• Therefore it is necessary to research the damage law and security access technology of the pearlite heat resistant steels.

    因而必要研究珠光体耐热损伤规律安全评估技术

    youdao

  • Companies and policy makers must also tackle misaligned incentives around issues such as privacy and security, access to data, and technology deployment.

    企业政策制定者必须克服这些关于隐私安全数据访问技术部署问题的不对称诱因

    youdao

  • The access and communications capabilities require the latest in proven security technology for extremely large, wide-area communications networks.

    这种访问通讯能力需要极其巨大广域通信网络最新被证明安全技术支持

    youdao

  • Access control is the central technology of the security of database.

    访问控制实现数据库安全核心技术

    youdao

  • This paper puts forward a grid architecture based on component technology, and gives detailed descriptions on the components support environment, user access gateway and security management.

    提出一种基于组件技术网格环境架构其中的组件支撑环境用户访问网关安全管理等方面进行了详细描述

    youdao

  • The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.

    访问控制模型技术研究工作流系统安全机制核心,也是信息安全领域的一个热点问题。

    youdao

  • This paper has presented a scenario that using PKI technology to RBAC and implicating the PKI makes security authorized access control.

    本文提出一种将PK I技术RBAC技术相结合的方案,实现基于身份认证的安全访问控制

    youdao

  • The thesis also analyses the design plan of system database, including its security, transaction management and ADO data access technology.

    然后,论文论述了系统数据库设计过程,其中包括安全性设计、事务管理设计以及ADO数据访问技术的分析及运用。

    youdao

  • The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.

    主要介绍网络安全准入控制系统组成相关技术技术铁路信息系统中如何应用加以探讨

    youdao

  • Access control is an important technology in system security.

    访问控制系统安全重要技术

    youdao

  • In security module, the security technology of user authentication, message encryption, audit tracing and access control is used.

    安全模块中,使用了用户认证通讯加密审计追踪访问控制等安全技术,并且引入了模糊控制专家系统。

    youdao

  • The Access Control is one of the core strategies of the network security, as well as a major component of information safety technology.

    保证网络安全核心策略之一也是信息安全技术的重要组成部分。

    youdao

  • The open-architecture systems work seamlessly with about 30 technology partners, including video management, access control and physical security information management systems.

    开放式架构系统,且大约30个技术合作伙伴有着密切的合作,包括视频管理访问控制实体安全信息管理系统。

    youdao

  • The thesis researches on the identity authentication and access control in information security technology.

    本文身份认证访问控制等方面对信息安全的相关技术进行了分析研究

    youdao

  • Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.

    访问控制技术网络安全一项基本技术,主要包括基于角色访问控制基于任务的访问控制等技术。

    youdao

  • Lastly, along with campus fact and equipment, using technology of VLAN, NAT, router access-list and network traffic flow monitoring system, we carry out basic security defense of campus network.

    最后,结合校园网实际,根据现有设备条件,运用VLAN技术NAT技术路由器访问列表以及流量监控实现对校园网的基本安全防护

    youdao

  • Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.

    设置用户存取权限控制冗余备份恢复网络安全等多种安全策略共同建立有机的安全体系

    youdao

  • The security analysis proves the feasibility of combining the APN technology with the VPN technology in the GPRS access system.

    通过安全性分析证明了APN专线技术VPN加密认证技术结合运用GPRS接入系统可行性

    youdao

  • Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.

    无线异构网络中的关键安全技术包括安全路由协议接入认证技术入侵检测技术节点协作通信

    youdao

  • The main ways to ensure information platform security are presented, which include PKI certification, authentication, role based access control(RBAC), SSO and working flow technology.

    可采用点登陆、PKI认证授权基于角色权限分配策略、利用应用网关访问资源,开发适合本系统工作流访问机制等措施确保信息平台安全

    youdao

  • Men have significantly more access to the web, but when women get connected, they use technology as a pathway to better education, health, economic status and security.

    虽然男性连线上网机会多得多不过如果女性使用网络她们就能借助科技手段,寻求更好教育健康经济地位人身安全

    youdao

  • And then, the paper analyzes the MatchMaking model, includes the point technologies, for example buffer technology, data access technology, security technology.

    之后撮合模块进行了重点分析并介绍使用的关键技术,比如缓存方案,数据访问方案,安全性考虑以及故障恢复考虑等。

    youdao

  • And then, the paper analyzes the MatchMaking model, includes the point technologies, for example buffer technology, data access technology, security technology.

    之后撮合模块进行了重点分析并介绍使用的关键技术,比如缓存方案,数据访问方案,安全性考虑以及故障恢复考虑等。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定