• The presumption is that you can make security decisions based on the information in these tokens.

    这种方法假设可以根据这些令牌中的信息做出安全性决策

    youdao

  • Of course, it is essential that the firm can guarantee the security of personal information and credit card numbers.

    当然,最重要公司必须保证消费者的个人资料信用卡号码保密

    youdao

  • The success of our global effort to maintain and increase security depends on reliable information that is available and clear to all who need it.

    我们维持加强安全全球努力成功取决于是否能所有有需要的提供可靠明确信息

    youdao

  • This is because privacy and security of data are of utmost importance; all data stored in AMEE is anonymized, so you cannot retrieve profile data based on personal information.

    是因为数据隐私数据安全今天重要存储AMEE中的所有数据都匿名的,因此不能根据个人信息检索配置文件数据。

    youdao

  • Another important aspect of global variables is that when security of the information is an issue, controlling access is possible.

    全局变量另一重要方面考虑信息安全问题时,可以控制对信息的访问

    youdao

  • Your application needs a security deployment plan that specifies what the source is for obtaining username and password information for authenticating users.

    应用程序需要一个安全性部署计划指定从哪个获得认证用户所需要的用户名口令信息

    youdao

  • This information is used to help identify potential security "holes" that may be weak points for attacks against customers.

    这些信息用于帮助发现潜在安全漏洞”,此类弱点可能利用客户发起攻击

    youdao

  • It is the responsibility of the security advisor and the architect to make sure that this information is not logged without masking.

    安全顾问设计师责任确保这些信息不会未加任何处理就保存到日志中。

    youdao

  • Information management is a huge topic that can involve discussions of content-management strategies, distributed access, federated security, and much more.

    信息管理一个庞大主题涉及到有关内容管理策略分布式访问联合安全性讨论

    youdao

  • CGBS is required if you run the secure proxy server in medium security mode in order to dynamically obtain routing information.

    如果为了动态获得路由信息中级安全模式下运行安全代理服务器,那么需要使用CGBS。

    youdao

  • If you are responsible for domain security you need to know what information it is possible to see by default.

    如果负责安全的话,你必须知道什么信息默认就是可见的。

    youdao

  • Authentication is a process to verify a person's identity for security purposes and authentication factor is the piece of information used to achieve it.

    身份验证出于安全目的检查人员身份过程身份验证因素用来实现身份验证的信息

    youdao

  • Another important aspect of global variables is that where security of the information is an issue, controlling access is possible.

    全局变量另一重要方面考虑到信息安全性时,可以访问进行控制

    youdao

  • Role-based security is a great way to protect your organization's information assets, and it's probably easier to implement than you think.

    基于角色安全性保护企业信息资产一个不错的方法而且可能想象容易实现

    youdao

  • When transferring a job from the job manager to the administrative agent or the deployment manager, security information about the job submitter is also transferred.

    作业作业管理器传输管理代理部署管理器时,会传输关于作业提交者安全信息

    youdao

  • The LDAP database is loaded with the user and group information from the localhost's security database files.

    使用本地主机的安全数据库文件中的用户信息装载ldap数据库。

    youdao

  • When configured in medium security mode, the dynamic routing information is obtained and used by the secure proxy server.

    配置中级安全模式安全代理服务器获得使用动态路由信息

    youdao

  • It is their difficulty to grasp that makes primes the basis for our modern information security.

    正因为他们非常把握质数成为我们现代信息安全基础

    youdao

  • Keystore is a key repository that contains EFS security information.

    密钥存储包含EFS安全信息密钥库。

    youdao

  • Decentralized Information flow control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world.

    DIFC这种安全手段应用程序作者能够控制应用的组成部分外部世界之间数据如何流动

    youdao

  • Now we can get down to extracting what information is required for a daily audit report, extracting the information that is relevant to your own audit security policy.

    现在我们可以提取日常审计报告需要信息,只提取自己的审计安全策略有关信息。

    youdao

  • This ensures the security of the information being transferred and accessed is also left to the user to enforce in their application logic.

    用户需对应用程序逻辑进行增强,以确保传递访问信息安全性

    youdao

  • When securing digital information, it is important to implement end-to-end security.

    保护数字信息时,实现全程安全性重要的。

    youdao

  • SIF creates a security context object, which is a placeholder for security-related information.

    SIF创建了安全上下文对象一个与安全相关的信息的占位符。

    youdao

  • It is very simple to use and requires minimal coding to propagate custom security information between servers.

    非常易于使用并且只需要进行很少编码可以在服务器之间传播自定义安全信息

    youdao

  • In part 2 of this series, DB2 security plug-ins were introduced, as well as the method in which DB2 security is implemented, and a list of relevant detailed information about security plug-ins.

    系列第2部分介绍DB 2安全性插件实现DB 2安全性方法一系列安全性插件相关详细信息

    youdao

  • On the other hand, if the application is relying on additional information in the HTTP headers for security purposes, you should use mutual SSL authentication.

    相反如果应用程序依靠HTTP消息头额外信息保证安全,应该采用相互ssl认证。

    youdao

  • It is not at all uncommon for these security tokens to have no cryptographically verifiable information.

    这些安全性令牌一般没有密码验证信息

    youdao

  • You can also perform an audit after receiving information that would lead you to believe someone is trying to compromise the security of your system.

    可以使相信有人试图威胁系统安全信息后,执行审计

    youdao

  • The header contains additional information that is useful in processing the call, such as security, authentication, session information, or any other useful data.

    Header包含了处理调用非常有用附加信息安全验证会话信息或者其他任何有用的信息

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定