• In other words, those secure systems can be very easily brute forced.

    话说,这些安全体系可能容易被暴力破解。

    youdao

  • It also points you to resources about how to secure systems in general.

    列出了有关通常情况下如何保证系统安全的资源

    youdao

  • One subtle aspect of secure systems is the concept of validating the target of a request.

    安全系统一个较为微妙的方面验证请求目标概念

    youdao

  • If Sony had built more secure systems, it would not find itself being mocked in the public square.

    如果索尼事先构建了更为安全系统那么它不会发现自己沦为在公开场合遭到嘲笑的对象。

    youdao

  • But too often, human frailties gum up the works by leaving unforeseen breaches in otherwise secure systems.

    情况经常是,人为过失原本安全系统留下意外漏洞,把事情弄糟。

    youdao

  • Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.

    尽管这个文件 ACL (AccessControlList) 保护,允许根用户访问但是这对于安全性要求的系统可能不够

    youdao

  • The Java EE specification and WebSphere Application Server provide a powerful infrastructure for implementing secure systems.

    J2EE规范WebSphereApplicationServer提供了一种用于实现安全系统的强大的基础设施

    youdao

  • Message filter algorithms can implement mandatory access control in the multilevel secure systems with an object oriented model.

    采用消息过滤算法可以在支持对象模型多级安全系统实现强制访问控制

    youdao

  • Labels are the foundation for implementing multilevel systems and the prerequisite of enforcing mandatory access control in secure systems.

    标记实现多级安全系统基础,实施强制访问控制前提

    youdao

  • Before delving into specific point-by-point recommendations, let's take a moment to outline the fundamental techniques for creating secure systems.

    详细研究具体建议之前,我们一些时间概述创建安全系统基础技术

    youdao

  • Before delving into specific point-by-point recommendations, we want to take a moment to outline the fundamental techniques for creating secure systems.

    详细研究具体建议之前,我们打算一些时间概述创建安全系统基础技术

    youdao

  • SQL injection attacks are a serious concern for application developers as they can be used to break into supposedly secure systems and steal, alter, or destroy data.

    SQLInjection攻击应用程序开发人员紧密相关,因为它们用于侵入据推测是安全系统窃取更改销毁数据。

    youdao

  • "The Human Factor," treated in Chapter 17, is a critical aspect of truly secure systems that is often ignored in breathless discussions about new security technology.

    17讲述的“因素”,我们在讨论新的安全技术时,经常忽略掉安全系统关键方面

    youdao

  • These are important capabilities called out in PCI DSS Requirements 2 (don't use vendor default passwords), 6 (maintain secure systems), and 11 (regularly test system security).

    这些重要功能能够满足pciDSSRequirements2(使用厂商默认密码)、6(维护安全系统)11(定期测试系统安全性)。

    youdao

  • Trusted certificate authorities issue digital certificates, which are then used to authenticate users and organizations for access to Web sites, E-mail servers, and other secure systems.

    可信证书权威机构发布数字证书它们用来鉴别用户组织访问Web站点e - mail服务器其他安全系统的权限。

    youdao

  • It architects and lead developers should read this book so they can intelligently discuss security-cost trade-offs with management and apply its techniques to produce more secure systems.

    IT架构师主要开发人员应当阅读本书这样他们能够明智地讨论安全-成本取舍,并且运用一些技巧拥有安全的系统。

    youdao

  • Finally, some ideas on how to properly secure yourself and your systems from the possibility of a password cracking attack were offered.

    最后,提供有关如何适当保护您自己系统避免可能受到密码破解攻击一些想法

    youdao

  • This is a risk and an area of concern for systems where there is a need for highly secure solutions.

    这会带来风险,对于需要非常安全解决方案的系统可能很严重的问题

    youdao

  • With over 70% of attacks now carried out over the web application level, organisations need all the help they can get in making their systems secure.

    当前已经超过70%攻击发生网络应用层各级组织急需能够保证他们系统安全性帮助

    youdao

  • Because there are many degrees of freedom and many different sources of this information, some users tend to overlook security issues and deploy systems that are not particularly secure.

    这些信息许多自由度许多不同来源,所以一些用户往往忽视安全性问题部署系统不够安全

    youdao

  • Third -- and where the JDBC specification does not have any corresponding focus -- is security management for enabling secure access to back-end systems.

    第三个支持后端系统的安全访问安全性管理在这点,JDBC规范没有任何对应

    youdao

  • A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.

    漏洞扫描器类似其他类型扫描器——例如端口扫描器有助于保障端口上网络系统的安全

    youdao

  • However, you should also spend some time ensuring that other computers, including your desktop systems, are reasonably secure.

    不过应该一些时间确保其他计算机(包括桌面系统)具有合理安全性

    youdao

  • As quantum hackers continue to put systems through their paces, such loopholes will be closed-as these now have been-and the systems become more secure.

    随着量子黑客们继续考察系统的防护能力,这些漏洞关闭——就像现在——系统也变得更加安全

    youdao

  • Serious consequences could result by failure to secure your computer systems.

    严重后果可能计算机系统中的数据保护失败

    youdao

  • You must communicate that any conversion to an SOA model involves an inherent security paradox: the more SOA your systems are, the less secure they are.

    必需让大家认识,到soa模型任何转换都会涉及固有安全矛盾系统soa特征越明显,其安全性越差。

    youdao

  • Finally, guests can check-out from their mobile device at any time, even once they have left the property, settling outstanding charges via secure payment systems.

    最后客户可以任何时候通过手机结账甚至他们离开酒店之后,他们可以通过安全支付系统来结算一些未支付的费用

    youdao

  • Since many of us don't go to that extreme to keep our systems secure, how do we assess our vulnerability?

    我们很多没有自己的系统安全性挖掘至极那么我们应该如何评估系统的缺陷呢?

    youdao

  • There are several classic deadlock and synchronization problems the student must understand in order to begin to reason about creating secure, efficient operating systems.

    为了开始创建安全有效操作系统学生必须了解许多经典死锁同步问题

    youdao

  • This tends to lead to people overlooking security issues and to deploying systems that are not secure.

    往往使人们忽视安全性问题部署系统不够安全

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定