• The company specialized in data security and disaster recovery.

    公司专营数据安全数据灾难复原业务

    youdao

  • The encryption of sensitive data is one of the most important methods in data security.

    敏感数据进行加密数据安全防护核心手段之一

    youdao

  • In data security, the transmission of data to unauthorized users by processes with legitimate access to data.

    数据保密学中,通过合法访问数据进程数据传输未授权的用户过程。

    youdao

  • The problem has changed very little over the past 20 years. It’s time for everyone to take password security seriously; it’s an important first step in data security.

    这个问题过去20没什么变化现在人们应该认真对待密码时候数据安全一步

    youdao

  • The problem has changed very little over the past 20 years. It's time for everyone to take password security seriously; it's an important first step in data security.

    这个问题过去20没什么变化现在人们应该认真对待密码时候数据安全一步

    youdao

  • In data security, a sad fact is that although users value their privacy, but when these data can get free access service or to obtain economic benefits, users still tend to take out the data exchange.

    数据安全领域一个可悲事实虽然用户重视他们隐私通过这些数据能够换来免费访问服务或者获得经济利益时,用户还是倾向于将这些数据出来交换。

    youdao

  • On the one side, you have the United States government's mighty legal and security apparatus fighting for data of the most sympathetic sort: the secrets buried in a dead mass murderer's phone.

    美国政府强大法律安全机构他们所争夺能引起同情的数据制造群体谋杀的死者手机里秘密

    youdao

  • This process is often applied to the complete data set in the sources — that is, without security restrictions.

    通常这个过程应用数据源完整数据,即没有任何安全限制。

    youdao

  • The core concept is to centralize all security decisions in the gateway and prevent unwanted data access.

    核心思路所有安全决策集中网关防止不希望出现数据访问。

    youdao

  • This article USES example code to demonstrate keystroke dynamics for enhancing the security of your applications in authentication and continuous data entry contexts.

    本文使用示例代码演示击键力学如何验证连续数据输入环境中增强应用程序安全性

    youdao

  • In particular, it examined access to enterprise data, privacy and security concerns, and some lightweight development tools.

    特别是其中研究了企业数据访问隐私安全顾虑以及某些轻量级开发工具。

    youdao

  • To improve security, we recommend that you install the index data service in the data layer.

    提高安全性我们建议数据安装索引数据服务

    youdao

  • End user identities are not used in security enforcement but may be included in data for audit.

    安全执行使用最终用户标识可能包括数据用于进行审核

    youdao

  • Although you can take steps to decrease the risk of a security breach, your data is still in some danger.

    虽然可以分步减少安全破坏风险,但数据还是处于某种危险之中

    youdao

  • In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.

    本文中,谈到数据安全性机密性方面确保受保护数据只能授权用户系统访问

    youdao

  • Data security is a prime concern in all organizations.

    数据安全所有组织都关心的问题。

    youdao

  • We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.

    我们为认证授权通过加密保护数据这些方面的安全问题提供解决方案

    youdao

  • In this case, field hiding provides user interface management rather than true data security.

    这种情况下字段隐藏用户提供的是接口管理不是真正数据安全

    youdao

  • In addition, its encryption capabilities provide enhanced data security.

    此外加密功能增强数据安全性

    youdao

  • Many SOA implementations require technology expertise in several layers of the architecture: business processes, business rules, data services, security, etc.

    很多SOA实现架构几个层级都要求技术专家业务流程、业务规则数据服务安全

    youdao

  • These security policies are defined using the master data in the system. The policies require no customer development.

    使用系统中的数据定义这些安全策略客户需要开发它们。

    youdao

  • Security for data while in transit or in storage is a very important part of the discussion.

    传输存储数据安全讨论中一个非常重要部分

    youdao

  • Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.

    小心请不要生产环境中使用过程允许未经授权的用户访问用户数据这样做可能会违反公司隐私安全政策

    youdao

  • The quality of data aspect is measured by the ability to ensure reliability of data accessed, availability of data accessed, being able to allow concurrency as well as security of the data in storage.

    数据方面质量通过保证数据访问可靠性、数据访问可用性和支持数据存储的并发性安全性功能进行判断的。

    youdao

  • What if someone is deliberately introducing bad data in the hopes of breaching your program's security?

    如果有人故意引入数据破坏程序安全性又该如何呢?

    youdao

  • Data in a table can only be protected by security labels that are part of the security policy protecting the table.

    一个中的数据只能受到保护该表安全策略安全标签保护

    youdao

  • In a multi-tenant context, the security isolation mechanism is very important in preventing the data of one tenant from being accessed illegally by other tenants.

    租户上下文中安全隔离机制非常重要必须防止租户非法访问其他租户数据

    youdao

  • Security labels are applied to data in order to protect the data.

    安全标签应用数据上,保护数据。

    youdao

  • Security labels are applied to data in order to protect the data.

    安全标签应用数据上,保护数据。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定