确保物品的存储安全。
操作简单、快捷方便数据存储安全、可靠。
Simple, fast and convenient data storage security, and reliable.
对AIX安全专家的改进包括支持在LDAP中存储安全模板。
Enhancements to AIX security expert include an enhancement to store security templates in LDAP.
基于IP复用方法实现的硬盘加密卡,是一种用于保障数据存储安全的硬件加密装置。
Hard disk encryption card, which is designed based on the IP reuse in this paper, is a kind of hardware encryption device to ensure storage security.
综合运用对称加密算法和公钥算法,既保证敏感信息的存储安全又为密钥提供安全高效的管理。
This scheme used of symmetry encryption and public key encryption which provided secured storage for sensitive data and effective key management.
实践证明,该系统具有稳定性高、防腐防霉防雷击、低功耗低成本等特点,能够有效保障粮食存储安全。
Proved through practice, this system is featured for high stability, anti-sepsis, mould proof, lightning protection, low-consuming and low-cost, which ensures the storage security effectively.
我们根据附网存储的特点,设计了一个附网存储安全系统,本文重点介绍其应用级加密算法的设计与实现。
We design a NAS security system based on NAS character, This paper introduces the design and implement of application encryption arithmetic.
直接甲醇燃料电池(DMFC)由于其燃料来源丰富、价格便宜、运输和存储安全等优点而受到广泛的重视。
Developed direct methanol fuel cell (DMFC) has been received widespread attention due to the abundant source, the low price, the safety of storage and transportation of fuel.
这个上下文为正在执行的线程存储主题和其他安全信息。
This context stores the subject and other security information for the executing thread.
这个日志对故障恢复也很有用:如果元数据服务器发生故障,它的日志就会被重放,保证元数据安全存储在磁盘上。
The journal is also useful for failure recovery: if the metadata server fails, its journal can be replayed to ensure that metadata is safely stored on disk.
在传输或存储时的数据安全是讨论中一个非常重要的部分。
Security for data while in transit or in storage is a very important part of the discussion.
您需要确保人们准备使用它,并且关键的存储是安全的。
You need to make sure people are using it and that the key stores are secure.
请参见下面的清单1,以了解如何使这个容易受到威胁的计算机成为一个存储数据的安全位置。
See Listing 1 below to learn how to make this threat-prone machine become a safe location to store data.
持久性:将企业资源(模型)存储在一个安全,可访问并且可靠的工具内。
Persistence: Storage of the enterprise assets (models) in a safe, accessible, and secure facility.
查询数据是通过系统发送的临时数据,派生自安全存储在系统中的数据。
Query data is transient data being sent through a system, derived from data that's stored safely within the system.
此前用作电邮加密的系统,全都仰仗安全存储密钥的招数。
Past systems designed to encrypt e-mails all relied on ways of storing their keys safely.
服务器相信会话已处于活动状态,从而返回一个确信响应给新用户,这表明一个全新的会话被创建且凭证已被安全存储。
The server, believing that the session is already active, returns a reassuring response to the new user that suggests that a brand new session was created and the credentials were safely stored.
对象存储系统是解决包含多租户和安全性的可伸缩存储的唯一途径。
Object storage systems are a unique path to very scalable storage that incorporates multi-tenancy and security.
密钥存储库是包含EFS安全信息的密钥库。
Keystore is a key repository that contains EFS security information.
安全函数存储在一个安全操作结构中,该结构包含必须受到保护的基本操作。
The security functions are stored in a security operations structure that covers the fundamental operations that must be protected.
如果使用数据库的话,需要确保它安全存储数据并允许您将来检索数据。
If you use a database, you want to be sure it will safely store your data and let you easily retrieve the data later.
安全处理和存储的蛋制品。
这款产品的体系结构跟我们的{存储,网络,部署,安全}模型不匹配。
The architecture of the application doesn't match our { storage, network, deployment, security } model
IDS引入了一个新的数据类型IDSSECURITYLABEL,用于存储行安全标签。
IDS has introduced a new data type, IDSSECURITYLABEL, for storing row security labels.
存储在安全上下文中的Authentication对象将用于做出授权决策。
The Authentication object stored in the security context will be used later to make authorization decisions.
具有安全凭证存储的帐号框架。
比如,AuthenticationProcessingFilter(我将稍后进行介绍)将用户信息(如用户名、密码和电子邮件地址)存储在安全上下文中。
For example, the Authentication Processing Filter (which I discuss next) stores user information such as username, password, and E-mail address in the security context.
用于Web服务安全的JCEKS密钥存储库形式的安全凭据或指定加密操作所需的私钥或公开证书。
Security credentials for web services security in the form of JCEKS key stores or the private keys or public certificates required for the specified cryptographic operations.
按照以下步骤修改导入到存储库中的安全模型。
If you need to modify the security model after importing it into the repository, do the following.
按照以下步骤修改导入到存储库中的安全模型。
If you need to modify the security model after importing it into the repository, do the following.
应用推荐