Now, if we try to sneak in a new employee's computer with an invalid network ID, our application knows not to accept it.
现在,如果我们试图用一个无效的网络ID潜入新员工的计算机,我们的应用程序不会允许。
And change it to render the employee's network ID.
将它改为显示员工的网络ID。
The network ID partially matches some value with case-sensitivity, or
网络ID使用大小写敏感,部分匹配一些值,或者
Just like we did for the list template, change the code to display the employee's network id.
就象我们为list模板所做的那样,改变代码以显示员工的网络ID。
Now, if we try to sneak in a new employee with an invalid network id, our application knows not to accept it.
现在,如果我们试图偷偷在一个新员工中输入一个无效网络ID,应用应该会拒绝它。
Instead of the current text in the employee Bean column, let's change it to display the employee's network ID.
替换EmployeeBean列的当前文本,改为显示员工的网络ID。
For example, the database requires that network IDs not exceed eight characters in length, but we'll also enforce our business rule that a network ID must be no fewer than six characters in length.
如,数据库要求网络ID长度不超过8个字符,但是,我们也会加强我们的业务规则,要求网络ID的长度必须不小于6位字符。
If everything went according to plan, you should now be able to attach to the wireless network we just made, network ID "test," run a DHCP client, and get DHCP service from your regular DHCP server.
如果一切按计划进行,那么现在您应该能够连接到我们刚刚建立的无线网络(网络标识为“test”),能够运行DHCP客户机并从常规的DHCP服务器获取DHCP服务。
Users can then access services on other machines that participate in this trusted network without again being prompted for a user ID and password.
用户然后可以访问参与此受信任网络的其他计算机上的服务,而不会再次提示用户ID和密码。
This interactive menu system goes into most areas of systems administration, from changing the maximum number of processes per user ID to changing the speed of a network interface.
这个交互式菜单系统覆盖了系统管理的大多数领域,从修改每个用户ID的最大进程数量直到修改网络接口的速度。
In the application key field, enter the same value that you specified for application ID in the workflow application in the ERP back-end network (in this case, ZMATCR).
在Applicationkey字段中,输入您刚才在erp后端网络的工作流应用程序中为应用程序id指定的值(在本例中为ZMATCR)。
Set the IP address and physical network card interface ID for the zone created as shown in Figure 7.
为创建的专区设置IP地址和物理网卡接口id,如图7所示。
Similar authentication techniques use the MAC address of the remote host's network card, or any sort of unique ID associated with that machine (such as a Pentium III processor ID, if available).
类似的认证技术使用远程主机网卡的mac地址,或者与该机器关联的任何类型的唯一标识(例如,如果可用,PentiumIII处理器标识)。
The ID Kaka in London, is the competence of its card holders, operating system functions to depend entirely on the computer network database platform support.
由于ID卡卡内无内容,故其卡片持有者的权限、系统功能操作要完全依赖于计算机网络平台数据库的支持。
Our network is to look for the address (ID) automatically.
我们的网络是自动寻(找地)址。
Gol021-this level of firmware corrects the vendor device ID on EMC Class B adapters so that the adapter is recognized during AIX Network Installation Management (NIM).
这个固件级别将更正emcClassb适配器的供应商设备ID,以便在AIX网络安装管理(NIM)过程中能够识别该适配器。
Network solutions will also provide you with id-Names used for worldwide registration and management of domain names. Register your name in over 50 countries online.
Net worksolutions会为你所用的id提供全球的域名注册和管理,在大约50个国家里为你在线注册。
This paper introduces commonly used methods of ID Authentication in a campus network and finds a common problem that it is difficult to control access unauthorized within the broadcast domain.
介绍了常见的园区网用户身份认证方法,并指出它们普遍存在的一个问题:在一个广播域内非法接入难以控制。
Your location information is based on cell ID positioning, that is, the cellular network recognises the location of your device.
您的位置信息是基于细胞身份证定位,即通过蜂窝网络识别你的设备的位置。
Traditional ID authentication combines a user name and a password, which is not sufficient enough to assure the security of application systems in an environment full of hackers network attacks.
传统的身份认证只是一种用户名和口令的简单组合,在充满黑客和攻击的网络环境下,这种认证方式已经不能充分保证应用系统的安全。
The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.
入侵检测的分析技术主要分为滥用入侵检测和异常入侵检测,目前国内外流行的网络入侵检测系统大都是采用滥用入侵检测技术。
The first defense for the security of information on the network is ID authentication. A practical method of ID authentication is put forward to conquer the abuse of normal remote login mechanism.
网络信息安全的第一道防线是身份认证,文章基于一般远程登录机制的弊端,提出了一种实用的身份认证方法。
Aim to identify the id of the speaker in digital voice communication in order to assure the security of information which is transmited in the network.
目的为保证网络信息交互的安全,在数字语音通信中对说话人进行身份认证。
To ride of the shortage of the id, we study on the extraction of the features, id method based on fuzzy neural network, and algorithm optimization and so on.
为克服现有入侵检测存在的不足,本文从特征提取、模糊神经网络应用于入侵检测、算法优化等方面进行了系统研究。
At present times, the trust crisis of network society id getting increasingly severe.
当下,网络社会的信任危机日益严重。
Intrusion Detection (ID) is an important aspect in network security technology.
入侵检测是网络安全技术的一个重要方面。
The software allows users to access ID photos and other demographic details from any network connection.
该软件使用户能够从任何连接网络获得身份证照片及其他统计资料。
The data structure of road network is simplified based on the analysis on the features of the embedded system. And by rebuilding object's ID, the efficiency of data processing is improved.
在分析了嵌入式系统特点的基础上,对路网的数据结构进行了简化。
The data structure of road network is simplified based on the analysis on the features of the embedded system. And by rebuilding object's ID, the efficiency of data processing is improved.
在分析了嵌入式系统特点的基础上,对路网的数据结构进行了简化。
应用推荐