• 这场过热经常中肯论战读者下结论安全策略有机食品苍蝇拍

    Readers of this overheated but often on-the-mark polemic will conclude that the safest tactic is organic food and a fly swatter.

    youdao

  • sugroup提供种在系统实现管理安全策略方法

    Sugroups provides one method of implementing and managing the security policy on your systems.

    youdao

  • 尽管某些安全细节可以作为策略部分但并非所有安全需求必须成为策略部分。

    Though some specifics of security can be part of the policy, not all the security requirements need to be part of the policy.

    youdao

  • 如果很好的密码策略的话,你能看到用户锁定策略,因此不是很大安全问题

    If you have good password policies, which also include lockout policies, then it is not that big a security issue.

    youdao

  • 提出关于这种类型迁移设计策略包含并行同步存储灵活、多租赁安全概念

    A design strategy for this type of migration, one that includes the concepts of parallelism, synchronization, storage, elasticity, multi-tenancy, and security.

    youdao

  • 如果用户拥有特定安全策略特定规则豁免权那么用户试图访问受该安全策略保护数据时,该规则将不起作用。

    If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.

    youdao

  • 那个小组成员对这个系统中的其它记录无所知的,除了那些他们安全策略的记录。

    Members of that group have no knowledge of any other records in the system, other than those with their security policy.

    youdao

  • 安全标签归属安全策略并且安全策略中的每个安全组件包含个值。

    A security label belongs to a security policy and contains a value for each security component in that security policy.

    youdao

  • 安全政策执行首要策略有可能通过约定俗成过程开发的。

    The practical strategy for a security implementation is much more likely to be developed through a more prescriptive process.

    youdao

  • 如果英国真的想改善能源安全环境解决气候变化问题,那比起低排放交通策略我们需要汽车交通策略

    More than a low-carbon vehicle strategy, if the UK is to improve its own energy security and environment, and tackle climate change, we need a low-car vehicle strategy.

    youdao

  • 内容审计选项,用来决定安全策略计算是否FM内完成

    A Content Audit option that determines whether security policy calculation should be done in FM.

    youdao

  • 注意只是示例安全策略可能规定了其他参数,而不是这里使用的参数。

    Note that this is an example; you or your security policy might dictate additional parameters than are being used here.

    youdao

  • 确保系统安全好的策略拒绝任何操作,而不是允许任何操作。

    A good policy for securing your systems is to start by denying everything instead of allowing everything.

    youdao

  • 豁免权用户绕过安全策略中的多个访问规则提供了方式

    Exemptions provide a way to allow users to bypass one or more access rules for a security policy.

    youdao

  • 已经提供者实现安全可用服务客户配置该服务满足增强安全策略

    Security already implemented by cloud providers is one more available service that customers can configure to satisfy the their enhanced security policies.

    youdao

  • 为了适用参加协作工作企业安全策略标准工具达成致意见

    To agree what security policies, standards and tools are applicable to the enterprises participating in the collaborative efforts.

    youdao

  • 作为分配风险等级部分,必须考虑分配给数据安全策略

    As part of assigning a risk level, you have to consider the security policies assigned to the data.

    youdao

  • SECLABEL_BY_NAME:函数通过指定安全策略这个安全策略安全标签名称构建安全标签(内部编码表示)。

    SECLABEL_BY_NAME: This function builds a security label (internal encoded representation) by specifying a security policy and the name of a security label that is part of that security policy.

    youdao

  • 企业安全策略可能作为致性维度部分安全常常复杂文化问题

    Enterprise security policies might be considered part of the conformance dimension, but security is often a complex cultural issue.

    youdao

  • 毕竟,在开始个可靠策略之前,你不想放弃稳定薪水所带来安全

    After all, you don't want to give up the security of a steady paycheck before you have a solid game plan.

    youdao

  • 对于模型可能会希望技术基础构建安全策略控制

    For one model, you may wish to have security policies and controls built upon the foundation of technologies.

    youdao

  • 创建安全策略安全管理员创建安全标签,安全标签也是安全策略部分。

    After creating a security policy, the security administrator creates objects, called security labels that are also part of that policy.

    youdao

  • 业务策略时间跨越所有作用范围安全、业务过程总体架构操作策略

    Where the business policy spans subject areas like security, business process, overall architecture and operational policies all at the same time.

    youdao

  • 生成用户安全属性报告有助于判断识别密码安全策略是否地方。

    Producing reports on security attributes of users is one method of determining and identifying if there are any inconsistencies in your password or security policy.

    youdao

  • 下面所述个基于策略服务安全管理典型流程可以分为五大步骤

    A typical process of policy based service security management can be divided into five steps and described as follows.

    youdao

  • 可以看作业务安全服务IT 安全服务之间链接它包括策略管理分发领域

    This tier can be thought of as the link between business security services and IT security services and includes areas such as policy administration and distribution.

    youdao

  • 例如收到SOAP请求时的策略,这个策略SOAP消息头里验证安全信息确认用户也许可以接受先前缓存响应数据

    For instance, a policy that receives a SOAP request validates security information in the SOAP header to validate that a user may receive previously cached response data.

    youdao

  • 安全血液促进母亲安全全球行动旨在改善获得安全血液,处理与妊娠有关并发症作为孕产妇保健综合策略部分。

    The Global Initiative on Safe Blood for Safe Motherhood aims to improve access to safe blood to manage pregnancy-related complications as part of a comprehensive approach to maternal care.

    youdao

  • 服务安全重点管理联合标识服务访问控制确保能安全访问服务和应用程序以及使服务的安全策略得到执行

    Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.

    youdao

  • 除了这些基本配置问题之外。CXFWSDL 中支持外部策略引用对于那些跨平台标准化安全策略组织,这是重要特性

    Beyond the basic configuration issues, CXF also supports external policy references in WSDL, an important feature for organizations that want to standardize security policies across the enterprise.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定