• It allows both unilateral and mutual authentication to be accomplished without the use of secure timestamps.

    使用安全时间戳即可完成单向双向身份验证

    youdao

  • Right away, a default user registry is enabled out-of-the-box for better identity management, and a secure service integration bus enforces the use of secure transport protocols.

    这样可以立即启动缺省用户注册表实现更完善身份管理并且安全服务集成总线可以强制使用安全传输协议

    youdao

  • It provides us with a no-administration, secure, replicated store that we can use to deploy application data flexibly, to many different kinds of clients and devices.

    我们提供一个不用管理安全的、复制存储我们可以使用它来灵活地将应用程序数据部署很多不同客户机设备上

    youdao

  • The final portion of the configuration, included in Listing 11, indicates which resources you would like to secure and what type of authentication you want to use.

    配置最后一部分包含清单11 中,部分指出了所需保护资源以及采用认证方式

    youdao

  • Usually charitable donations from corporations are spontaneous, but corporate foundations can secure more steady donations through the systematic use of the corporation's charitable funds.

    通常来自企业资产捐助都是自发的,企业基金会可以通过系统地使用企业慈善资金来保障捐助的持续和稳定。

    youdao

  • You could seamlessly provide a secure link between the in-game existence and his account, so that use of the scrip in the game immediately translates into an account balance change.

    可以玩家的帐号游戏角色之间无缝地提供安全链接所以游戏使用通货时,帐号的余额就会立即反映出变化

    youdao

  • The JMS queue will be configured to prevent unauthorized connections and to enable the use of SSL to secure the communication channel, which addresses requirement 5.

    需要jms队列进行配置使它能够阻止未授权连接启用ssl保护通信通道满足第5条要求。

    youdao

  • Provided our privacy remains secure, there is no excuse not to use every bit of science we can in the fight against crime.

    假如我们隐私安全的,那么没有借口打击犯罪中使用科技手段。

    youdao

  • You can take several approaches to secure the use of JSON.

    可以采取一些方法保护JSON使用

    youdao

  • But with the help of third-party libraries and vendor support, we have found that we can use MIDP 1.0 to implement secure applications.

    第三方供应商支持帮助下我们发现可以MIDP 1.0实现安全应用程序

    youdao

  • Should anyone else ever gain access to the private key, they can then use it as "proof" of identity and act as you; it is like a password, only more secure and more difficult to change.

    如果其他任何人能够访问他们接下来就可以证明身份名义进行活动;私钥密码只是安全更改比较困难

    youdao

  • After the authentication, SSL will actually use secret key encryption to secure the channel, but the details of that aren't relevant to this discussion.

    身份验证之后SSL真正使用保密密钥加密保护通道细节讨论无关。

    youdao

  • To allow for ease of use, wireless Hosted Network also supports the concept of a secondary or user security key that is more user-friendly, but could be less secure.

    为了便于使用无线承载网络支持第二密钥”,称作“用户安全密钥”,使用起来更加友好,但是安全性稍

    youdao

  • The only difference is that, after you perform the standard security configuration, you need to secure the Web service by specifying the use of the LTPA token.

    唯一区别在于,在进行标准安全配置之后需要通过指定 LTPA 令牌的使用确保Web服务的安全。

    youdao

  • You can use the stub enhancer tool to save most of your effort in building J2ME-based secure Web services clients.

    可以使用存根增强器工具保存构建基于J2ME安全Web服务客户机过程中的大部分工作

    youdao

  • We'll use the term resource to refer to the finest grain of functionality that we can secure with a permission; for example, a Web page or EJB method call.

    我们使用资源表示可以使用权限保护粒度功能例如We bEJB方法调用。

    youdao

  • The simplest way to use secure beans in a JSF application is to follow the same approach used in the five steps in Listing 4 of Part 3.

    JSF应用程序使用安全bean最简单方法就是执行 第 3部分清单4 中介绍的五个步骤

    youdao

  • Without this kind of configuration, every secure connection within a JVM must use the same KeyStore and TrustStore.

    如果没有这种配置JVM中的每个安全连接必须使用相同KeyStoreTrustStore

    youdao

  • "If programmers are not motivated to, say, use secure libraries or to avoid known bad functions or techniques, where is the incentive to take the tougher path of writing secure code," Long said.

    Long说:“如果程序员被激励使用安全避免不好函数技术如何使他们走向艰难的编写安全代码之路呢? ”。

    youdao

  • Design principles, such as code auditing, extensive use of encryption, and careful configuration choices, combine to ensure OpenBSD's secure by default philosophy holds true.

    其中一些设计原则代码审核加密处理广泛使用以及仔细配置选择它们组合在一起可以确保实现OpenBSD缺省安全思想

    youdao

  • This article provides an overview of how you can use the SSL feature of IDS to secure the data in transit.

    本文概述如何使用ISDssl特性来为传输中的数据提供保护

    youdao

  • Firefox 3 has been built on top of this new platform resulting in a more secure, easier to use, more personal product with a lot more under the hood to offer website and Firefox add-on developers.

    Firefox3建立这个新平台上,产生更加安全易于使用、更加个性化产品,并且网站Firefox插件开发人员提供更多内部特性。

    youdao

  • The UsernameToken specification allows for the use of a one-way secure hash to protect the password called a digest, but this functionality is not provided in Application Server V6.

    UsernameToken规范允许使用单向安全哈希保护摘要形式密码ApplicationServerv6没有提供功能

    youdao

  • While FTP remains in wide use, secure FTP (SFTP), the secure version of FTP, should be used whenever possible.

    FTP仍然广泛使用,但是应该尽可能使用FTP安全版本Secure FTP (SFTP)。

    youdao

  • Surely the framework might be more secure to use in this case, but think of all the includes and checks the framework would have to do before even getting to execute your code!

    毫无疑问这里使用框架肯定能使代码安全但是想想这个重量级框架里面的众多的包涵文件输入检查吧!

    youdao

  • Since it is not easy to judge the direction of force in a fall, much less the extent of force, the belayer must evaluate each situation and make use of the rock for the most secure position.

    由于降落过程很难判断受力方向不用说受力大小,因此保护者必须情况进行估量利用岩石取得安全的位置。

    youdao

  • The client and the sever applications described earlier in this article can make use of GSS-API for mutual authentication and secure data exchange.

    本文前面描述客户端服务器应用程序可以利用GSS - API进行相互身份验证安全数据交换。

    youdao

  • Once standards become established, the use of biometrics could spread so that it is used to secure retail transactions made via the Internet and mobile phones, not just in shops.

    标准一旦确立生物识别技术被广泛应用,届时不只商店,还会用于确保网上手机零售交易的安全性。

    youdao

  • Once standards become established, the use of biometrics could spread so that it is used to secure retail transactions made via the Internet and mobile phones, not just in shops.

    标准一旦确立生物识别技术被广泛应用,届时不只商店,还会用于确保网上手机零售交易的安全性。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定