• The trusted device network approach provides an organization with a higher level of control over critical system access.

    信任硬件网络策略提供了一种可以更高效控制临界系统接入组织结构

    youdao

  • Mobile communication devices such as PDA and cellular phone will be inalterable and credible by installing the PTD (Personal Trusted device).

    手机行动装置加装此安全模组晶片成为信赖之防窜改装置,即个人信赖装置

    youdao

  • Pushing the device emulation from the hypervisor to user space has some distinct advantages. The most important advantage relates to what's called the trusted computing base (TCB).

    设备模拟管理程序推向用户空间一些明显优势最大优势涉及所谓可信计算基础(trusted computing base, TCB)。

    youdao

  • Contains the Trusted Keys for the device.

    包含信任关键设备

    youdao

  • Contains the Trusted Keys for the device.

    包含信任关键设备

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定