• Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes. Specify the object (s) to transfer.

    可以传输数据存储过程引用完整性约束安全性索引请指定传输对象

    youdao

  • This article analyses the process and the character of the hacker attacking the computer and the hidden troubles in the library computer data, in order to protect computer 's security.

    一则真实入侵实例分析黑客人侵过程、常用手段、特征图书馆数据安全存在隐患、危害及防范措施。

    youdao

  • In the data transmission part security data transmission tunnel with C/S structure provides security data transmission between two ends.

    数据传输部分,构建了C/S结构安全数据传输隧道数据传输两端提供了安全的数据传输。

    youdao

  • This measure method supplies reliable data for security analysis and designing installed flange of steam turbine 's vane.

    此项技术可汽轮机叶片安装轮缘设计安全性分析提供可靠依据。

    youdao

  • How to insure the security of XML Web service, the most popular technology of transferring Web data, has become the key task of people 's research.

    作为目前使用广泛网络数据传输技术XML网络服务如何保证安全性成为人们研究的重点课题

    youdao

  • How to insure the security of XML Web service, the most popular technology of transferring Web data, has become the key task of people 's research.

    作为目前使用广泛网络数据传输技术XML网络服务如何保证安全性成为人们研究的重点课题

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定