• The true problem may be the unquestioning acceptance of manufacturer-supplied XML signature code.

    真正问题可能制造商提供的XML签名程序码的绝对接受

    youdao

  • Although you can use these applications to generate the canonical form of an XML document, they are primarily used by the XML signature code.

    虽然可以使用这些应用程序生成XML文件规范形式但是它们主要用于XML签名代码。

    youdao

  • The downside of this approach is the possibility that a typo or slight ambiguity in the signature will silently fail, which means the code will compile but "do the wrong thing" at runtime.

    这种方法缺点在于签名录入错误含糊不清可能会导致没有征兆故障,这也就意味着代码可以编译运行时无法正确完成操作。

    youdao

  • Instead of giving your ATM card and PIN code, the card can double as a credit card with a signature authorization.

    不用交出ATMPIN密码,只需获得信用卡签名的授权,你就可以使用信用卡。

    youdao

  • In many cases, changing the method signature so the collaborator becomes a parameter will result in a confusing, untested snarl of code inside the method's original callers.

    许多情况下更改方法签名使合作者成为参数将会在方法原始调用者内部产生混淆未经试验代码混乱

    youdao

  • The tool will also create an empty implementation class for you that contains the following code in an empty method with the signature.

    工具创建实现,此类一个具有签名的空方法中包含以下代码

    youdao

  • The added constructor code USES a signature defined by AspectWerkz 2.0 to get access to context information, which includes any parameter definitions for the aspect.

    增加构造函数代码使用AspectWerkz 2.0定义一个签名访问上下文信息这些信息包括方面定义所有参数

    youdao

  • So it looks like the current CXF code insists on generating a signature when an AsymmetricBinding is in scope, even when nothing is being signed.

    因此asymmetricbinding作用域中时,当前CXF代码一样坚持生成签名即使没有什么需要签署

    youdao

  • The Listing 8 properties file is used by the underlying WSS4J WS-Security code to configure the signature and encryption processing.

    底层的WSS4JWS-Security代码使用清单8 所示的属性文件配置签名加密处理。

    youdao

  • The generated code will add the Ajax-Call header, whose value is the function's signature.

    生成代码添加ajax - Call头部它的就是函数签名。

    youdao

  • The Eclipse IDE and IBM Lotus Expeditor effectively apply signature security mechanisms in their provisioning subsystems by enhancing the code security level when it's deployed to end users' desktops.

    EclipseIDEIBMLotusExpeditor有效地签名安全机制应用它们供应子系统中,从而在将插件部署终端用户桌面增强安全性

    youdao

  • The code makes a call out to a template and the template is matched by the signature of the call. In this case the template can be found in the uml2utility.xsl.

    代码模板发出命令,模板调用签名相匹配

    youdao

  • This interceptor method can use the same signature as the original method, including returning the same value. Listing 3 shows what a source code version of this approach would look like.

    这个拦截器(interceptor)方法可以使用原来方法同样签名包括返回同样

    youdao

  • This will generate a function signature in the source code with the const qualifier for the selected parameter, once the transformation is executed.

    这样转换执行的时候,源代码选定参数生成带有常量修饰符函数签名

    youdao

  • Tools that recognize your signature can then optionally grant your software security privileges it wouldn't otherwise have, and detect if the code has been tampered with.

    这样,能够识别签名工具可以有选择地为授予软件安全特权其他文件做不到的,可以检测代码是否篡改过。

    youdao

  • This makes it easier for frameworks and client and server code in general to handle signature verification.

    通常简化框架客户端服务器代码签名验证

    youdao

  • Second, more information such as comments or zip code can be displayed next to the signature.

    其次更多诸如评论邮编信息可以展示在签名旁边

    youdao

  • But when you replace the PIN code with your signature, the card becomes very limited and can only be used for limited access.

    但是签名代替PIN密码时,只能信用卡进行有限授权的操作。

    youdao

  • Signature changes will cause the client code to either not compile or to crash and behavioral changes will create more subtle errors.

    方法声明变化导致客户无法编译或是崩溃方法行为的变化会导致无可预计的微妙错误。

    youdao

  • The code in Listing 1 shows the signature of the find() method.

    列表1中的代码显示find() 方法结构。

    youdao

  • Message information may be authenticated with error-control code, message authenticated code and digital signature.

    报文信息鉴别认证采用差错控制、报文鉴别码数字签名进行。

    youdao

  • Since expressions are not covered in the digital signature, it is important to verify that expressions aren't harmful, and that the code behind functions that are called by expressions is safe.

    因为数字签名没有覆盖表达式,所以验证表达式无害并且调用函数代码安全的非常重要。

    youdao

  • The encryption and digital signature solve the problem in integrity and confidentiality of active code. The application of decode-binding realizes the scalability in systematic encryption methods.

    加密数字签名解决主动代码完整性机密问题这里使用解码绑定方式实现了系统加密方法可扩展

    youdao

  • The chain code was replaced by the shape signature and used to express the contour, improve the speed and decrease the effect of noise and transformation due to camera calibration.

    特征表示方面,形状签名代替描述轮廓,从而提高计算速度,降低了由噪声干扰镜头形变造成影响

    youdao

  • The reference is actually taken to an intermediate reference assembly, that is, an assembly that contains all the type and signature information, but that does not necessarily contain any code.

    引用实际上引用的中间引用程序,一个包含所有类型签名信息不一定包含任何代码的程序集。

    youdao

  • Typically, the runtime validates each assembly's digital signature when the code is loaded.

    通常,在加载代码运行时会验证每个程序集数字签名

    youdao

  • Extract method determines the signature of the new method, creating a static method when no instance data is referenced by the code in the new method.

    提取方法确定方法签名,并新方法中的代码引用实例数据创建静态方法。

    youdao

  • Enables code to demand that its callers possess a digital signature, thus allowing only callers from a particular organization or site to call the protected code.

    使代码能够要求调用拥有数字签名从而允许特定组织特定站点的调用方调用保护的代码。

    youdao

  • Followed with malicious code analysis and detection technology, for example, the signature scanning, can analysis and detect a certain extent, but still could not avoid their defects.

    随之出现的恶意代码分析检测技术包括特征码扫描等一定程度上进行分析检测工作,无法避免各自的缺陷。

    youdao

  • Followed with malicious code analysis and detection technology, for example, the signature scanning, can analysis and detect a certain extent, but still could not avoid their defects.

    随之出现的恶意代码分析检测技术包括特征码扫描等一定程度上进行分析检测工作,无法避免各自的缺陷。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定