General distributed security techniques.
一般的分布式安全技术。
We employ different security techniques to protect the database.
我们使用不同的保护措施来保护数据库。
This paper details the conception of network security, the threat network facing and network security techniques.
给出了网络安全的概念,网络所面临的威胁,提出了解决网络安全的相关技术。
1 - Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques.
勘误表1 - - -信息技术- - -安全性技术- - -关键管理- - -第2部分:使用对称技术机制。
The financial sector is extremely important to us -- they are often the early adopters of more advanced security techniques.
金融服务业对我们来说极为重要,在先进安全性技术的采用上,金融业往往是第一批吃螃蟹的人。
Corrigendum 1 - Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques.
勘误表1 - - -信息技术- - -安全性技术- - -关键管理- - -第2部分:使用对称技术机制。
In this paper we deal with some security techniques applied to network elective system and the construction of an elective database.
介绍了一种可行的网上选课系统的规划、流程以及所采取的安全技术。
The program's suite of security techniques will ensure that the network is limited to authorized users and is extremely difficult to spoof or to introduce false traffic.
该项目的一整套安全技术将确保网络仅限授权用户使用,很难遭遇网络欺诈或引入虚假流量。
When biometric security techniques are compared, which of the following techniques offers the best accuracy, although higher in cost than other biometric techniques?
当生物安全技术相比,下列哪一种技术,提供了最佳的准确性,虽然在较高的成本比其他生物识别技术?
The method of the present invention is ideally suited to Montgomery arithmetic processors, but is not limited thereto, and can be used in combination with other security techniques.
本发明的方法非常理想地适用于蒙哥马利运算处理器,但不限于此,该方法还可以和其它安全技术结合使用。
Presenting, selling, abandoning or using for any other purpose any secret-related computer or storage device which has ceased to be used but not undergone treatment by security techniques.
将未经安全技术处理的退出使用的涉密计算机、涉密存储设备赠送、出售、丢弃或者改作其他用途的。
What you should not do is use these techniques to perform a security test without permission.
您不应该在没有获得批准的情况下使用这些方法来进行安全测试。
I hope that you can use these simple tools and techniques to create your own scripts to periodically test the security stance of your systems.
我希望您可以使用这些简单的工具和技术来创建自己的脚本,从而周期性地对系统的安全性情况进行测试。
Syncing security information for remote service authentication and techniques to consistently brand and personalize applications are just a couple of examples of how best to use the bridge.
为远程服务验证同步安全信息,以及提供品牌一致的技术,以及打造个性化应用程序,这些仅仅演示了桥接的一部分最佳应用。
This article doesn't cover security other than to note the issues involved and some of the techniques available.
除了提及所涉及的问题和某些可用的技术之外,本文将不讨论安全性。
In this section, we will discuss very briefly two of the most important techniques being used in distributed environment for security.
本节将非常简洁地介绍分布式环境中使用的两种最重要的安全技术。
Developers who see the techniques we deploy consistently find them almost trivial — yet, in the right combinations, they make for large payoffs in usability, security, and reliability.
那些经常看到我们所采用的技术的开发人员,发现这些技术微不足道,但是经过适当的组合,可以在可用性、安全性和可靠性方面获得大量收益。
More precisely, security is the process of applying various techniques to prevent unauthorized parties, known as intruders, from gaining unauthorized access.
更准确地说,安全性是一个过程,它应用多种技术来防止未经授权的用户(通常称为入侵者)对内容进行未经授权的访问。
Michael Fricklas, Viacom's general counsel said: "We are investigating techniques, including anonymization, to enhance the security of information that will be produced."
Viacom的首席法律顾问Michael Fricklas说,“我们正在研究相关技术(包括匿名化处理)来增加将会生成的信息的安全性。”
There may be cryptographic techniques, skill level of vendors' staff to ensure the security and some new methods may be devised to solve this issue.
可以借助加密技术和云计算厂商的技能优势,确保信息安全。同时,可以设计一些新的方法,解决这个问题。
This article introduced some tools and techniques that can help you maintain your system's adherence to its security policy.
本文介绍了一些可以帮您维持系统遵守安全性策略的工具和技术。
It architects and lead developers should read this book so they can intelligently discuss security-cost trade-offs with management and apply its techniques to produce more secure systems.
IT架构师和主要开发人员应当阅读本书,这样,他们就能够明智地讨论安全-成本取舍,并且运用一些技巧以拥有更安全的系统。
Other features include high-security, standards-based encryption techniques, both for unidirectional and bidirectional encryption to encrypt passwords, texts, numbers and binaries.
其他性能包括高安全性、基于标准的加密技术、可同时单向和双向加密的加密密码、文本、数字和二进制文件。
I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.
我们对安全性、加密技术,甚至公钥加密技术介绍了很多,目的是帮助您成功开发下一个PHP项目。
Berlin approaches agitated patients carefully, with a security guard standing in the background, and tries to use cognitive techniques to calm the patient.
在一个保安人员的陪伴下,柏林小心谨慎地接近情绪激动的病人,并试着使用认知疗法让病人平静下来。
A security-aware organization clearly reduces its risk by using both techniques.
一个有安全意识的组织可以通过使用这两种技术来清楚地降低它的风险。
This document is organized around common APIs and development techniques that can have security implications for your application and its users.
这个文档是围绕牵连你的应用和它的用户的安全的常见api和开发技术。
In this article, the security and recovery techniques are introduced, which are implemented on a network data base-IDMS.
本文介绍了在网状型数据库idms上实现的安全技术和恢复数据库的过程。
The new advances in fast detection techniques of transgenic farm produce bacilli toxin microbe residual pesticide and antibiotic quality and security control of farm produce in2005are put forward.
摘要论述了2005年转基因农产品,细菌、毒素和微生物,农残、兽残及农产品品质与安全三个方面快速检测技术的进展。
The new advances in fast detection techniques of transgenic farm produce bacilli toxin microbe residual pesticide and antibiotic quality and security control of farm produce in2005are put forward.
摘要论述了2005年转基因农产品,细菌、毒素和微生物,农残、兽残及农产品品质与安全三个方面快速检测技术的进展。
应用推荐