• Of course, when the client subscribed to the notification system it must have specified its SOAP messaging host as the target EPR of its messages, but the notification system is unaware of its use.

    当然如果客户机订阅通知系统,则必须指定SOAP消息传递主机作为消息目标E PR通知系统并不知道这种情况。

    youdao

  • The user name and password must match to a Windows user account on the target host system.

    用户密码必须目标主机系统Windows用户帐户匹配

    youdao

  • For the purposes of this article, the target host system used in all sample commands and output is called testhost.

    对于本文所有样例命令输出使用目标主机系统称为testhost

    youdao

  • Note: The SellAfterBuy.xsd was exported from Business Events and the host portion of the target namespace specified in this schema file may not match your Business Events system name.

    注意SellAfterBuy.xsdBusinessEvents导出模式指定目标命名空间可能BusinessEvents系统名称匹配

    youdao

  • According to the functions and performance guideline of the target design system, we propose the hierarchical design structure of video processing subsystem and host subsystem.

    根据目标系统功能性能指标分析,确定视频处理子系统主机系统分层设计结构

    youdao

  • The principal exploration target for the area is the drainage system that contains the calcrete and silcrete units that host the carnotite-bearing secondary uranium mineralisation.

    区域主要勘探目标含有钙质砾岩钒钾铀矿岩石单元水系,这些岩石赋存着含有钒钾铀矿的次生矿化带。

    youdao

  • Then I analyse the cross development method for embedded system, mentioned the "Host" and "Target" in the development of an embedded system.

    分析嵌入式应用系统交叉开发方法提出嵌入式系统开发中宿主机目标概念。

    youdao

  • By analyzing the networking character values actively and passively, attacker can get a lot of information about target host, such as the type of operating system.

    基于主动被动探测攻击目标分析数据网络特征可以得出攻击目标的操作系统类型重要信息,进而得出与之相关的系统漏洞,为入侵和攻击提供重要依据。

    youdao

  • Useful information could be abstracted from audit log of computers by most of host-based intrusion detection systems. Therefore, audit system become a target to be compromised by hackers or attackers.

    审计日志多种入侵检测系统重要信息来源因而审计系统就成为黑客攻击者对付的主要目标

    youdao

  • Useful information could be abstracted from audit log of computers by most of host-based intrusion detection systems. Therefore, audit system become a target to be compromised by hackers or attackers.

    审计日志多种入侵检测系统重要信息来源因而审计系统就成为黑客攻击者对付的主要目标

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定