Security model need the feature attributes of the protected information system.
安全模型必须考虑信息系统的特征信息。
Working with the registry may compromise security by allowing inappropriate access to system resources or protected information.
使用登录会允许不适当存取系统资源或受保护的资讯,因此可能危害安全性。
A unique string of characters input by an authorized user in order to gain access to a system or to protected information in the system.
被授权的用户为取得对系统或系统中被保护的信息的存取权而输入给系统的专门的字符串。
The import brings in only the public and protected information without operations bodies to optimize the size of the model for faster loading, saving, and navigation.
导入只引入了公共和受保护的信息,而操作实体优化了模型的规模,以更快地载入、保存及切换。
With digital signature to the message digest appended to the protection of information, the purpose is to prove that the protected information is true and complete.
数字签名技术对被保护信息处理,将得到报文摘要附加到保护信息中,证明被保护内容的真实、完整。
The high speed data cipher card can implement the information storage and transmit the protected information, which has the function of digital signature and signature authentication.
高速数据密码卡可以实现信息的存储和对传输信息的加解密保护、数字签名和签名验证功能。
Code access security USES permissions to enforce access to resources, so consider whether the API USES files, a user interface, or threading, or whether it exposes protected information.
代码访问安全性使用权限来执行对资源的访问,因此,应考虑API是否使用文件、用户界面或线程处理,或者代码访问安全性是否允许公开受保护的信息。
It can reveal information about protected characteristics like age, race, nationality, disability, gender, religion, etc., and that could bias a hiring decision.
它可以透露(求职者的)受保护特征的信息,比如年龄、种族、国籍、残疾状况、性别、宗教等,这可能会让招聘出现决策偏见。
His office uses password-protected software to share information with patients.
他的办公室使用密码保护软件与病人共享信息。
Information gathered by social network applications needs to be protected by policies which control access to information.
应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
This information is only accessible if the user isn't protected.
这个信息仅当用户不受保护时才允许访问。
These institutions must guarantee that the integrity, confidentiality, and availability of electronic health information that they collect, maintain, use, and transmit is protected.
这些机构必须保证:他们收集、维护、使用和传输的电子健康信息的完整性、机密性和可用性。
With this reliance comes the obligation to treat information contained in E-mail systems as assets to be managed and protected.
基于这一点,就有必要像对待资产那样管理和保护好邮件系统里的信息。
If you're trying to retrieve information from a protected user who you're not following, your request will fail.
如果试着从您没有追随的受保护用户获得信息,请求就会失败。
This type of information is not strictly protected, and any system user usually has enough privileges to read public information.
这类信息无需严格保护,任何系统用户都有足够权限阅读公共信息。
Eieyani Speakers are permitted and trained to translate information directly from the highly protected CDT-Plate holographic discs and from their original Maharata Texts written translations.
训练有素的伊耶雅利发言人被准许从受到高度保护的CDT全息讯息记录盘与《摩诃若多》文献的原初书面译本里直接转译资讯。
Finally, if your information isn't secure and protected, it won't matter how efficient your workflow is.
最后,如果你的信息不够安全,工作流是否有效率就不那么重要了。
Information is protected by sophisticated encryption system.
硬盘上的信息被一套复杂的加密系统保护。
Be sure to remember the master password or you will be unable to access any information protected by it!
确保记住主密码,否则无法访问它保护的任何信息!
As you know very well that, vital information is never left alone and it is protected by something every time, it takes time to carve out the precious valuables from the other system.
众所周知,重要的信息总是被某些东西保护着,所以从其它系统挖掘出由价值的信息总是需要时间的。
The privacy-related information in unstructured documents can be protected easily and efficiently by using IBM InfoSphere Guardium Data Redaction's automated redaction functions, .
可以通过使用IBMOptim DataRedaction的自动修订功能轻松有效保护非结构化文档中的隐私相关信息。
The information required to use an existing KeyStore or create a new protected KeyStore.
使用现有KeyStore或者创建新的受保护KeyStore所需的信息。
Just when you thought setting the master password protected all the sensitive sign-on information, we present FireMaster.
当你想要设置主密码来保护所有敏感的登录信息时,我们为你呈现FireMaster。
We will not be sending this information initially, so we must tell the Application Server that the URL we just protected should be allowed access from everyone.
最初我们不会发送该信息,因此必须告诉ApplicationServer我们正在保护的URL应该允许每一个人访问。
In other words, if certain information has to be protected, one must pay attention that all policies for the given user group exclude these values.
换句话说,如果特定信息必须受到保护,那么给定用户组的所有策略都必须排除这些值。
If information is over-protected, the power of the social network is decreased.
如果信息被过度保护,社交网络的功能必定减弱。
When an SSL-protected page is requested, the browser identifies the server as a trusted entity and initiates a handshake to pass encryption key information back and forth.
当请求一个SSL 保护的页面时,浏览器认为服务器是一个可信任的实体,并且启用一个连接来回传递加密的信息。
When an SSL-protected page is requested, the browser identifies the server as a trusted entity and initiates a handshake to pass encryption key information back and forth.
当请求一个SSL 保护的页面时,浏览器认为服务器是一个可信任的实体,并且启用一个连接来回传递加密的信息。
应用推荐