• Completeness: How complete is the security implementation?

    完整性安全实现完整程度

    youdao

  • Step 7. Follow an SDLC process for an SOA security implementation.

    第7遵循soa安全实现SDLC流程

    youdao

  • Implementation: at this level, you define the security identity of the SCA component.

    实现级别可以定义sca组件安全标识

    youdao

  • Implementation must be done properly to avoid any security issues.

    必须对其进行正确的实现避免产生任何安全问题。

    youdao

  • This implementation offers no level of security.

    这种实现毫无安全性可言。

    youdao

  • The wrong transport can cause serious problems with scalability, implementation difficulty, security, and reliability.

    错误传输协议可能导致伸缩性实现难度安全性可靠性方面严重问题

    youdao

  • A full implementation of all three security requirements would include.

    所有这三个安全性需求完整实现包括

    youdao

  • Defining the security identity at the implementation level.

    实现级别定义安全标识

    youdao

  • Many people question the security of this kind of mechanism and its implementation.

    许多质疑机制以及实作品安全

    youdao

  • Implementation of the security service system for data exchange center.

    实现数据交换中心安全服务系统

    youdao

  • Authentication is a key technology for the implementation of security and charging management.

    认证实现安全管理计费管理关键技术

    youdao

  • Responsible for the implementation and maintenance in the factory C-TPAT security management system;

    负责工厂推行维持C-TPAT安全管理体系

    youdao

  • Security of the application is implementation-dependent.

    应用程式安全性与实作相关。

    youdao

  • Security of the application is implementation-dependent.

    应用程式安全性与实作相关。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定