• We can provide technique security for customers, because we have a complete industry chain and a powerful technical fleet to control quality.

    完整产业链雄厚技术研发队伍, 使富凯公司更精确的控制产品质量客户提供有力的技术保障

    youdao

  • This technique improved the security by separating the user information from the password data.

    这项技术通过用户信息密码数据分离而提高安全性

    youdao

  • This technique lets you can develop your JSF applications without considering security issues.

    使用这项技术可以不用考虑安全问题的情况下开发JSF应用程序

    youdao

  • This is probably the most widely used technique for signing or encrypting messages with WS-Security, and it does have some advantages.

    使用WS - Security进行消息签名加密中广泛使用的技术而且一些优势。

    youdao

  • This is the fundamental concept behind the privilege-separation security technique employed by qmail.

    就是qmail使用的在其基础概念之后的权限分离安全技术

    youdao

  • The callback technique lets you use any verification technique you want as an extension of the Rampart security handling.

    技术可以让使用任何检查技巧扩展Rampart安全处理。

    youdao

  • The security technique described in this article is fairly simple, and so are the Acegi facilities used to implement it.

    本文所述安全技术非常的简单所以 Acegi使用这些技术实现安全性。

    youdao

  • Therefore, the research of Internet security technique has been one of focuses in the communication and an important research area of the information science.

    因此网络安全技术研究成为现在计算机通信界个热点,并且成为现在信息科学的一个重要研究领域

    youdao

  • Host security is becoming an urgent problem that every computer user has to face. Host hole scanning technique is an important security technology to provide security guarantee for host.

    主机安全成为计算机用户面临紧迫问题,主机漏洞扫描技术就是主机安全提供保证的一项重要的安全技术

    youdao

  • An digital image watermark algorithm is proposed based on the synergetic neural network, combined with encryption technique, to guarantee its robustness and security.

    保证图像数字水印棒性和安全性,结合加密技术,提出了一种使用协同神经网络的图像数字水印算法

    youdao

  • Firstly, this method USES the continuation power flow (CPF) technique and both of static security and transient stability constraints are considered.

    算法采用连续潮流(CPF)技术考虑了系统静态安全约束暂态稳定约束。

    youdao

  • The author introduce the structure, function, feature, main technique parameters and system operation condition of the main dam security monitor system of the Chengbihe reservoir.

    介绍澄碧河水库大坝安全监测系统结构功能特点主要技术参数系统运行情况

    youdao

  • Intrusion detection technique, which as a kind of solution of protecting network security, has been paid more and more attention by people.

    入侵检测技术作为保护网络安全解决方案越来越受到人们重视

    youdao

  • The SAR technique allows one to capture both sides of the market as the security fluctuates up and down over time.

    特区技术允许捕捉双方市场安全上下波动一段时间。

    youdao

  • The category of the digital watermarking technique belongs to the information security area.

    数字水印技术属于信息安全范畴

    youdao

  • As a sort of security mechanism, Role Based Access Control (RBAC) technique has been one of the hotspots in current research.

    基于角色访问控制(RBAC)作为安全机制当前研究热点之一

    youdao

  • Security control is a key technique problem of finance computerizing information system.

    安全性控制金融电子化信息系统技术关键

    youdao

  • Digital signature is an important technique in security field, and blind digital signature differs from traditional signature in characteristics, which make it possible to apply electronic vote.

    数字签名安全领域中的一项重要技术签名有着传统签名不同特性使得电子投票应用成为可能

    youdao

  • Data encrypting and data underwrite are key technique of solving the problem of network security.

    数据加密数字签名解决网格安全问题关键技术

    youdao

  • Whether power network is rational or not is coming into being the long influence to technique capability, economy benefit, security, high quality and running.

    电网结构合理与否,对电网技术性能经济效益以及安全优质、经济、高效运行将产生长期影响

    youdao

  • The key technique includes remote cooperation frame, database security coding and so on.

    关键技术涉及远程协作网架构数据库安全保密

    youdao

  • The TEMPEST technique is a new subject in the information security field.

    TEMPEST技术信息安全领域一个专门研究领域。

    youdao

  • Various safety guard technologies emerge as the times require, and Virtual Private Network(VPN) technique with its practicability, security, simple and low cost acquired extensive application.

    各种安全防范技术应运而生其中虚拟专用网络VPN技术实用性安全性简单成本获得了广泛的应用。

    youdao

  • BCH codes are a subset of the class of linear block codes that have good error correction capability. Information hiding is a new technique in information security field.

    BCH纠错编码线性分组一种较好的纠错能力信息隐藏近年来信息安全领域出现的技术

    youdao

  • The network information security technique commonly includes authentication, authorization, audit, data privacy, data integrity and so on.

    网络信息安全技术一般包括身份认证授权控制审计数据保密数据完整性等几个方面。

    youdao

  • It is the important guarantee of forming current network security to instruction detection technique.

    入侵检测技术构成当今网络安全重要保障

    youdao

  • Discussing the research method that resolve the adaptation of security system using distributed object technique and data mining.

    探讨利用分布式对象技术数据挖掘技术解决网络安全系统适应性研究思路

    youdao

  • Discussing the research method that resolve the adaptation of security system using distributed object technique and data mining.

    探讨利用分布式对象技术数据挖掘技术解决网络安全系统适应性研究思路

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定