in greater detail.

    文档意在补充TM 1 9.5OperationsGuide详细地描述TM 1 9.5配置LDAP身份验证任务

    youdao

  • Applications of watermarking include not only copyright protection, but also document authentication, covert communications and data embedding, etc.

    数字水印技术应用除了版权保护包括内容认证隐蔽通信数据嵌入等等很多方面。

    youdao

  • This technique can be applied to author authentication of textual document.

    技术电子文档作者身份认证等方面具有很广的应用前景。

    youdao

  • This paper proposed a novel watermarking scheme for the authentication of business documents by embedding a piece of information in the binary document image.

    针对商业文档完整性保护问题,提出数字水印方案

    youdao

  • The document management apparatus determines validity of the authentication information contained in the request.

    文档管理设备确定该请求中包括验证信息有效性

    youdao

  • The document management apparatus determines validity of the authentication information contained in the request.

    文档管理设备确定该请求中包括验证信息有效性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定