• In a traditional desktop environment, user data is often stored on the device, leading to challenges about the security and protection of user private information and corporate intellectual property.

    传统桌面环境中用户数据常常存储用户设备上,这会在用户私有信息公司智能资产安全性方面造成问题

    youdao

  • Progress of mankind needs a peaceful environment. Stability and security of one country cannot be built on turbulence or crisis of another.

    人类进步需要和平环境一国稳定安全可能建立别国的动荡危机之上。

    youdao

  • Energy, climate change, and stabilizing fragile and post-conflict states were economic issues and not just part of the global dialogue on security and the environment.

    能源气候变化以及脆弱冲突国家稳定问题实际上属于经济问题,而且不仅仅全球安全与环境对话内容

    youdao

  • Then specify the properties of deployment, security, connection, and so on, according to the setting of your deployment and runtime environment, similar to Figure 11.

    然后根据部署运行时环境设置指定部署、安全连接属性见图11

    youdao

  • A large number of chemical weapons abandoned by Japan on the territory of China are still gravely damaging China's biological environment and the security of people's lives and properties.

    日本遗弃大量化学武器至今中国生态环境人民生命财产安全造成严重危害。

    youdao

  • The progress of humanity needs a peaceful environment. It is impossible for a country to achieve stability and security based on the upheavals and crisis of other countries.

    人类进步需要和平环境一国稳定安全可能建立别国的动荡危机之上。

    youdao

  • On the other hand, Glassfish is a prominent application server and understanding its security is something required for anyone using it in production environment.

    一方面,GlassFish优秀应用服务器产品,要生产环境中使用GlassFish,理解安全机制是必要的。

    youdao

  • On the DB2 UDB server: an X.509 certificate, a PKI environment, and a LIPKEY-enabled server-side GSS-API security plug-in.

    DB2UDB服务器中:一张 X.509证书PKI环境以及一个支持 LIPKEY服务器GSS-API安全插件

    youdao

  • The examples in this section will focus on an environment without administrative or application security enabled.

    中的示例关注一个没有启用管理应用程序安全性环境

    youdao

  • We started with a note on the importance of security in a distributed environment and an overview of DCE security model.

    我们首先强调安全性分布式环境重要性概述了DCE安全模型

    youdao

  • The Long Running Execution Environment (LREE) executes a single job while ensuring its required qualities of service (transactional integrity, restart capabilities, security, and so on) are achieved.

    长时间运行执行环境 (LREE)执行单个作业同时确保所需服务质量事务完整性重新启动功能安全)。

    youdao

  • The value you choose for the AUTHENTICATION parameter depends on your particular environment as well as local security policies.

    AUTHENTICATION参数选择依赖具体环境本地安全策略

    youdao

  • Disaster recovery, private key management, and disclosure of controls activities are security concerns in the SaaS environment in the pay-on-demand infrastructure.

    需付费的基础设施中,灾难恢复专用密钥管理控件行为公开SaaS环境中的主要安全性顾虑

    youdao

  • In an environment with WebSphere security enabled, you will also need to make provisions for the CSIV2 and SAS addresses (c, d, e), depending on your application and system requirements.

    启用了WebSphere安全性环境中,需要提供CSIV2SAS地址(cde),取决于应用程序系统需求

    youdao

  • Part 1 of this two-part article discussed several aspects of security, focusing on the core theme of hardening a WebSphere Application Server environment.

    分两部分文章的第1部分讨论了安全性几个方面主要关注加强WebSphereApplicationServer环境核心方案

    youdao

  • Depending on the WS-Security support your environment provides, you might be able to sign just the SOAP body, or you might be able to sign individual elements within the body.

    取决于环境所提供Web服务安全性(WS - Security)支持可以仅仅SOAP主体进行签名,也可以Body内部单个元素进行签名。

    youdao

  • We've discussed numerous aspects of security, although we focused on the core theme of hardening a WebSphere Application Server environment.

    虽然我们将重点放在加强WebSphereApplicationServer 环境这一核心主题上,但我们讨论了有关安全性很多方面

    youdao

  • Considering the environmental security request of shoe factories and practical project, we has designed an environment monitoring installment on the basis of DSP.

    针对鞋厂环境安全要求从实际工程出发,设计一种基于DSP的鞋厂环境监测装置

    youdao

  • Bring forward a security data transmission approach in WAN-based environment on the background ofa WWW-based distributed information system.

    文中种基于WWW分布式信息系统背景下提出种在广域网(WAN)的环境安全传输数据解决方案

    youdao

  • Our security, our prosperity, and our environment all require reducing our dependence on oil.

    我们安全、我们的繁荣我们的环境要求我们减少石油依赖

    youdao

  • When it comes to Web application security testing and remediation , focus on the urgent and important in your environment.

    谈到网络应用安全测试修复重点关注迫切重要的环境。

    youdao

  • A subscription per server for the Management Console, which enables administrators to manage Security Agents and generate reports and alerts on the security status of their environment.

    管理控制台使管理员能够管理安全代理生成报告,并就环境安全状态警报订阅每个服务器

    youdao

  • This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.

    在对控制访问列表作用规则作了概括性介绍后,给出应用实例,具体分析了访问控制列表的使用方法,对于网络安全中的应用给了一些建议

    youdao

  • This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.

    在对控制访问列表作用规则作了概括性介绍后,给出应用实例,具体分析了访问控制列表的使用方法,对于网络安全中的应用给了一些建议

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定