• A secure system accomplishes its task with no unintended side effects.

    安全系统副作用的情况下完成任务

    youdao

  • Allows an application to read or write the secure system Settings.

    允许一个应用程序读写系统安全设置。

    youdao

  • Cohen: We understand that the highest priority has to be a physically secure system.

    科恩我们深知重中之重莫过于建立实体安全系统

    youdao

  • It is important to realize that there is no such thing as a perfectly secure system.

    应该认识到没有完美的安全系统,一点重要

    youdao

  • It is important that you realize there is no such thing as a perfectly secure system.

    应该认识到没有完全安全系统一点重要

    youdao

  • To create a secure system, you must consider where information is stored or displayed.

    创建安全系统必须考虑在哪存储显示信息

    youdao

  • The software also offers an IT security guide which explains how to set up a secure system.

    软件提供了一个IT安全指南其中介绍了如何设置安全系统

    youdao

  • Leveraging native application server authentication is crucial to creating a properly secure system.

    利用本机应用服务器身份验证创建完全安全的系统至关重要。

    youdao

  • It's called package management, and it's a dynamic game everyone has to play to maintain a secure system.

    被称为软件包管理一个每个人都必须参与维护安全系统动态游戏

    youdao

  • For a truly secure system, the message will be encrypted in a way that requires a mathematical key to unlock it.

    实际使用的安全系统中,信息进行加密后,只有借助一段数字密钥才能解密密文。

    youdao

  • Detection SystemSince protection is not enough, a detection system is needed to build a real time monitor for the secure system.

    检测系统除了防范体系之外,我们需要一个检测系统实时监测系统的运行状态。

    youdao

  • The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.

    真正安全系统只能关机断电,放到混凝土浇注的建筑物中的一个密闭房间配备警力进行守卫。

    youdao

  • The Fail-stop signature is a very secure system, even though the attacker gains signature key, it is difficult to forge signature.

    失败签字一种十分安全的签字体制即使攻击者得到签字密钥难以伪造签字。

    youdao

  • While security features do not guarantee a secure system, they are necessary to build a secure system. Security features have four categories.

    虽然安全特性不能担保一个安全系统但是他们构建安全系统所必需的。

    youdao

  • This will facilitate a common platform for system support and operations, thus improving efficiency and maintaining a reliable and secure system.

    系统支持运营促成共同平台从而提高效率保持一个安全可靠的系统。

    youdao

  • Identity authentication is an important part of a perfect secure system, the first defense, and the foundation of secure communication and access control.

    身份认证一个完善的安全系统重要组成部分,是一道安全屏障,它是安全通信访问控制基础

    youdao

  • The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.

    优势显然的:会有一个drm(数字版权管理)限制的、甚至硬件上跑的安全系统而那最好的事就是所有软件完全免费。

    youdao

  • Instead, the baseline configuration should call for a completely secure system with the additional cost in time, administration, or tools factored into the project up front.

    相反基准配置应该要求完全安全系统项目之初考虑附加时间管理工具方面成本

    youdao

  • I'm not even at a medium level when considering cryptography coding, but I dont want to implement a high secure system for one part and 0 secure system for another part.

    在考虑加密编码甚至没有中级不想一部分实现安全系统,为一部分实现0安全系统。

    youdao

  • Then, starting from thee-mail security, primarily achieved assigned package and encrypt-decrypt authentication mechanism, and elaborated the implementation of a secure system.

    然后电子邮件安全角度入手主要设计实现了分包机制解密认证机制详细阐述了安全系统实现

    youdao

  • As the centralized monitoring system is a non secure system, it is necessary to adopt a secure communication protocol between the centralized monitoring system and other systems.

    由于集中监测系统安全系统,从系统边界防护角度考虑,应该集中监测系统其它系统之间通信接口采用安全通信协议

    youdao

  • This design presents a reasonably secure system; as long as each voting user has one and only one acceptable E-mail account, there is reasonable assurance that users could not vote twice.

    这种设计可以得到比较安全系统;条件每个投票用户都有只有可以接受电子邮件帐号这样可以保证每个用户不会两次票。

    youdao

  • You should now be able to deal with common disasters without losing your cool, and you'll be able to prepare in advance for problems by keeping incremental backups and having a secure system.

    现在应该可以冷静处理常见灾难通过增量备份确保系统安全的措施将来的问题做好准备

    youdao

  • And last elucidates the structure of the secure system. By aiming at PKI, information secure core technology and analyses the RSA algorithm and sorts of the tech of info exchanging encryption.

    最后信息交换加密技术分类RSA算法分析,并针对PK I技术信息安全核心技术,论述了安全体系构成

    youdao

  • The system login uses information such as source ID (SID), domain and system user name for authentication, so it is considered secure.

    系统登录会使用诸如ID安全识别符),系统用户信息进行身份验证,因此认为是安全的。

    youdao

  • Secure messages are created via a system of digital certificates.

    安全消息通过数字证书系统创建的。

    youdao

  • In that case, you might want to create a secure, "closed loop," system.

    这种情况下可能希望创建一个安全的“闭环系统

    youdao

  • Now you are ready to set up the secure register balance accounting system.

    现在已经准备好安装安全收银机结算系统。

    youdao

  • To further secure the system, tokens only can be used once.

    为了进一步加强系统安全令牌只能使用一次

    youdao

  • To further secure the system, tokens only can be used once.

    为了进一步加强系统安全令牌只能使用一次

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定