Why should you custom build a security solution?
为什么您应该自行构建一种安全的解决方案呢?
Think this through carefully before choosing the security solution.
在选择安全解决方案时请仔细考虑这一点。
The need for an end-to-end security solution is on the horizon.
于是就出现了对端到端安全性解决方案的需求。
The choice of your security solution depends on the following needs.
安全解决方案的选择依赖于以下需求。
This example does not provide a comprehensive security solution.
该示例不提供全面的安全解决方案。
The combination creates an integrated online access-control and security solution.
这种组合方式创建了一种安全的网络访问控制方式。
Comprehensive security, leading technology, constructs the excellence of a security solution.
全面保障,技术领先,构建卓越领先的安防解决之道。
There may also be departmental or business unit-specific code that spans applications, such as maybe a security solution.
可能还有一些部门的或者业务单元特殊代码存在于应用软件中,比如可能是一个安全解决方案。
Theoretical analysis and the experimental results show that it provides a good security solution to the field of MIS.
理论分析和实验结果表明,该方法是保证高校教务管理系统安全运行的一种有效解决方案。
Then this paper describes the 3G-WLAN security problems in interlinkage, and gives the 3G-WLAN link security solution.
接着描述了3G-WLAN互连中的安全问题,并给出了3G-WLAN互连时的安全解决方案。
A powerful, flexible security solution for enterprise software, with a particular emphasis on applications that use Spring.
一种用于企业软件的功能强大的、灵活的安全解决方案,特别适用于使用Spring的应用程序。
It was presented the network security solution for the Ministry of Railways, focused on the technical project and its results.
针对铁道部网络安全的现状,提出解决问题的技术方案,并对其效果进行说明。
By proposing this series of security solution, the purpose of this paper is to provide a basic security guarantee system for ITS VCIP.
通过提出这一系列的安全解决方案,本文的目的是为its虚拟共用信息平台提供一个基本的安全保障系统。
Kaspersky Internet security 2009 is the all-in-one security solution that offers a worry-free computing environment for you and your family.
卡巴斯基互联网安全的,到2009年,是全在一安全解决方案,提供了一个无后顾之忧的电脑使用环境,为您和您的家人。
Effective protection from blended threats requires a comprehensive security solution that contains multiple layers of defense and response mechanisms.
针对这种被混和害虫的有效保护方法是:获得一套全面的包含有多种抵御和反应机制的安全解决方案。
It is an easy to use security solution that is built into the development environment and process, producing highly accurate and easy-to-understand results.
利用内嵌在开发环境和过程中的安全解决方案是十分便利的方法,从而产生了高度精确且容易理解的结果。
Encryption and Data Signature are realized, the security interaction of information is enhanced, and the visit speed is not decreased for the security solution.
实现了安全方面的加密与数字签名技术,使信息的安全交互得到了提高,并且访问的速度不致安全而过多地减慢用户访问服务平台的速度。
Security solution includes validating users, page authorization, reading and writing database using the password and manipulating database using store procedures.
安全性解决方案主要措施有用户验证、页面授权、密码存取数据库和使用存储过程操作数据库。
Based on the characteristics of real estate evaluation system, system security solution from identity authentication, access control and data backup are discussed.
从房地产评估系统的特点出发,从身份认证、访问控制和数据库备份三个角度来考虑评估系统安全问题。
Compared with all kinds of technologies in each field existed now, the security solution to the evaluation system of the real estate is designed and impersonal evaluation is presented on it.
分析比较现有的各种技术手段,设计房地产评估系统安全整体解决方案。并且客观评价了安全方案。
The security requirement based on the business process characteristic of order processing is analysed in the thesis, and a security solution that has application values for the system is designed.
根据企业询单处理的业务过程特点,进行基于业务过程的询单处理信息系统安全需求分析,在此基础上,为制造企业询单处理信息系统建立了有应用价值的安全解决方案。
But the information security solution adopted is often passive, which means that the security risk or problems have once be found, people only adopt the corresponding security technology to solve.
然而对信息安全的解决方案常常采用被动的方式,发现什么地方可能有风险,有安全问题,则采取对应的安全技术来解决。
In addition, the article proposes a security solution for the Electronic Health Record taking into account identity authentication, network communication encryption and XML SOAP messages encryption.
另外,本文从身份验证、网络通信加密和XMLSOAP消息加密三方面考虑提出电子健康档案的安全性解决方案。
As exciting as this solution is, the approach is rather idealistic: Security issues within this framework have been ignored.
尽管这个解决方案很精彩,但这种方法是相当理想化的:框架中的安全问题被忽略了。
During the solution integration, one security rule you need keep in mind is to be certain that different user roles have their corresponding privilege sets.
在方案集成过程中,您需要一直记住的一个安全性规则就是,不同的用户角色拥有其相应的特权设置。
Any solution to the problem was also constrained by security systems already in place.
问题的任何解决方案都受到已经存在的安全系统的约束。
Part 3 will focus on the security and governance issues of the solution.
第3部分将着重介绍此解决方案在安全性和管理方面的问题。
This article also provides an overview of security environment considerations when designing your MDM solution.
本文还概述了在设计MDM解决方案时对安全环境要考虑的一些方面。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
This integration solution utilizes the current environment's security framework.
这个集成解决方案使用当前环境的安全框架。
应用推荐