The company specialized in data security and disaster recovery.
该公司专营数据安全与数据灾难复原业务。
The encryption of sensitive data is one of the most important methods in data security.
对敏感数据进行加密是数据安全防护中最核心的手段之一。
In data security, the transmission of data to unauthorized users by processes with legitimate access to data.
在数据保密学中,通过合法访问数据的进程将数据传输给未授权的用户的过程。
The problem has changed very little over the past 20 years. It’s time for everyone to take password security seriously; it’s an important first step in data security.
这个问题在过去20年都没什么变化,现在是人们应该认真对待密码的时候了,这是数据安全的第一步。
The problem has changed very little over the past 20 years. It's time for everyone to take password security seriously; it's an important first step in data security.
这个问题在过去20年都没什么变化,现在是人们应该认真对待密码的时候了,这是数据安全的第一步。
In data security, a sad fact is that although users value their privacy, but when these data can get free access service or to obtain economic benefits, users still tend to take out the data exchange.
在数据安全领域,一个可悲的事实是虽然用户重视他们的隐私,但当通过这些数据能够换来免费访问服务或者获得经济利益时,用户还是倾向于将这些数据拿出来交换。
On the one side, you have the United States government's mighty legal and security apparatus fighting for data of the most sympathetic sort: the secrets buried in a dead mass murderer's phone.
一方是美国政府强大的法律和安全机构,他们所争夺的是最能引起同情的数据:藏在制造群体谋杀的死者手机里的秘密。
This process is often applied to the complete data set in the sources — that is, without security restrictions.
通常将这个过程应用于数据源中完整的数据集,即没有任何安全限制。
The core concept is to centralize all security decisions in the gateway and prevent unwanted data access.
核心思路是把所有安全决策集中在网关,防止不希望出现的数据访问。
This article USES example code to demonstrate keystroke dynamics for enhancing the security of your applications in authentication and continuous data entry contexts.
本文将使用示例代码来演示击键力学如何在验证及连续数据输入环境中增强应用程序安全性。
In particular, it examined access to enterprise data, privacy and security concerns, and some lightweight development tools.
特别是,其中研究了企业数据访问、隐私和安全顾虑,以及某些轻量级开发工具。
To improve security, we recommend that you install the index data service in the data layer.
要提高安全性,我们建议您在数据层安装索引数据服务。
End user identities are not used in security enforcement but may be included in data for audit.
安全执行中不使用最终用户标识,但可能包括在数据中用于进行审核。
Although you can take steps to decrease the risk of a security breach, your data is still in some danger.
虽然您可以分步来减少安全破坏的风险,但您的数据还是处于某种危险之中。
In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.
在本文中,我将谈到数据安全性的机密性方面:确保受保护的数据只能被授权用户或系统访问。
Data security is a prime concern in all organizations.
数据安全是所有组织都很关心的问题。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
In this case, field hiding provides user interface management rather than true data security.
在这种情况下,字段隐藏为用户提供的是接口管理,而不是真正的数据安全。
In addition, its encryption capabilities provide enhanced data security.
此外,它的加密功能增强了数据安全性。
Many SOA implementations require technology expertise in several layers of the architecture: business processes, business rules, data services, security, etc.
很多SOA实现在架构的几个层级都要求技术专家:业务流程、业务规则、数据服务、安全等。
These security policies are defined using the master data in the system. The policies require no customer development.
使用系统中的元数据定义这些安全策略,客户不需要开发它们。
Security for data while in transit or in storage is a very important part of the discussion.
在传输或存储时的数据安全是讨论中一个非常重要的部分。
Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.
小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。
The quality of data aspect is measured by the ability to ensure reliability of data accessed, availability of data accessed, being able to allow concurrency as well as security of the data in storage.
数据方面的质量是通过保证数据访问可靠性、数据访问可用性和支持数据存储的并发性与安全性等功能进行判断的。
What if someone is deliberately introducing bad data in the hopes of breaching your program's security?
如果有人故意引入坏数据来破坏程序的安全性又该如何呢?
Data in a table can only be protected by security labels that are part of the security policy protecting the table.
一个表中的数据只能受到保护该表的安全策略的安全标签的保护。
In a multi-tenant context, the security isolation mechanism is very important in preventing the data of one tenant from being accessed illegally by other tenants.
在多租户上下文中,安全隔离机制非常重要,必须防止租户非法访问其他租户的数据。
Security labels are applied to data in order to protect the data.
安全标签被应用到数据上,以保护该数据。
Security labels are applied to data in order to protect the data.
安全标签被应用到数据上,以保护该数据。
应用推荐