• It's hard to stay ahead of the game in network security when the landscape is constantly changing.

    形势不断变化时,网络安全领域保持领先地位困难

    youdao

  • How do you determine the level of security in your office network, even if you have a network administrator manning it?

    我们又应该如何判断办公网络安全级别呢(尽管可能有一个网络管理员管理网络)?

    youdao

  • Work with the people in your corporation responsible for network administration and security to resolve potential connectivity issues.

    公司内负责网络管理安全人员协作,解决潜在连接问题

    youdao

  • This paper analyzes packet capturing principle in detail combined with the structure and functions of the software and introduces its application in designing a network security and watch system.

    文中结合软件包结构功能捕获原理进行了详细分析介绍了网络安全监控系统中的应用

    youdao

  • These encrypted service tickets (credentials) are only understood by the client and the server, so there is minimal security risk, even in the event that the ticket is intercepted from the network.

    这些加密服务标签凭证只有客户机服务器能理解所以即使标签网络中被拦截安全风险很小

    youdao

  • Implementing a password policy can be time consuming when presenting the information in a clearer format for reporting to security managers, especially when dealing with a large enterprise network.

    如果需要清楚的格式安全经理报告信息实现密码策略非常费时间尤其是处理大型企业网络时。

    youdao

  • There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.

    同样网络无线安全技能人群以及那些具有认证信息系统安全专业证书的也备受青睐

    youdao

  • It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.

    的“网络流量分析安全代理使用了移动软件代理,检测计算机网络中的入侵

    youdao

  • Malicious software often infects a corporate network by exploiting security holes in web browsers to infiltrate a PC when its user visits a dodgy website.

    恶意软件经常通过嗅探网络浏览器安全漏洞感染公司网络用户访问隐藏网页时,所用电脑会感染病毒。

    youdao

  • Requesters can authenticate recipients using network and transport-provided security, claims proven in messages, and encryption of the request using a key known to the recipient.

    通过网络由传输提供的安全性消息已批准的声明以及收件人已知密钥请求进行加密请求可以收件人进行身份验证

    youdao

  • To communicate with a WebSphere Cloudburst Appliance, you will need to implement the network element, including security management, which is described in the conclusion to this series.

    WebSphereCloudburstAppliance进行通信需要实现网络元素包括安全管理系列结束语进行了描述。

    youdao

  • In the center of the diagram in Figure 2 is Tivoli's WebSEAL product, which serves the role of a proxy and provides a security mechanism to control access to documents and Web objects in the network.

    2中心展示TivoliWebSEAL产品产品充当代理角色提供安全机制控制网络中的文档以及Web对象访问

    youdao

  • That feature was introduced in .NET from the beginning to prevent security attacks coming from network locations.

    当初之所以.NET中引入这个特性为了阻止网络上进行的安全攻击

    youdao

  • This may result in systems placed in network segments with lower than required trust levels or vulnerable local security configurations.

    可能导致布置网络中的系统需要信任级别或者会暴露本地安全配置。

    youdao

  • In my day-to-day work, I have found that many users are frustrated by new security imperatives imposed by network managers.

    日常工作中,发现许多用户因为网络管理人员实施新的安全规则而倍受挫折

    youdao

  • Architects, however, need to understand the physical layer in order to avoid network bottlenecks and security exposures.

    但是架构需要了解物理层避免网络瓶颈安全暴露

    youdao

  • The overall security of a network is only as strong as its weakest link, and in a mobile-commerce network the weakest link is the client-side device.

    网络总体安全性强度取决于薄弱环节移动商业网络中,最薄弱环节客户机端设备。

    youdao

  • In fact, in many cases, subversive network applications and some security methods will deliberately use non-standard ports.

    事实上大多数情况一些破坏性网络应用一些安全性方法故意使用非标准端口

    youdao

  • The research will be presented at the Network and Distributed System Security Symposium in early February.

    研究二月网络分布式系统安全座谈会上发表。

    youdao

  • Such issues constitute a control challenge because tried and tested network-level security controls might not work in a given cloud environment.

    这些问题构成了控制挑战因为基于尝试测试的网络安全控制一个给定环境中可能无法正常工作

    youdao

  • We will improve financial institutions' ability to manage risks, make progress in developing a security network for the financial system, and guard against systemic risks.

    提高金融机构风险管理水平推进金融体系安全网建设,防范系统性金融风险。

    youdao

  • Insufficient network-based controls in virtualized networks occur when security controls that work on network level may not work in an IaaS network infrastructure.

    如果网络安全控制IaaS网络基础设施中无效,就会出现虚拟化网络中基于网络的控制不足

    youdao

  • "You can never be too careful in this day and age, " Craigslist security and network technician Sheila Wilder said. "Just look at MySpace.

    这个年代小心至上,”Craigslist安全和网络技术员希拉·怀尔德,“单单那个MySpace网站。

    youdao

  • All in all, this constitutes a control challenge of insufficient network-based controls because tried-and-tested network-level security controls might not work in a given cloud environment.

    而言之,形成了一个控制上的问题,即不充分基于网络控制因为基于尝试与测试的网络级别安全控制可能某些云计算环境下无法工作

    youdao

  • Egele's research will be presented at the Network and Distributed System Security Symposium in early February.

    Egele研究二月网络分布式系统安全座谈会上发表。

    youdao

  • At the industrial level, to improve the level of industrial support, establish a good market environment, cultivate China's leading enterprises in network security.

    产业层面提高产业化支撑水平建立良好市场环境培育我国网络安全龙头企业

    youdao

  • Due to its essential role in network security, research on intrusion detection techniques is of great importance.

    鉴于入侵检测技术网络安全所起重要作用入侵检测技术进行研究具有重要的意义。

    youdao

  • Due to its essential role in network security, research on intrusion detection techniques is of great importance.

    鉴于入侵检测技术网络安全所起重要作用入侵检测技术进行研究具有重要的意义。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定