They define policies and procedures around governance, security, disaster recovery, and so on.
他们定义有关控制、安全性、灾难恢复等等的策略和过程。
System management: data management, data warehouse security, system and database backup and recovery, and so on.
系统管理:数据管理、数据仓库安全性、系统和数据库的备份和恢复,等等。
Next share the disaster recovery IP address with any other employees, divisions, vendors, partners: any entity that currently has your primary IP address in its security Settings.
接下来,把灾难恢复IP地址通知其他职员、分部、厂商和合作伙伴:当前在其安全设置中包含您的主ip地址的所有实体。
Having a DNS record can help when other sites or servers must also enter your disaster recovery server into their security Settings.
如果其他站点或服务器也必须把您的灾难恢复服务器输入它们的安全设置,有DNS记录会有帮助。
Have you noticed how quickly the Social Security disability rolls have been growing during this recovery?
您是否发现在这次复苏时期,社会伤残保障的人数持续上升?
The leaders discussed issues ranging from financial crisis and economic recovery, climate change to energy security.
首脑们商讨了涉及金融危机和经济复苏、气候变化以及能源安全的相关议题。
The bigger worry is that unrest spreads through the region, threatening Israel’s security or world oil supplies, and thus a fragile global recovery.
投资者更担忧的是由此引发的地区性动荡,那会威胁到以色列的安全或世界石油供应,进而影响到还很脆弱的全球经济复苏。
The bigger worry is that unrest spreads through the region, threatening Israel's security or world oil supplies, and thus a fragile global recovery.
投资者更担忧的是由此引发的地区性动荡,那会威胁到以色列的安全或世界石油供应,进而影响到还很脆弱的全球经济复苏。
"Setting the proper investment level for security, redundancy, and recovery is a management issue, not a techie one," he says.
他说:“为安全、余度以及修复设定适当的投资额是一项管理事宜,而非技术事项。”
Meanwhile, Chilean security forces are attempting to maintain order and prevent looting, while also distributing food and water and assisting in search and recovery efforts.
与此同时,智利安全部队正在努力维持秩序、以免发生抢劫行为,他们同时还在分发食品和水,并且帮助进行搜救和安抚工作。
Concurrency, recovery, security, and usability issues become unmanageable.
并发性、恢复、安全和可用性问题变得难以管理。
Unless security improves, Mexico's nascent economic recovery will be held back.
如果安全得不到提升,那么墨西哥刚刚开始的经济复苏就可能会被扼杀。
Disaster recovery, private key management, and disclosure of controls activities are security concerns in the SaaS environment in the pay-on-demand infrastructure.
在按需付费的基础设施中,灾难恢复、专用密钥管理和控件行为公开是SaaS环境中的主要安全性顾虑。
"Traditional" security impact (business continuity, disaster recovery, physical security).
“传统的”安全影响(业务连续性、灾难恢复、物理安全)。
Files Wiper - The Security Tools allow you to delete any files permanently without recovery.
档案雨刮器-安全工具让你可以删除任何文件永久没有复苏。
Because the system for data security and business continuity is in high demand, building a Remote Disaster Recovery system for it is needed.
由于该系统对数据安全性和业务连续性要求很高,因此需要对其建设异地容灾系统。
If the costs are found to be high, managers can use Amazon EC2 to temporarily extend resources at a very low cost provided that security and data recovery issues have been resolved.
如果发现成本很高,管理人员可花费较低的成本使用AmazonEC2临时扩展资源,只要安全和数据恢复问题已经得到解决。
In this article, the security and recovery techniques are introduced, which are implemented on a network data base-IDMS.
本文介绍了在网状型数据库idms上实现的安全技术和恢复数据库的过程。
The security model of the proxy server based on PDRR consists of protection system, detection system, response system, recovery system and expert system.
基于防御-检测-响应-恢复的代理服务器安全模型由防御、检测系统、响应系统、恢复系统和专家系统组成。
The company specialized in data security and disaster recovery.
该公司专营数据安全与数据灾难复原业务。
In this paper, two schemes for digital signature with message recovery are presented. The security of these schemes is based on factorization and discrete logarithms.
本文设计了两种具有消息恢复的数字签名方案,其安全性都是基于因子分解问题和离散对数问题的。
The techniques need unite network security mechanism and resource recovery mechanism in order to insuring system usability.
网络容灾技术需要结合传统的网络安全机制和资源恢复机制,从多方面确保系统的可用性。
The core of policy was to assure German's security and the recovery of sovereignty and economy by joining American's West Alliance, eventually reunified the whole Germany on this foundation.
该政策的核心在于通过加入美国为首的西方阵营以保证德国经济和主权的恢复和对联邦德国自身的安全保障,在此基础上最终能达到德国的统一。
Database recovery is a important method to protect database security.
数据库恢复是保障数据库安全性的一个重要机制。
Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.
与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。
Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.
负责公司的信息系统安全:评估和控制风险、制定安全政策、制定灾难恢复计划、确保政策与计划执行。
Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.
负责公司的信息系统安全:评估和控制风险、制定安全政策、制定灾难恢复计划、确保政策与计划执行。
应用推荐