• The login process, however, uses the Linux username to choose an SELinux user for your security context.

    但是登录进程将使用Linux用户安全上下文选择SELinux用户

    youdao

  • Wasn't your decision to trade off programmer efficiency, security, and software reliability for run time performance a fundamental mistake?

    在为运行性能权衡编程效率安全软件可靠性而做出的决定是否是一个根本错误

    youdao

  • The elephant in your living room is your Internetconnected security camera, a device people are increasingly using for peace of mind in their homes.

    客厅大象就是联网安全摄像头人们逐渐家里使用它来获得内心平静

    youdao

  • The elephant in your living room is your Internet-connected security camera, a device people are increasingly using for peace of mind in their homes.

    客厅大象就是家里的联网安全摄像头这一设备使用越来越广,有了它,人们在家就能安心了。

    youdao

  • However, that same act of sharing could be problem for your own security.

    而,同样的分享行为会为你自己带来安全问题。

    youdao

  • For global health security, I share your deep concern about the looming threat of an influenza pandemic.

    全球卫生安全来说,你们一样也在深切关注场大流行性流感迫近威胁

    youdao

  • You can set clear quality objectives for things like performance and security testing, and defining environments for your automated test coverage.

    可以性能安全性测试之类的事情设置质量目标自动化测试覆盖面定义环境

    youdao

  • When you think about what you truly live for, your answer probably won't be security. At least mine's not.

    思考生存真正目的时,答案未必会是为了保障至少不是

    youdao

  • And now, as we inevitably say on such posts - over to you. What are your handy tips for bike home security? And have you made any costly mistakes?

    现在正如我们经常要你们的。自行车家庭安全需知什么呢?代价高昂错误吗?

    youdao

  • For example, the way your company handles security is probably consistent throughout an application and across multiple applications.

    例如公司处理安全性方式整个应用程序甚至多个应用程序中可能都一致的。

    youdao

  • The registration process for users involves entering your Social Security number, date of birth and other data.

    用户注册登记过程包括输入社会安全号码生日其他资料

    youdao

  • Understanding how a UNIX system places its data in its directories should be helpful in planning a volume configuration for your system to optimize performance and security.

    充分了解UNIX系统目录放置数据的方式,有助于系统制定配置计划从而优化性能安全性。

    youdao

  • You can also assign a Master Password that you must enter in order to "unlock" the rest of your passwords for some added security.

    可以设置一个管理密码这样必须先输入密码解锁其余安全密码。

    youdao

  • Access to data can now be controlled down to an individual cell of information, providing greater security for your critical data and sensitive customer information.

    现今资料存取控制精细个别资料中的资讯以便为重要资料机密客户资讯,提供更严密安全防护

    youdao

  • By using Shiro, you can provide security for your application without writing all of the code from the beginning.

    使用Shiro,就能够应用程序提供安全性而又无需从头编写所有代码

    youdao

  • You should set your own security criteria for using these and other mashup resources.

    应当这些其他mashup资源使用设定自己的安全标准

    youdao

  • If the provider does not give you the answers you want, make the preparations to provide security for your mashup and other types of Web applications.

    如果服务提供商没有给出希望的答案那么准备mashup其他类型Web应用程序提供安全性

    youdao

  • Securitygroups.php - Lists all security groups defined for your account.

    php帐户定义所有安全

    youdao

  • Do employ the same security mechanisms for your APIs as any web application your organization deploys.

    API启用其它任何你的组织部署web应用同样安全机制

    youdao

  • The SANS Institute is your one-stop shop for security information, certification programs, and research.

    SANSInstitute获取安全信息认证项目研究材料的一站式中心。

    youdao

  • Now that you've defined the security for your application, you need to connect it to an LDAP solution which manages the users of your Web application.

    应用程序定义安全性之后需要其与一个用来管理 Web 应用程序用户LDAP解决方案进行连接。

    youdao

  • To test your application, you first deploy the security deployment plan for your application, as defined in my-db-plan.xml, then you deploy your application.

    测试应用程序首先部署应用程序安全性部署计划(my - db - plan . xml中定义),然后部署应用程序。

    youdao

  • You can also use the security Settings link on this page to bypass the wizard's default offer to set up the necessary code access security for your project.

    使用该页面上SecuritySettings链接不使用向导提供默认值项目设置必要的代码访问安全性

    youdao

  • Contact your database administration or refer to the DB2 documentation for more information about the security configuration of your DB2 instance.

    联系数据库管理员参考db 2文档了解关于您的DB 2实例安全配置更多信息

    youdao

  • And just as you fought for us, we're going to keep fighting for you -for more jobs, for more security, for the opportunity to keep your families strong and America competitive in the 21st century.

    你们我们战斗一样,我们为你们而奋斗——为了更多工作机会,为了更加安宁,为了你们家庭稳固机遇为了美国21世纪竞争力

    youdao

  • Work with the people in your corporation responsible for network administration and security to resolve potential connectivity issues.

    公司内负责网络管理安全人员协作,解决潜在连接问题

    youdao

  • The infrastructure was developed by creating the database tables and the security deployment plan for your application.

    基础设施开发通过应用程序创建数据库安全部署计划而进行的。

    youdao

  • This article USES example code to demonstrate keystroke dynamics for enhancing the security of your applications in authentication and continuous data entry contexts.

    本文使用示例代码演示击键力学如何验证连续数据输入环境中增强应用程序安全性

    youdao

  • This article USES example code to demonstrate keystroke dynamics for enhancing the security of your applications in authentication and continuous data entry contexts.

    本文使用示例代码演示击键力学如何验证连续数据输入环境中增强应用程序安全性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定