Part two, authentication of document that "pillaging with dangerous weapon"and"struggling, pounding, pillaging" convert into robbery.
第二部分:“携带凶器抢夺”与聚众“打砸抢”转化为抢劫罪的适用。
For this document we will only discuss the first step of identifying the type of logon data, the rest is specific to the authentication source being supported and hence off topic.
对于本文档,我们只讨论第一步(识别登录数据的类型),其他步骤因支持的身份验证源而异,因此超出了范围。
By trial and error, the attacker can check the various child nodes of the XML document and gather information by seeing if this XPath expression results in a successful authentication.
用试凑法,攻击者可以检查XML文档的各个子节点并通过查看这个XPath表达式是否能促成成功的身份验证以收集信息。
A full discussion of the nuances of common services — how they're started, how they react to client, inherent security issues and authentication methods — is beyond the scope of this document.
对常见服务之间细微差别的完整讨论-它们怎么启动、它们如何对客户机作出反应、其内在安全性问题和认证方法-已超出了本文的范围。
In this document the background of the authentication process is provided along with descriptive information on how to use the provided SDK to handle SSO.
在本文档中,提供身份验证过程的背景知识并描述如何使用提供的SDK处理SSO。
A document may be signed by handwriting, facsimile signature, perforated signature, stamp, symbol or any other mechanical or electronic method of authentication.
单据可以通过手签、签样印制、穿孔签字、盖章、符号表示的方式签署,也可以通过其它任何机械或电子证实的方法签署。
The JDBCSample was chosen for this document only because it's the only example of a full authentication provider.
本文档选用JDBCSample作为示例只是因为它是完整身份验证提供者的惟一示例。
This document describes the use of Kerberos as an alternative authentication mechanism to AIX.
本文档介绍了如何将Kerberos作为一种用于AIX的备选身份验证机制。
This document describes the use of Kerberos as an alternative authentication mechanism to AIX using Windows 2000/2003 Server Kerberos Service.
本文档介绍了如何通过Windows 2000/2003ServerKerberosService使用 Kerberos作为AIX的备选身份验证机制。
This document is meant to supplement the TM1 9.5 Operations Guide as it describes the task of configuring LDAP authentication for TM1 9.5 in greater detail.
本文档意在补充TM 1 9.5OperationsGuide,更详细地描述为TM 1 9.5配置LDAP身份验证的任务。
Applications of watermarking include not only copyright protection, but also document authentication, covert communications and data embedding, etc.
数字水印技术的应用除了版权保护,还包括内容认证、隐蔽通信和数据嵌入等等很多方面。
This technique can be applied to author authentication of textual document.
该技术在电子文档的作者身份认证等方面具有很广的应用前景。
This paper proposed a novel watermarking scheme for the authentication of business documents by embedding a piece of information in the binary document image.
针对商业文档的完整性保护问题,提出了一种数字水印方案。
The document management apparatus determines validity of the authentication information contained in the request.
该文档管理设备确定该请求中包括的验证信息的有效性。
The document management apparatus determines validity of the authentication information contained in the request.
该文档管理设备确定该请求中包括的验证信息的有效性。
应用推荐