• There are constantly changing standards for APIs, gateways, security methods, screens, operating systems, and browsers.

    网关安全性方法屏幕操作系统浏览器标准经常改变

    youdao

  • At last, main intrusion methods and security compromization targeted at information systems are discussed.

    最后论述了网络环境中主要采用入侵手段以及信息系统面临的主要安全威胁

    youdao

  • However, with the limitations of traditional software development methods, the security and reliability of Operating Systems cannot be very well supported.

    采用传统软件开发方法开发的操作系统,系统安全性可靠性得不到好的保证

    youdao

  • Systems and methods for integrating facility access with other security systems are described.

    描述了设施访问其他安全系统集成的系统方法

    youdao

  • The methods in which suppress the EMI and improve systems security in terms of discharge circuit, laser cavity, hard - software designs were discussed.

    文中描述了准分子激光器中的电磁干扰来源干扰途径,并详细激光放电回路、激光软硬件设计角度讨论了抑制电磁干扰和提高系统可靠性方法

    youdao

  • The thesis is focused on the access control model for workflow systems and the security analysis of workflow systems by formal methods.

    本文研究工作流系统访问控制模型及其安全性分析方法

    youdao

  • The thesis is focused on the access control model for workflow systems and the security analysis of workflow systems by formal methods.

    本文研究工作流系统访问控制模型及其安全性分析方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定