• Security model is based on system security requirements which provide specification for system security requirements and logic structure of security architecture.

    安全模型基于系统安全需求建立模型,用于描述系统的安全需求安全体系逻辑构成

    youdao

  • Each of the homes has a security system and is wired for cable television.

    一家都安全系统装设有线电视线。

    《柯林斯英汉双解大词典》

  • With technical details of the security system already circulating on the Internet, instructions for cracking it will almost certainly make their way into the computer underground.

    由于保安系统技术资料因特网上流传,如何侵入系统的指令当然会流入非法人员所用计算机中。

    youdao

  • Understanding how a UNIX system places its data in its directories should be helpful in planning a volume configuration for your system to optimize performance and security.

    充分了解UNIX系统目录放置数据的方式,有助于系统制定配置计划从而优化性能安全性。

    youdao

  • HDCP has been less a security system than a tool for shaping the consumer electronics market, and that is unlikely to change.

    HDCP更多的作为影响消费电子市场格局的工具不是一个安全系统这个看起来不会改变。

    youdao

  • Managing security is a critical part of the job for any system administrator.

    对于任何系统管理员来说,安全管理工作非常关键的一部分

    youdao

  • Listing 7 shows some of the system calls counted when using DNS for security.

    清单7显示了使用DNS确保安全一些系统调用进行统计

    youdao

  • When planning the security model for your application, you must address both elements to make sure your system has a sufficient level of security.

    应用程序规划安全性模型时,必须处理好这两个元素确保系统具有足够安全性。

    youdao

  • Often the file system cannot fulfill the security guidelines for a project.

    文件系统常常不能完成项目安全性指导原则

    youdao

  • Access control. Enables the system to recognize security policies for groups of users.

    访问控制使系统能够识别用户安全性策略

    youdao

  • The real purpose of this new property loan policy is to boost credit support for building an a ordable housing system for social security purposes.

    新的房地产贷款政策目的在于建立社会住房保障体系提供信贷支持,从而促进社会的稳定。

    youdao

  • If possible, always try to preserve the state of the system for a security expert to review.

    如果可能的话一直保留系统状态以待安全专家检查

    youdao

  • By default, global security USES the local operating system user registry for authentication.

    默认情况下,全局安全性使用本地操作系统用户注册表进行身份验证。

    youdao

  • The Organization needs to grab hold of the core issues and key factors affecting regional security and put in place a full - fledged system for security cooperation.

    上海合作组织把握影响地区安全核心问题关键因素,建立更加完善安全合作体系

    youdao

  • As a system becomes more complex, the potential entry points for breach of security increase.

    随着系统变得更加复杂潜在泄密入口增多了。

    youdao

  • For added security, consider installing and configuring an Intrusion Detection System (IDS), such as Snort, on each machine.

    为了加强安全可以考虑所有机器上安装配置入侵检测系统(IDS),例如Snort

    youdao

  • This lets you map Notes IDs or Notes group IDs to external system security, thereby extending Domino security and mapping it to security policies already established for the external system.

    允许NotesIDs Notesgroup IDs映射外部系统安全性从而扩展Domino 安全性映射外部系统建立安全政策

    youdao

  • Authentication and Authorization extend the Equinox security model to allow for security in a distributed system.

    扩充Equinox安全模型认证授权增强分布式系统安全性

    youdao

  • For instance, the subject topic for security can both classify content about security and describe security within the Web site or help system content. Figure 5 illustrates this scenario.

    例如Security主题题目可以安全性内容进行分类,又可以描述Web站点帮助系统内容中的安全性。

    youdao

  • Beneath all the capabilities of the WebSphere Integration Reference Architecture are the management services for security, directory, system management, and resource virtualization.

    位于WebSphereIntegrationReferenceArchitecture所有功能之下安全性目录系统管理资源虚拟化管理服务

    youdao

  • Informix integrates operating system security functions for user authentication and network permissions.

    Informix集成了操作系统安全性功能来对用户进行身份验证管理网络权限

    youdao

  • These permissions are changeable by using the chmod command and are generally good enough for most of the file security on the system.

    可以使用chmod命令修改这些权限一般来说它们足以保证系统大多数文件安全性

    youdao

  • Figure 5 shows the location of the two required header files for implementing security plug-ins on a Windows system.

    5展示了在Windows系统实现安全性插件所需两个文件位置

    youdao

  • He chose Fedora as the operating system for its frequent security updates, its RPM-based package-management system, and its quantity of prepackaged software pertinent to servers.

    选择使用Fedora作为操作系统,用于管理常用安全更新基于RPM的包管理系统,以及与服务器相关的软件包

    youdao

  • Although the user list for the Web server and the operating system could be unified, usually they are kept separate for security, performance, and implementation purposes.

    尽管可以统一Web服务器操作系统用户列表,但通常出于安全性性能实现目的考虑而将它们保持分离

    youdao

  • Set the root password for the new installed system (system Security field).

    安装系统设置密码(System Security字段)。

    youdao

  • Trend has also released today a new version of its Deep security product, a clientless security system for both physical and virtual servers.

    Trend昨天发布了版本DeepSecurity产品实体虚拟服务器的免客户端安全系统

    youdao

  • One final option for increasing security within operating systems is operating system virtualization (also called virtual private servers).

    增强操作系统内部安全性最后一个选择操作系统虚拟化(称为虚拟专用服务器(virtual private servers))。

    youdao

  • Logging is highly configurable, and logs can even be stored on a separate system for security or backup purposes.

    日志高度可配置的,为了安全和备份,日志甚至可以存储单独系统中。

    youdao

  • Later, I worked in finance and you don't build a system for a bank that lacks security.

    后来金融界工作,又学习到建设一个缺乏安全银行系统是行不通的。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定