When another user requires access to the file, their security credentials are verified before being granted access to the data even though the file data is already in memory and in clear format.
当另一个用户需要访问该文件时,在授予对数据的访问权限之前,将验证其安全凭据,既使这些文件数据已经以明文格式存在于内存中。
Due to limited processing power and memory, however, a domain-based security manager is not yet available in the MIDP 1.0 specification.
但是,由于处理能力和内存有限,MIDP 1.0规范中还不可以使用基于域的安全性管理器。
We briefly described the DB2 architecture, background processes, memory model, security, tools, and so on.
我们简要地描述了DB 2架构、后台进程、内存模型、安全性、工具等方面。
When applying an online policy to a directory, the security server sends the policy to the agent, and the agent caches the policy in memory.
当将在线策略应用到目录时,安全服务器就把该策略发送给代理,而代理将其缓存在内存中。
The EJB servers provide functionality for threading, concurrency, memory management, and security and do these things automatically so as not to burden the application programmer with the details.
EJB服务器提供线程管理、并发管理、内存管理以及安全方面的功能,并自动完成这些任务,以便于应用程序程序员摆脱这些细节方面的负担。
Many of the gravest security notices from the Computer Emergency Response Team (see Resources) and vendors are commentaries on simple memory errors.
来自计算机应急响应小组(请参见参考资料)和供应商的许多最严重的安全公告都是由简单的内存错误造成的。
"Throughput, latency, and memory usage have been further optimized to improve performance for your applications." Security enhancements.
吞吐量,延迟与内存使用被进一步优化,从而改进应用程序的性能。
These issues reinforce the earlier impression that Axis2 wastes processing time and memory doing unnecessary conversions between different message representations as part of the WS-Security handling.
这些问题加强了axis2浪费处理时间和内存来处理不同消息表示之间的不必要转换(WS - Security处理的一部分)的早期印象。
When a secfsd process starts, all policies related to the host are retrieved from the security server via a VMD process, and the policies are cached in memory.
当secfsd进程启动时,与主机相关的所有策略都通过vmd进程从安全服务器获取,并且策略被缓存到内存中。
For example, a standard WebSphere Application Server environment pattern with in-memory session persistence and global security can be created.
例如,可以创建一个标准的WebSphereApplicationServer环境模式,其中包含内存会话持久性和全局安全性。
The memory structure and basic composition of interface, calling mechanism of com database and security mechanism are described.
讨论了组件对象模型的接口内存结构、基本构成,COM库调用机制以及安全性机制等问题。
Overview of operating system 2. Process management 3. Memory Management 4. Storage management 5. Distributed systems 6. Protection and Security.
作业系统概述2。行程管理3。记忆体管理4。储存体管理5。保护和保密6。分散式系统。
At the same time, the software deals with the real-time data by the means of memory database and USES the thread security class to maintain the data's integrity.
同时,对系统中大量实时数据则采用内存数据库管理方式,并利用线程安全类来保证读取数据的完整性。
The CLR also takes care of a number of low-level details such as memory management, application hosting, coordinating threads, and performing security checks (among other low-level details).
CLR关注一些低级的细节,包括内存管理,应用程序托管,进程同步和执行安全检查。
But is there really no way of making memory Shared security between user space and kernel when they are just used as a buffer?
但真的没有办法让用户空间和内核之间共享内存的安全时,他们只是作为一个缓冲?
Point out that ECC has many advantages over RSA and DSA, especially on security, speed, memory requirement, bandwidth requirement.
指出ECC与RSA、DSA等传统公钥密码体制在安全性、速度、内存需求、带宽需求等方面各自所具有的优势。
The runtime uses metadata to locate and load classes, lay out instances in memory, resolve method invocations, generate native code, enforce security, and set run-time context boundaries.
公共语言运行时使用元数据来完成以下任务:查找和加载类,在内存中安排实例,解析方法调用,生成本机代码,强制安全性,以及设置运行时上下文边界。
Describes memory type safety and the security benefits it provides.
描述内存类型安全及其提供的安全性优点。
The main constraints are memory, battery life, ability to adapt to difference screen sizes and orientations, security, and network bandwidth.
最主要的限制包括内存容量、电池寿命、适应不同屏幕大小和分辨率的能力、安全和网络带宽。
RFID chip is using flash memory as imbedded memory to store passwords and datas. However, this kind of memory has problems of low-security and high-cost when it is imbedded in RFID chip.
RFID芯片多采用闪存作为内存来存储密码和数据,但是这种存储器的保密性能差,制造成本高。
This article describes the features of Extra-Permanent Memory (XPM) and how to improve the problems of low-security and high-cost by it.
本文叙述了超级永久性存储器(XPM)的特点以及如何利用它来改善保密性和成本。
The DAS1 Software can be used with your own Pocket PC and allows data logging directly to compact flash memory for greater data security.
该DAS1软件可用于您自己的掌上电脑数据记录,并允许更大的数据安全,直接压缩闪存。
The DAS1 Software can be used with your own Pocket PC and allows data logging directly to compact flash memory for greater data security.
该DAS1软件可用于您自己的掌上电脑数据记录,并允许更大的数据安全,直接压缩闪存。
应用推荐