Using the two together creates a powerful security base for your application.
结合使用这两种方法将为您的应用程序创建强大的安全基础。
Although technology has made the attack more disruptive and more sophisticated, the security base is still as important as ever.
尽管技术让攻击变得更具破坏性,让防御变得更为复杂,但安全的基础仍像以往一样重要。
Enterprise portal technology provided stable, flexible and reliable security base and structure for enterprise information system.
企业门户技术是为企业的信息系统提供稳定、可伸缩和可靠的安全基础和框架结构。
The information security base are discussed, including security criteria, security expression model, system frame of the network security, some typical security technology.
论述了信息安全基础:安全标准,安全表述模型,网络安全体系结构:几种典型的安全技术。
All employees at the submarine base require security clearance.
所有潜水艇基地的雇员必须得到安全部门的审查许可方可录用。
Models from economics and demography become the definitive tools for examining the financial base of social security.
来自经济学和人口学的模型成为检验社会保障财政基础的最权威工具。
We should place equal emphasis on development and security, and develop nuclear energy on the base of security.
坚持发展与安全并重,在安全的基础上发展核能。
Base services can be implemented to integrate with common enterprise components that support workflow, security, and audit logging.
基本服务可以与支持工作流、安全性和审计日志记录的通用企业组件集成。
Base services are available to support security and privacy, search, audit logging, and workflow.
基本服务用于支持安全性和私密性、搜索、审计日志记录和工作流。
The systems will be incorporated into the security infrastructure of a major domestic military base.
该系统将被纳入一个美国国内主要军事基地的安全基础设施当中。
The virtual cube inherits the security definitions of its base cubes.
虚拟多维数据集将继承它的基础多维数据集的安全定义。
This scenario is frequently used when all components are internal, under the same security management and part of the trusted computer base.
此场景经常用于所有组件都是内部组件、使用相同的安全性管理且属于受信任计算机群的情况。
The successful migration has also helped the base improve service delivery as well as strengthen security by reducing entry points.
迁移成功也有助于改善基地服务,减少接入点,以加强安全性。
Trusted Computing Base (TCB) is the security feature available with IBM AIX versions later than version 4.1.
可信计算基础(Trusted Computing Base,TCB)是 4.1版以后的IBMAIX版本提供的安全功能。
Once this principal has been set, you can simply use the JEE security model and WebSphere Base Security APIs as you normally would.
一旦对这个principal 进行了设置,您就可以像往常那样使用 JEE安全模型和WebSphereBase SecurityAPI。
Atlas may be extended to provide alternate implementations of architectural mechanisms (such as persistence or security) that extend the base Atlas framework.
扩展atlas,以提供扩展了基本atlas框架的架构机制(例如,持久性或安全性)的实现。
If John were to submit a job against the second base node or the deployment manager cell, the job will fail because his security token is not authorized in these two environments.
如果John向第二个基本节点或部署管理器单元提交作业,作业将失败,因为他的安全令牌在这两个环境中未获授权。
By using the Debian distribution as a base, Ubuntu benefits from the security and performance aspects of Debian.
通过将Debian发行版作为基础,Ubuntu受益于Debian的安全性和性能。
Tencent has 600 million loyal users, it wants to finish 360 through packaged installation; whereas 360 holds its "security" shield to undermine QQ's loyalty base by using user's fear.
腾讯有6亿忠实用户,它想以打包安装的方式终结360;而360紧握“安全”盾牌,利用用户的恐惧心理蚕食着忠实的QQ群体。
We have covered how we restrict read access to Active Directory to members of the Pre-Windows 2000 Compatibility access security group as well as marking non-system-base as confidential.
我们还涉及到如何限制“Pre -Windows 2000 CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
We have covered how we restrict read access to Active Directory to members of the “Pre-Windows 2000 Compatibility Access” security group as well as marking non-system-base as confidential.
我们还涉及到如何限制“Pre-Windows 2000CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
He tells them the stiff penalties for any violation of the base security rules, as well as for the use of illegaldrugs, fighting, misuse of firearms and so on.
违反基地规则将受到严厉的惩罚。至于打架、吸毒、违章使用武器之类的事情我就不想多说了 你们都清楚的。
Scott Roberson, the base security chief, had also been following the preparations with unease.
该基地的负责人ScottRoberson也在不安地进行预备工作。
The evidence they have now collected suggests it was last November that somebody working in a high-security facility inside a US military base in Iraq started to copy secret material.
他们现在所收集的证据表明,美国伊拉克某军事基地一个高级别安全部门内,去年11月就有人开始复印秘密材料。
The thesis introduce the base of network database security, which includes modern cryptology and database security, and introduce principle of fingerprint characteristic in identity identification.
本文首先介绍网络数据库安全的基础:即现代密码学和数据库安全,接着介绍了指纹特征在身份认证中的原理。
The following example shows two user base DNs in /etc/security/ldap/ldap.cfg.
下面的示例显示了 /etc/security/ldap/ldap.cfg中的两个用户基本DN。
He said Russia would need to assure any partner countries that a new base would also enhance their own security.
他表示,俄罗斯向合作伙伴的国家承诺,新的基地也将加强他们的安全。
He said Russia would need to assure any partner countries that a new base would also enhance their own security.
他表示,俄罗斯向合作伙伴的国家承诺,新的基地也将加强他们的安全。
应用推荐