• 完整性安全实现完整程度

    Completeness: How complete is the security implementation?

    youdao

  • 第7遵循soa安全实现SDLC流程

    Step 7. Follow an SDLC process for an SOA security implementation.

    youdao

  • 最后DOM实现通常包括许多同步代码使多线程化访问安全

    Finally, DOM implementations generally include a lot of synchronization code to make multithreaded access safe.

    youdao

  • 实现级别可以定义sca组件安全标识

    Implementation: at this level, you define the security identity of the SCA component.

    youdao

  • 必须对其进行正确的实现避免产生任何安全问题

    Implementation must be done properly to avoid any security issues.

    youdao

  • 这样的话,一个实现安全特性的绝佳地点

    As such, it is an excellent place to implement security features.

    youdao

  • 考虑:各项技术如何实现安全支持的?

    Consideration: How is security supported by the technology?

    youdao

  • 第二怎样才能兴趣通过安全理智两厢情愿的方式实现呢?

    And second, how can I square my interests with safe, sane, consensual play?

    youdao

  • 如果没有统一策略开发人员就要每个网络应用程序重复实现定制安全机制。

    Without a unified strategy, developers re-implement custom security for each network application.

    youdao

  • 实现级别定义安全标识

    Defining the security identity at the implementation level.

    youdao

  • 资料来源拉丁美洲努力实现老年收入安全承诺)。

    Source: Keeping the Promise of Old Age Income Security in Latin America

    youdao

  • 下面概述场景众多可以使用Web服务安全性(WS - Security)实现可能性中的一个

    The scenario outlined below is one of many possibilities that can be realized with WS-Security.

    youdao

  • 那么怎样才能使用OpenSSL实现一个基本安全连接呢?

    So how can you implement a basic secure connection using OpenSSL?

    youdao

  • 这种实现毫无安全可言。

    This implementation offers no level of security.

    youdao

  • 只需命令实现很高安全

    You can implement high security with a single command.

    youdao

  • 分布式环境安全机制实现一种高级复杂安全模型如图1所示。

    Distributed environment security implements an advanced and complex security model as shown in Figure 1.

    youdao

  • 本文的示例展示如何实现安全配置

    The example in this article has shown you how to implement the security configuration.

    youdao

  • 然而实现安全一种更好方法利用ejb安全性。

    However, a stronger approach for security is to leverage EJB security.

    youdao

  • 组织实现哪些不同IT安全服务

    What are the different IT security services implemented in the organization?

    youdao

  • 错误传输协议可能导致伸缩性实现难度安全可靠性方面严重问题

    The wrong transport can cause serious problems with scalability, implementation difficulty, security, and reliability.

    youdao

  • 现在可以自己实现财政上安全

    You can use these rules to make yourself financially secure now !

    youdao

  • 线程安全自动实现的。

    Thread safety is automatic.

    youdao

  • 所有这三个安全需求完整实现包括

    A full implementation of all three security requirements would include.

    youdao

  • 实现服务安全之时,许多教训应当谨记

    With service security implementations, a number of lessons should be kept in mind

    youdao

  • 解决功能扩展安全控制实现问题

    It solves the problems of function extension and security control.

    youdao

  • 2实现一个简单安全插件

    Example 2: Implementing a simple group security plug-in.

    youdao

  • 实现安全发布对象技术就是对象引用定义为volatile类型。

    One technique for safely publishing an object is to make the object reference volatile.

    youdao

  • 实现安全发布对象技术就是对象引用定义为volatile类型。

    One technique for safely publishing an object is to make the object reference volatile.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定