• In data security, the transmission of data to unauthorized users by processes with legitimate access to data.

    数据保密学中,通过合法访问数据进程数据传输未授权的用户过程。

    youdao

  • The problem has changed very little over the past 20 years. It’s time for everyone to take password security seriously; it’s an important first step in data security.

    这个问题过去20没什么变化现在人们应该认真对待密码时候数据安全一步

    youdao

  • The problem has changed very little over the past 20 years. It's time for everyone to take password security seriously; it's an important first step in data security.

    这个问题过去20没什么变化现在人们应该认真对待密码时候数据安全一步

    youdao

  • In data security, a sad fact is that although users value their privacy, but when these data can get free access service or to obtain economic benefits, users still tend to take out the data exchange.

    数据安全领域一个可悲事实虽然用户重视他们隐私通过这些数据能够换来免费访问服务或者获得经济利益时,用户还是倾向于将这些数据出来交换。

    youdao

  • On the one side, you have the United States government's mighty legal and security apparatus fighting for data of the most sympathetic sort: the secrets buried in a dead mass murderer's phone.

    美国政府强大法律安全机构他们所争夺能引起同情的数据制造群体谋杀的死者手机里秘密

    youdao

  • This process is often applied to the complete data set in the sources — that is, without security restrictions.

    通常这个过程应用数据源完整数据,即没有任何安全限制。

    youdao

  • The core concept is to centralize all security decisions in the gateway and prevent unwanted data access.

    核心思路所有安全决策集中网关防止不希望出现数据访问。

    youdao

  • This article USES example code to demonstrate keystroke dynamics for enhancing the security of your applications in authentication and continuous data entry contexts.

    本文使用示例代码演示击键力学如何验证连续数据输入环境中增强应用程序安全性

    youdao

  • In particular, it examined access to enterprise data, privacy and security concerns, and some lightweight development tools.

    特别是其中研究了企业数据访问隐私安全顾虑以及某些轻量级开发工具。

    youdao

  • With the use of systems in the cloud, there is the ever present risk of data security, connectivity, and malicious actions interfering with the computing processes.

    如果使用中的系统数据安全性连接性方面风险恶意活动也可能会妨碍计算过程。

    youdao

  • To improve security, we recommend that you install the index data service in the data layer.

    提高安全性我们建议数据安装索引数据服务

    youdao

  • End user identities are not used in security enforcement but may be included in data for audit.

    安全执行使用最终用户标识可能包括数据用于进行审核

    youdao

  • In addition, the ESB can provide transformations between a variety of security, data format, or transactional models between service requesters and providers.

    另外ESB可以提供服务请求者提供者之间各种安全数据格式事务模型转换

    youdao

  • Although you can take steps to decrease the risk of a security breach, your data is still in some danger.

    虽然可以分步减少安全破坏风险,但数据还是处于某种危险之中

    youdao

  • In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.

    本文中,谈到数据安全性机密性方面确保受保护数据只能授权用户系统访问

    youdao

  • We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.

    我们为认证授权通过加密保护数据这些方面的安全问题提供解决方案

    youdao

  • The data are extremely discouraging since the buffer overflow problem has been widely known in security circles for years.

    由于缓冲区溢位问题近年安全性领域受到瞩目,这一资料相当令人灰心的。

    youdao

  • In this case, field hiding provides user interface management rather than true data security.

    这种情况下字段隐藏用户提供的是接口管理不是真正数据安全

    youdao

  • Many SOA implementations require technology expertise in several layers of the architecture: business processes, business rules, data services, security, etc.

    很多SOA实现架构几个层级都要求技术专家业务流程、业务规则数据服务安全

    youdao

  • These security policies are defined using the master data in the system. The policies require no customer development.

    使用系统中的数据定义这些安全策略客户需要开发它们。

    youdao

  • Security for data while in transit or in storage is a very important part of the discussion.

    传输存储数据安全讨论中一个非常重要部分

    youdao

  • Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.

    小心请不要生产环境中使用过程允许未经授权的用户访问用户数据这样做可能会违反公司隐私安全政策

    youdao

  • The quality of data aspect is measured by the ability to ensure reliability of data accessed, availability of data accessed, being able to allow concurrency as well as security of the data in storage.

    数据方面质量通过保证数据访问可靠性、数据访问可用性和支持数据存储的并发性安全性功能进行判断的。

    youdao

  • What if someone is deliberately introducing bad data in the hopes of breaching your program's security?

    如果有人故意引入数据破坏程序安全性又该如何呢?

    youdao

  • Data in a table can only be protected by security labels that are part of the security policy protecting the table.

    一个中的数据只能受到保护该表安全策略安全标签保护

    youdao

  • In a multi-tenant context, the security isolation mechanism is very important in preventing the data of one tenant from being accessed illegally by other tenants.

    租户上下文中安全隔离机制非常重要必须防止租户非法访问其他租户数据

    youdao

  • For example, a team in India may own the data warehouse, several applications may be owned by a team in Switzerland, and the security framework may be owned by an infrastructure team in the us.

    举例来说,印度团队可能拥有数据仓库瑞士团队可能拥有许多应用程序美国的基础架构团队可能拥有安全框架

    youdao

  • An example of an array security component is the sensitivity level of data in an organization.

    数组安全组件一个例子企业数据敏感级别

    youdao

  • Several XML security protocols have been proposed to support communication data security in XML applications. Among them are the following.

    提出了几个XML安全性协议XML应用程序支持通信数据安全性。

    youdao

  • Several XML security protocols have been proposed to support communication data security in XML applications. Among them are the following.

    提出了几个XML安全性协议XML应用程序支持通信数据安全性。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定