• The catalog service example USES patterns such as the WS Response Template pattern (see Resources) and security patterns.

    catalog服务示例使用WS响应目标模式(请参阅参考资料)安全模式模式。

    youdao

  • There are deployment patterns, security patterns, application patterns, and patterns that deal with operational and runtime aspects.

    还有部署模式安全模式、应用程序模式以及处理操作运行时问题的模式。

    youdao

  • Also, applying common security patterns in the REST world doesn't seem to be as established as in SOAP, where WS-Security is becoming more widely embraced.

    SOAPWS - Security越来越被广泛采用,但REST世界中的应用公共安全模式和SOAP中一样

    youdao

  • As an acknowledgement of the importance of security, we provide an "Identify security Patterns" task that ensures the level of security required by the system.

    为了认识安全重要性我们提供了一个IdentifySecurity Patterns任务,它可以保证系统所需要安全级别

    youdao

  • Wenchuan Earthquake and the great development of Longmenshan tourism presents severe problems involving geological disasters and tourist security patterns.

    汶川大地震旅游开发几乎同时发生,给我们提出了地质灾害旅游安全格局严峻命题

    youdao

  • Another common trend is the application of service gateway patterns to provide enhanced access security for service endpoints.

    另一个常见趋势应用服务网关模式服务端点提供增强访问安全

    youdao

  • Technical patterns - These encompass transactions, security, and other infrastructure elements.

    技术模式——包括事务、安全性其他基础结构元素。

    youdao

  • The specification also discusses JMS message types, security concerns and message exchange patterns.

    规范同时还讨论了JMS消息类型安全考虑以及消息交换模式

    youdao

  • Individual mediation patterns are placed appropriately in the mediation flow to achieve the goals of the intended interaction as well as to enforce management and security policies.

    各个中介模式适当地放在中介实现预期交互目标以及执行管理安全策略。

    youdao

  • Analysis of the security logs can detect patterns of suspicious behavior, allowing the administrator to take action.

    安全日志分析可以检测可疑行为并且允许管理员采取行动

    youdao

  • Low food security is defined as reports of reduced quality, variety, or desirability of diet and indications of disrupted eating patterns.

    食物质量降低品种减少,或者膳食不合理习惯性不良饮食习惯等在报道都被称为食物安全系数

    youdao

  • You model domain architecture views, such as Applications, Infrastructure, Networks, and Security, by creating ABBs to describe enterprise-critical system composition and behavioral patterns.

    通过创建ABB描述企业关键系统组成行为性模式可以为架构视图建模例如应用基础设施(Infrastructure)、网络安全

    youdao

  • Use cases affected by this trade-off are RESTful URLs, bookmarking support, security through URL patterns, and page-flow validation, to mention a few.

    影响的RESTfulURL书签支持通过URL模式获得的安全性以及页面流验证等。

    youdao

  • In defining security models and patterns there are two facets that need to be considered.

    定义安全模型模式时需要考虑两个方面

    youdao

  • Method permissions map security roles to specific EJB methods and security constraints map security roles to Web resource collections that are a combination of HTTP methods and URL patterns.

    方法权限安全性角色映射特定EJB方法安全性约束则将安全性角色映射到Web资源集合中,这些Web资源集合HTTp方法URL模式的一个组合

    youdao

  • In order to address those challenges, architects will need to combine the data federation pattern with other security-related patterns.

    为了应对这些挑战架构师需要数据联合模式其他安全相关的模式结合使用。

    youdao

  • Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.

    其他中介模式提供了安全和管理策略定义直接间接访问以便中介能够执行适当控制

    youdao

  • On the ten anniversary, the global report highlights the challenges and opportunities faced by the security team in defense of evolving cyber crime and changing attack patterns.

    周年之际全球报告强调了安全团队防御不断演进网络犯罪不断变化攻击模式时,所面临挑战机遇

    youdao

  • 0ther patternssuch as a WS-security pattern — that directly impact the service definition would be applied at this layer.

    其他直接影响服务定义模式——WS - security模式——应用于这个层。

    youdao

  • Supervise each shift security operations, ensuring adequate patrol patterns and frequencies are maintained to ensure the security of guests and Team Members.

    指导监督运作确定保卫巡视的正确执行,确保客人同事实施安全保卫工作。

    youdao

  • But security firms have now got better at spotting patterns in the spammers' output.

    但是安全公司现在识别垃圾邮件发送者的输出模式方面已经有所进步。

    youdao

  • Its software can monitor the use of cloud application by individual employees, and this includes looking for patterns and anomalies that could be security breaches.

    软件能够监控单个员工应用使用搜索到有可能形成安全泄露使用模式异常现象

    youdao

  • The reflective widely used in kinds of costumes security, safety shoes&hats and other safety product, according to the samples you can order various kinds of patterns.

    反光晶格带广泛应用各种安全服饰安全鞋帽其它各种安全制品可依据客户订制各种图案。

    youdao

  • They say these patterns are unique to different typists and could lead to a new type of biometric security, locking out anyone who doesn't type like you do.

    他们表示这种键盘的模式每个打字者都是独一无二而且可以引导种新的生物识别安全性能,从而拒绝那些打字类型截然不同的

    youdao

  • The use of unique physical characteristics, such as fingerprints, voice patterns, or retinal scan, to authenticate a user; providing security for workstations or information stored in hard drive.

    使用独特物理特征例如指纹声音模式视网膜扫描鉴别一个用户工作站存储硬盘信息提供安全保证。

    youdao

  • Concerning one class of block ciphers, an Sboxes reorganized algorithm was given, which enriched Sboxes application patterns and improved the security strength.

    针对一类分组密码算法,通过将S与密钥相关联,给出了S盒重组算法,丰富了S盒的应用模式有效提高了分组密码的安全强度。

    youdao

  • Binary code analysis for security has many problems. There is difficult in deducing the representation of bug patterns in binary code, especially the accurate size of the buffer in stack.

    二进制代码提升过程一些指令无法解析,甚至会出现跳转地址不合法之类结构性的错误使得后续分析精确性降低

    youdao

  • Binary code analysis for security has many problems. There is difficult in deducing the representation of bug patterns in binary code, especially the accurate size of the buffer in stack.

    二进制代码提升过程一些指令无法解析,甚至会出现跳转地址不合法之类结构性的错误使得后续分析精确性降低

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定