• The SQL standard also contains components for defining, altering, controlling, and securing data.

    SQL标准同样包括数据定义更改控制保护组件

    youdao

  • Any database management system must have mechanisms for securing data consistency and recoverability.

    任何数据库管理系统必须拥有确保数据一致性可恢复性机制

    youdao

  • Each has a distinct approach to monitoring and securing data, and each has distinct advantages and disadvantages.

    这两种类型对于监测保护数据方法不同的,而且每种方法各有优劣

    youdao

  • AIX V6.1 provides Encrypted File System for securing data at rest, but it currently limits its usage over the NFS protocol.

    AIXV6.1提供EncryptedFileSystem保护静止数据但是当前限制通过NFS协议使用

    youdao

  • Dedicated to security matters, these professionals can offer unconventional advice for securing data from unauthorized access.

    这些专业人员专门处理安全问题能够提供不同寻常建议保护数据避免未经授权的访问。

    youdao

  • Oracle and DB2 UDB both provide effective mechanisms and capabilities for securing data from loss due to media corruption or human error.

    OracleDB 2UDB提供了一些有效机制功能保护数据不会由于媒介损坏人为错误丢失

    youdao

  • Although each of these topics is interesting and worthy of consideration, this article focuses on securing data by means of Reader Names fields.

    尽管上述每个主题有趣,并且值得关注,但是本文重点讨论使用ReaderNames字段来保护数据

    youdao

  • A CipherService is what most developers want when securing data: a simple, stateless, thread-safe API that can encrypt or decrypt data in its entirety in one method call.

    CipherService多数开发者保护数据时梦寐以求的东西:简单无状态线程安全API能够一次方法调用对整个数据进行加密解密

    youdao

  • Implementing encryption at the application level allows developers to specify which fields are to be encrypted, thus limiting the performance impact of securing data with encryption.

    通过应用程序实现加密开发人员可以指定加密哪些字段从而减少靠加密保障数据安全时所产生性能影响

    youdao

  • Securing confidential information and protecting the personal data of customers are important objectives for every enterprise.

    确保机密信息安全和保护客户个人数据每个企业重要目标

    youdao

  • Securing the Domino server in these environments is very important to ensure both the integrity of the data and the availability of the Web site, especially on the Internet.

    这些环境中 ——特别是 Internet保护Domino服务器安全对于确保数据完整性Web站点可用性来说至关重要。

    youdao

  • Securing a Domino server in these environments is important to ensure integrity of data and availability of the Web site, especially on the Internet.

    这些环境中——特别是在互联网保证Domino服务器的安全对于确保数据完整性Web站点可用性来说至关重要。

    youdao

  • Parsing and using web data within a Perl web portal script is complex because of the needs of securing the information that you are receiving from the user.

    由于保证用户处接收信息安全,因此Perlweb门户脚本中解析使用Web数据变得非常复杂。

    youdao

  • A cloud security policy focuses on managing users, protecting data, and securing virtual machines.

    安全策略主要关注用户管理数据保护虚拟保护。

    youdao

  • The key is to have clear policies and guidance for telecommuters about securing confidential data.

    问题关键在于使用明确策略指导帮助远程办公人员保护机密数据。

    youdao

  • Now you will see how TAMOS can help you in the type of situation outlined above by preventing users from removing the containers, and thereby securing your system against potential data loss.

    现在看到TAMOS 如何帮助上述情形下防止用户删除容器从而保护系统免于潜在数据丢失

    youdao

  • By cleaning up your data and ignoring data submitted improperly, you have made excellent first steps in securing your application.

    通过清理数据忽略被错误提交的数据,已经保护应用程序奠定良好的基础。

    youdao

  • For instance using configuration management systems for image setup and updates (e.g. puppet), synchronizing your cloud based data and securing your DNS configuration.

    举例来说,使用配置管理系统镜像设置更新(例如puppet),同步那些基于云的数据保护DNS配置。

    youdao

  • There are books and Websites devoted to providing search queries that return data the owner may have never thought twice about securing and is now publicly available. 17

    一些书籍网站致力于提供返回所有者犹豫安全性并且现在公开了数据搜索查询

    youdao

  • Then we look at securing a Web server through Web authentication, server security, and data security.

    然后查看如何通过Web身份验证服务器安全性数据安全性来确保Web服务器的安全。

    youdao

  • In addition to securing access to the mashup application itself, specific data sources or services used by the mashup application can have controlled access.

    除了保障mashup应用程序本身安全访问外,可以控制mashup应用程序使用的特定数据源服务的访问。

    youdao

  • Securing intellectual property: Ensuring that assets such as business intelligence, source code, and any data related to intellectual property are safeguarded.

    知识产权:应该保证交易方式、源代码以及其他任意与知识产权有关数据得到保护。

    youdao

  • In cryptography, the result of securing a block of data by applying a cryptographic function.

    利用加密函数数据加密结果

    youdao

  • Computers also hold private or secret information. And securing that data is the fastest growing part of the recycling business.

    计算机保存着私人或者秘密信息数据保密目前回收企业增长最快的一项业务。

    youdao

  • Similarly, securing big data should be part of a broader security strategy rather than having a separate big data security strategy that potentially creates yet another data silo.

    同样保护数据安全应该纳入范围更广泛安全策略不是另外套单独的大数据安全策略,因为可能会制造出又一个数据竖井。

    youdao

  • NET does not directly provide services for securing or encrypting data.

    NET直接提供用于保护加密数据服务

    youdao

  • And securing that data is the fastest growing part of the recycling business.

    而且数据保密一直回收公司一项增长很快业务

    youdao

  • Protecting access to your data source is one of the most important goals when securing an application.

    保护应用程序重要目标之一保护数据源访问

    youdao

  • You can see from the data sheet that is enclosed that I now have an interest in securing a satisfying position.

    可以附上资料中看出,本人目前有意寻求一份能令人满意的工作。

    youdao

  • You can see from the data sheet that is enclosed that I now have an interest in securing a satisfying position.

    可以附上资料中看出,本人目前有意寻求一份能令人满意的工作。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定