• You need more than defense in depth.

    不仅需要深度防御。

    youdao

  • It's all meant to provide defense in depth.

    为了提供深度防护

    youdao

  • What are some tangible examples of defense in depth?

    深度防御具体例子哪些

    youdao

  • Offers greater levels of data protection through defense in depth.

    通过深度防御来提供更高级别数据保护

    youdao

  • In addition to this criteria they have the concept of Defense in Depth.

    除了这个标准他们也还有纵深防御概念

    youdao

  • As with anything else, defense in depth is a balance between security and utility.

    任何事情一样,深度防御也是安全性适用性之间平衡

    youdao

  • The idea behind defense in depth is simple: Never rely on just one security method.

    深度防御背后理念简单永远不要依赖一种安全方法

    youdao

  • When it comes to safety, the nuclear industry emphasizes the concept of "defense in depth."

    谈到安全问题工业界强调纵深防御概念

    youdao

  • Part 10 of this article series discussed how you can use defense in depth to protect your SOAs.

    系列文章第10部分讨论了可以如何使用深度防御保护SOA

    youdao

  • Good security provides defense in depth; using more than one approach is not necessarily a bad thing.

    良好安全性可提供深度防御使用多种方法并不一定是坏事。

    youdao

  • External attackers are those who must traverse your "defense in depth" to try and break into your systems.

    外部攻击者那些必须透过的“深度防御试图闯入系统的人。

    youdao

  • To improve security, it's often wise to use more than one method of protection (also called "defense in depth").

    提高安全性明智做法是使用多种保护方法(称为“深度防御”)。

    youdao

  • To show how the defense in depth works, we will first examine a centric model of three primary layers: core, middle, and outermost.

    为了演示深度防御工作原理我们首先研究包含三个主要层次的中心模型核心层中间层最外层。

    youdao

  • Now the strategy of the NRC in term of defense in depth is obviously first of all design the plant such that accidents are prevented.

    现在NRC关于纵深防御策略,很明显所有电站设计第一个,这样能防止事故的发生。

    youdao

  • We believe that the only viable strategy for authenticating users is to apply the defense in depth principle, mixing a number of authentication techniques.

    我们相信用于认证用户唯一可行策略是以深度原则应用防御混合多种认证技术。

    youdao

  • It is quite possible to treat a defense in depth framework as the orchestrator of the smaller defense in depth players due to the global nature of an organization.

    有可能由于组织全球特性而将深度防御框架作为更小深度防御组件的协调机构对待

    youdao

  • Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.

    深度防御可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵机器问题

    youdao

  • A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.

    公司用于检测漏洞保护s OA基础结构业务策略中包含用于目标和攻击之间多个SOA深度防御模型

    youdao

  • These are procedural steps following the "Depth in Defense" approach.

    承接纵深防御程序。

    youdao

  • This defense-in-depth model begins with technologies as the foundation using the following examples

    深度防御模型使用以下示例作为技术基础

    youdao

  • Defense in-depth is all about having redundant security measures in place — not only encryption but also smart handling of user-supplied data.

    深层防御多余安全方法妥善保管——不仅包括加密包括用户提供数据智能处理

    youdao

  • Defense-in-depth must be considered early in the design phase of the development process, and must be an integral consideration in all technical decision-making associated with the network.

    防御纵深必须考虑开发过程设计阶段,必须在所有技术决策不可或缺考虑因素网络相关

    youdao

  • Thus, network defense-in-depth is imperative.

    因此网络纵深防御势在必行

    youdao

  • This paper first proposes one inner-net information defense system based on the depth defense and elaborates in detail the system composition structure and each module function.

    提出一个基于深度防御思想内网信息防御系统阐述系统组成结构作用模块的作用。

    youdao

  • Intrusion detection and prevention systems have become an essential technology in the deployment of a "defense-in-depth" security architecture.

    入侵检测防护系统已经成为部署“深度防护安全体系结构基本技术

    youdao

  • This thesis researches two technology measures of appling information assurance, they are Defense-in-Depth and Security Health Care.

    本文研究了实施信息保障两项技术措施纵深防御安全保健

    youdao

  • Proposes an IPS model based on defense-in-depth theory.

    然后提出一种基于深度防御原则的深度入侵防御系统模型

    youdao

  • Proposes an IPS model based on defense-in-depth theory.

    然后提出一种基于深度防御原则的深度入侵防御系统模型

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定