• Provides links to CLR integration security resources.

    提供CLR整合安全性资源连结

    youdao

  • Thus, for those who hold shares of listed corporate enterprises, this is a very good security resources.

    因此对于那些持有上市公司法人股企业来讲一个好的担保资源

    youdao

  • In the third one, the design model based on the sharing technology of the security resources is setup in order to improve the P2P security.

    第三部分提出了一种基于P 2 P安全资源共享提高P 2 P安全性设计模型

    youdao

  • The security model of the trusted network architecture (TNA) is used for making effective integration and management of the security resources of the existing network.

    可信网络架构安全模型针对用户现有网络安全资源进行有效整合管理的。

    youdao

  • And it provides an extensive wealth of security resources that make implementing those activities reasonable, particularly when also introducing tools to help automate process pieces.

    并且提供了一个广泛安全资源介绍工具用以实现自动过程

    youdao

  • Generational tensions are being fueled by continuing debate over Social Security benefits, which mostly involves a transfer of resources from the young to the old.

    围绕社会保障福利持续争论加剧了两人之间的紧张关系,主要涉及资源年轻人老年人转移a

    youdao

  • What's really needed, critics say, is even tougher laws and more resources aimed at tightening up border security.

    批评人士为了严控边境安全,真正需要严厉的法律更多资源

    youdao

  • Now that you have a security role, you need to assign it to some resources.

    现在拥有了一个安全性角色,您需要给其分配一些资源。

    youdao

  • Security controls for most resources are applied based on group membership and user attributes.

    对于大多数资源安全性根据组成员身份用户属性应用的。

    youdao

  • The TCS requires control over the allocation and release of key system resources, including database records, communication sockets, security keys, etc.

    TCS要求控制关键系统资源分配释放包括数据库记录通信套接字安全密钥等等

    youdao

  • Note that defining resources at different scopes has no impact on security.

    注意不同范围内定义资源安全性没有影响

    youdao

  • Portal security controls the level of access to all the portal resources, including content.

    门户安全性控制所有门户资源(包括内容)访问级别

    youdao

  • The example will deal with security, which means you'll apply security rules to the REST resources by securing URLs.

    这个示例处理安全性问题,意味着通过保护URL把安全规则应用REST资源

    youdao

  • Security realms are used for securing access to resources.

    安全领域用于确保资源的安全访问

    youdao

  • This allows the resource adapter and application server to share resources and provide services such as security, connection pooling, and transaction management.

    使得资源适配器应用程序服务器共享资源提供例如安全连接事务处理这样的服务

    youdao

  • You can define command resource security profiles for application resources, such as application queues, to control which users can define which queues.

    可以应用程序资源(比如应用程序队列)定义命令资源安全性配置文件控制哪些用户定义哪些队列

    youdao

  • For more information about the performance and security benefits of static SQL, see Resources.

    了解更多关于静态SQL性能安全性方面优点,请参阅参考资料。

    youdao

  • Another alternative might be to use generic connections for resources and implement certain application-level security.

    另一种替代方法可能资源使用通用连接实现某种应用层安全性

    youdao

  • Banks have thrown a lot of resources at online security.

    各家银行网络安全上投入大量资源

    youdao

  • Run by small organizations, highly fragmented and with few resources to invest in security, the nation's water supply is an inviting target for attack.

    小型组织维护高度分散安全方面毫无资源投入这个国家供水设施攻击绝好目标

    youdao

  • Use of XSLT is more difficult to set up, especially as modern releases of browsers increasingly place security restrictions (see Resources for a link) on the use of XSLT.

    XSLT使用越来越难以设置尤其是随着浏览器现代版本 XSLT 的使用上放置安全约束越来越多(参见参考资料中的链接)。

    youdao

  • Currently, there are no standardized cloud-specific security metrics that cloud customers can use to monitor the security status of their cloud resources.

    目前没有这样一种标准化的特定于计算的安全指标,让云客户可以使用监视资源安全状态

    youdao

  • Clearly, you want to consider some sort of security model to limit the loading of untrusted resources.

    显然需要考虑某种安全模型限制不可信资源加载

    youdao

  • This allows project managers to better control costs, manage security, and allocate resources to clouds a project is assigned to.

    这样项目管理人员可以更好地控制成本管理安全问题分配资源

    youdao

  • See the security section in the GRUB manual (see Resources) for more information on GRUB security and other aspects of GRUB.

    参阅GRUB手册安全性部分参见参考资料),了解关于 GRUB 安全性其他方面更多信息

    youdao

  • More information about high availability and security issues is available in the resources section.

    有关可用性安全问题更多信息请参阅参考资料”部分

    youdao

  • The standard J2EE security model contains a description of roles, which encompasses the security-constrained resources that can be accessed by principals.

    标准J2EE安全模型包含角色描述包括主体访问的受安全机制约束的资源

    youdao

  • Once you understand the concepts of TAMOS, you will be in a better position to provide security to your system resources on top of that provided by the native operating system.

    一旦理解TAMOS概念本机操作系统提供保护之外系统资源提供更好的保护。

    youdao

  • For more information about the WebSphere Application Server environment configuration in the context of security and thin clients, see Resources at the bottom of the article.

    详细了解安全客户客户端上下文中的WebSphereApplicationServer环境配置请参见本文末尾参考资料

    youdao

  • For more information about the WebSphere Application Server environment configuration in the context of security and thin clients, see Resources at the bottom of the article.

    详细了解安全客户客户端上下文中的WebSphereApplicationServer环境配置请参见本文末尾参考资料

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定