Through using the digital certificates to structure systematic security, such as campus network's server security, E-mail security, All-purpose Card and so on.
通过使用数字证书构建校园网服务器安全、校园网电子邮件安全、校园网一卡通等系统的安全。
In the main text of the current of the more common email security policy analysis and research unit for my actual email by setting appropriate security policies, improve the unit's E-mail security.
文中主要对当前较为普遍的邮件安全策略进行分析研究,针对我单位的实际情况,通过设置合适的邮件安全策略,提高本单位的邮件安全性。
As for spam, ISPs (including mail service providers) could limit their users to, say, 100 e-mails a day; for more, you have to pay or at least post a security bond, or pass some good behavior test.
对于垃圾邮件,网络服务商(包括邮件服务商)应该对用户有所限制,比如说每天只能发一百封邮件,更进一步说,你得付费,或至少发布安全债券,或通过一个好的行为测试才行。
In the near future, many organizations will, for example, dispense with their own infrastructures for E-mail, backup, and security - and save costs by renting instead.
在不远的将来,很多组织会将其基础设施如邮件,备份和安全系统迁移至SaaS应用,以租赁方式来节省开销。
There, you'll see an option to reset your security token and have it sent to your E-mail address. After you have your security token, use it in combination with your password to log in.
这里,可以看到一个重置安全令牌并将其发送到您的电子邮件地址的选项,有了安全令牌后,将它与您的密码一起用于登录。
The application testing team has access to all the confidential data for these citizens, including their Social Security Numbers, E-mail IDs, credit card Numbers, annual income, and so on.
应用测试团队可以访问所有这些公民的机密数据,包括其社会安全号、电子邮件ID、信用卡号、年收入等。
The mobile device tends to loosen its security policy to allow access to device services such as local E-mail boxes.
移动设备可能放松安全策略,以允许访问本地电子邮箱之类的设备服务。
It occured to me yesterday in my class that maybe someday there won't be social security Numbers anymore, and on birth everybody will be given an E-mail address.
我昨天上课的时候想到,或许有天大家出生时,得到的将不是社会福利号码,而是一个邮箱地址。
But as anyone who's ever waited impatiently for an E-mail to download can tell you, for data speed, security, and safety, it's better to stick with on-premise hardware.
不过,就像经历过不耐烦地等待一封邮件下载完成的人所告诉你的那样,对于数据速率、保密以及安全来说,还是依靠备用硬件更好些。
NEWSWEEK PAKISTAN's Fasih Ahmed recently conducted an E-mail interview with the nuclear scientist hailed as a hero inside his own country and a threat to global security outside of it. Excerpts.
巴基斯坦的新闻周刊记者FasihAhmed最近与这位被巴基斯坦人民视为英雄,却被国际世界看作全球安全威胁的核科学家,进行了一次邮件访问。
NEWSWEEK PAKISTAN's Fasih Ahmed recently conducted an E-mail interview with the nuclear scientist hailed as a hero inside his own country and a threat to global security outside of it.
巴基斯坦的新闻周刊记者FasihAhmed最近与这位被巴基斯坦人民视为英雄,却被国际世界看作全球安全威胁的核科学家,进行了一次邮件访问。
For example, the Authentication Processing Filter (which I discuss next) stores user information such as username, password, and E-mail address in the security context.
比如,AuthenticationProcessingFilter(我将稍后进行介绍)将用户信息(如用户名、密码和电子邮件地址)存储在安全上下文中。
Despite all the reports of Internet security breaches over the years, including the recent attacks on Google's E-mail service, many people have reacted to the break-ins with a shrug.
尽管过去几年,经常有报道发现互联网安全漏洞,包括最近对GoogleGmail服务的攻击,但许多人对黑客攻击仍不以为然。
Based on the security mode for your CLR assembly, you can execute SQL using ADO.NET, send E-mail, log events, and perform any other action that is available to you through the.net framework.
根据CLRassembly的安全模式,您可以使用ADO.NET执行SQL、发送e - mail、记录事件和执行. NETframework允许的任何其他操作。
The SecureMail system introduced in this paper expands and completes the traditional E-Mail system with the information security technology.
本文介绍的安全电子邮件系统通过信息安全技术对传统的电子邮件系统进行扩展和完善。
E-mail filtering is becoming a research hotspot in network information security area.
电子邮件过滤是网络信息安全研究的热点。
E-mail worms may cause the spread of Internet spam and threaten the security of Internet.
电子邮件蠕虫是引起因特网中垃圾邮件泛滥的原因之一,严重威胁着因特网。
This paper proposes a new scheme for security E-mail based on authentication management which gives fine-grained approaches to E-mails limit control to implement security management of E-mail.
本文提出了结合密码技术,基于授权管理的安全电子邮件方案,对电子邮件进行细粒度权限控制,实现电子邮件的安全管理。
Requests for E-mail system in Chengdu-Deyang-Mianyang region's networked manufacturing system are analyzed according to its practical command. Especially, its security is discussed deeply.
根据成、德、绵区域网络化制造系统的实际需要,分析了网络化制造系统中邮件系统的各种要求,尤其对其安全性进行了深入的探讨。
Requests for E-mail system in Chengdu-Deyang-Mianyang region's networked manufacturing system are analyzed according to its practical command. Especially, its security is discussed deeply.
根据成、德、绵区域网络化制造系统的实际需要,分析了网络化制造系统中邮件系统的各种要求,尤其对其安全性进行了深入的探讨。
应用推荐