• Use other security data formats

    使用其他安全数据格式

    youdao

  • Restart server to test using the new security data format.

    重新启动服务器使用新的安全数据格式进行测试

    youdao

  • As described above, security data formats are externalized.

    正如前面提到的,安全数据格式可以用户决定。

    youdao

  • The following steps outline how to use another security data format

    下面使用其他安全数据格式步骤

    youdao

  • SCAP is a NIST specification for expressing and manipulating security data in standardized ways.

    SCAP一种使用标准化方法表达操作安全数据NIST规范

    youdao

  • The sectoldif command is a migration tool provided with AIX for migrating local security data to LDAP.

    sectoldif命令AIX提供迁移工具,用于把本地安全数据迁移LDAP

    youdao

  • Studying how to acquire social social insurance audit aims to acquire exact social security data.

    研究社保审计的数据获取技术是为了确保社保数据的真实性和有效性。

    youdao

  • The portable security data processor is one kind of multi-purpose data security processing product.

    便携式安全数据处理器多功能数据安全处理产品

    youdao

  • The following class diagram shows the relationship between the SAML assertion, security data parser, and control object.

    下面说明SAML断言安全数据解析控制对象之间关系

    youdao

  • That solution can provide service on security data exchange without any need to change the office network infrastructure.

    方案可以改变现存办公室网络基础设施的条件下,提供安全数据交换服务

    youdao

  • A security data exchange system based on XML was designed and realized by the use of public key infrastructure (PKI) technology.

    利用公钥基础设施PK I技术设计实现了XML数据安全交换系统

    youdao

  • The IBM InfoSphere MDM Server allows you to pass in your own format of security data and process it within the MDM security framework.

    IBMInfoSphereMDMServer允许用户按自己格式MDM安全框架中传递处理安全数据

    youdao

  • The Social Security data, moreover, suggest that a lack of women during men's teenage years still haunts their health decades later.

    另外社保显示男性在青少年时期若缺少女性,则会对他的健康影响数十年之久。

    youdao

  • In the data transmission part security data transmission tunnel with C/S structure provides security data transmission between two ends.

    数据传输部分,构建了C/S结构安全数据传输隧道数据传输两端提供了安全的数据传输。

    youdao

  • Bring forward a security data transmission approach in WAN-based environment on the background ofa WWW-based distributed information system.

    文中种基于WWW分布式信息系统背景下提出种在广域网(WAN)的环境安全传输数据解决方案

    youdao

  • Existing network security or management systems can collect lots of security data, but lack the mechanism of effective data fusion and cooperative management.

    但现有网络安全保障管理系统虽然能够获取大量的安全数据缺乏有效的数据融合协同管理机制

    youdao

  • Since the IKE is only addressed to protected negotiation of pairwise security data at the beginning, it has some demerits at communication based on IP multicast services.

    由于IKE设计致力于点对点之间安全参数协商应用IP情况许多局限之

    youdao

  • Examples abound of databases being stolen: disks full of social-security data go missing, laptops loaded with tax records are left in taxis, credit-card Numbers are stolen from online retailers.

    数据库被盗大量事例装满社会保障数据光盘丢失装有纳税记录笔记本电脑了出租车上了。

    youdao

  • On the one side, you have the United States government's mighty legal and security apparatus fighting for data of the most sympathetic sort: the secrets buried in a dead mass murderer's phone.

    美国政府强大法律安全机构他们所争夺能引起同情的数据制造群体谋杀的死者手机里秘密

    youdao

  • Cyber-security, which involves protecting both data and people, is facing multiple threats, notably cybercrime and online industrial espionage, both of which are growing rapidly.

    涉及保护数据人员网络安全面临多重威胁尤其是网络犯罪和网络行业间谍这两种威胁在迅速增长。

    youdao

  • Every data source must have a defined custodian (a business role) responsible for the accuracy, integrity, and security of that data.

    每个数据源必须确定管理人业务角色负责数据精确性完整性安全性

    youdao

  • Security: Is your data safe being stored on these devices?

    安全性数据这些设备存储安全吗?

    youdao

  • Data security is a prime concern in all organizations.

    数据安全所有组织都关心的问题。

    youdao

  • Security for data communication is another important aspect to consider.

    数据通信安全考虑另一个重要方面

    youdao

  • Data source security.

    数据源安全性

    youdao

  • It provides powerful and flexible transaction support, and handles security, data integrity, and resource scheduling.

    提供强大灵活事务支持可以处理安全数据完整资源调度

    youdao

  • Those subclasses work together to handle authentication, filtering, security, data transformation, and routing the incoming requests to the respective resources.

    这些子类能够一起处理验证过滤安全数据转换以及传入请求路由相应资源等操作。

    youdao

  • In addition, the ESB can provide transformations between a variety of security, data format, or transactional models between service requesters and providers.

    另外ESB可以提供服务请求者提供者之间各种安全数据格式事务模型转换

    youdao

  • When discussing the cloud, there are many characteristics that should be discussed, including: multi-tenancy, security, data integrity verification, retrieval expectations, and exit strategies.

    讨论时,许多特性应该加以讨论,其中包括多租户安全性数据完整性验证恢复期望值以及退出策略。

    youdao

  • When discussing the cloud, there are many characteristics that should be discussed, including: multi-tenancy, security, data integrity verification, retrieval expectations, and exit strategies.

    讨论时,许多特性应该加以讨论,其中包括多租户安全性数据完整性验证恢复期望值以及退出策略。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定