Checking the integrity of the files at run time is very crucial; therefore, using the Trusted Execution is recommended.
在运行时检查文件的完整性是非常关键的;因此,建议使用可信执行。
Of course, I could implement my own integrity checking - but that's key: I'd have to do it myself (much like I did everything else).
当然,我可以实现自己的完整性检查—但关键是,我必须亲自动手(就像完成其他任务一样)。
You can perform this kind of integrity checking in other ways, but SimpleXML offers a quick and easy programmatic method.
您可以用其他方式执行这种完整性检查,但是SimpleXML提供一种快速且容易的编程序方法。
The "SET integrity" statement specifies that the MQT is to have integrity checking turned on without being checked for integrity violations.
“SETINTEGRITY ”语句指定,MQT将打开完整性检查,而不检查完整性违反。
Public domain versions are available for most platforms on the Internet, and it is widely used in integrity checking systems.
公共领域版本可用于Internet上的多数平台,被广泛用于完整性检查系统。
Generate RoseScripts (accessible via the Tools menu) for automated tasks such as generating class skeletons, checking model-naming conventions, and testing model integrity and validity.
为自动化的任务比如产生类的骨架、检查模型的命名习惯和测试模型的完整性和有效性生成rosescripts(可以通过访问Tools菜单得到)。
ETL tools like SSIS can perform these functions such as moving data between systems, reformatting data, integrity checking, key lookups, tracking lineage, and more.
像SSIS这样的ETL工具就可以实现这些功能,如,在不同的系统间进行数据的移动、数据的再格式化、完整性校验、关键值查询、衍生跟踪等,SSIS也证明了它是一个有能力和有着多方面用途的ETL工具。
Trusted Execution supports the run-time integrity check whenever any command is executed, whereas the TCB mostly does the periodic checking of system integrity.
可信执行支持在每当执行任何命令的时候执行运行时完整性检查,而TCB主要执行定期的系统完整性检查。
Embedded within ZFS is an implementation of an important set of features such as snapshots, copy-on-write clones, continuous integrity checking, and data protection through RAID-Z.
ZFS内嵌入的是重要功能集(如快照、即写即拷克隆、连续完整性检查和通过RAID - Z的数据保护)的实现。
There are certain policies provided by IBM AIX V6.1 that can be configured for run-time integrity checking.
IBMAIXV6.1提供了某些可配置用于运行时完整性检查的策略。
Verifying the backup will read the entire backup and check for media integrity. Checking the identity and expiration of the media prevents accidental overwrites.
验证备份时将读取整个备份并检查媒体的完整性。请检查媒体的标识及到期时间以避免意外重写。
Checking structure integrity of superstructure (deckhouse) after welding.
上层建筑焊后结构完整性检查。
To improve the security performance of DSP system, a novel security mechanism is designed, combining two security methods: AES bus encryption and data integrity checking.
为了提高DSP系统的安全性能,结合AES总线加密和数据完整性检测两种安全方式,设计了一种新的安全机制。
The proposed integrity information flow mechanism can be efficiently implemented by static type checking.
所建立的完整性信息流控制机制可通过静态类型检验高效实现。
This approach efficiently utilizes the locality pattern of memory accessing to quicken the checking processes of integrity.
该方法能够有效地利用存储器访问的局部性特征,实施快速的完整性检验过程;
Thinking about a program's strong and data's integrity, we think that is very meaningful to write code making the computer realizes integrity checking of data stored in a database.
考虑到程序的健壮性以及数据库记录的完整性,编写代码让计算机实现录入记录完整性的检查是十分有意义的。
WEP uses CRC 32 checking code inside the RC4 encipher system to provide message integrity check.
WEP通过在RC4密码系统内部设置CRC32循环冗余校验的方式来实现报文完整性验证。
Checking structure integrity of superstructure (deckhouse) after welding.
上层建筑焊后结构无缺性检查。
However, the network user behavior management technology based on the identifying of host integrity could not identify the attacks that can avoid the host integrity checking.
但是这种基于识别主机完整性信息的网络用户行为管理技术,不能识别出具有避绕主机完整性检查的攻击行为。
Meanwhile, in the solution, the stateful MAC tree for checking file content integrity, the skip list for checking operation sequence are used.
此外,使用有状态的MAC树对文件内容做完整性检测,用跳跃列表对文件操作进行检测。
Checking the joint accuracy and structure integrity between No. 8 and No. 9 block after closed. No.
与No9分段合拢后大接头装配精确性和结构完整性检查。
Self-checking (also called self-validation or integrity checking) is a technique in which a program, while running, checks itself to verify that it has not been modified.
自校验(也叫自验证或完整性校验)就是程序运行期间校验自身代码以确认没有被修改的技术。
TOR is an anonymous communication technology based on source routing. It has many features such as perfect for-warding security, separation of protocol from anonymity, and integrity checking, etc.
TOR是一种基于重路由的匿名通信技术,具有完善的前向安全机制、匿名性与协议分离、完整性检测等特点。
TOR is an anonymous communication technology based on source routing. It has many features such as perfect for-warding security, separation of protocol from anonymity, and integrity checking, etc.
TOR是一种基于重路由的匿名通信技术,具有完善的前向安全机制、匿名性与协议分离、完整性检测等特点。
应用推荐