• Comparing host-based authentication to public key-based authentication.

    比较基于主机的认证和基于公钥的认证。

    youdao

  • Unless your API is a free, read-only public API, don't use single key-based authentication.

    除非API一个免费的,只读公开api,否则不要使用单一的基于密钥验证

    youdao

  • At this point, ssh public key-based authentication is now complete, and you can proceed to " DB2 configuration."

    至此ssh 基于公钥认证已经完成,现在可以进入DB2配置”。

    youdao

  • Both host-based and public key-based authentication using SSH are more secure than RSH rhost-based authentication.

    使用ssh的基于主机认证基于公钥的认证基于rshrhost的认证安全

    youdao

  • S/MIME encryption also uses a key-based approach, but it has some significant advantages in convenience and security.

    MIME加密使用基于密钥的方式便利安全上有着一些优势

    youdao

  • The SSH daemon does not allow key-based authentication if the home directory if people other than the user can write to it.

    如果除应用程序用户以外还有能够修改home目录,那么SSH守护进程支持基于密钥的认证

    youdao

  • No SSH server configuration is necessary, since, by default, SSH will attempt to use public key-based authentication before password based authentication.

    这里不需要ssh服务器配置因为默认情况下,在基于密码认证之前,ssh尝试使用基于公钥的认证。

    youdao

  • Also, you do not need to have root authority to set up public key-based authentication (portions of the host-based authentication setup require root access).

    而且需要root授权就可以设置基于公钥认证(部分基于主机的认证需要root访问)。

    youdao

  • As of today, the only security mechanism supported by most of the GSS-API offerings is the popular symmetric key-based mechanism called Kerberos [IETF RFC-1964].

    目前为止大部分GSS - API产品支持惟一安全机制就是名为kerberos [ietfRFC - 1964]的流行的基于对称密钥的机制。

    youdao

  • Based on the findings, the researchers suggest that the key to boosting your willpower is to believe that you have an abundant supply of it.

    基于这些发现,研究人员认为增强意志力关键在于相信自己充足的意志力。

    youdao

  • Here are some others key tips based on my own speaking experience and what I've noticed in other good speakers.

    其它一些关键技巧根据自己的演讲经验以及其他优秀演讲者身上发现的总结的。

    youdao

  • The lifecycle of what we call "BPM Enabled by SOA" is to iteratively model, deploy and monitor, and BPMN provides a key standards based technology for the entire lifecycle.

    我们称之为SOA支持BPM生命周期就是建模实施监视迭代而且BPMN提供基于整个生命周期技术关键标准

    youdao

  • XSLT Version 2.0 offers some key improvements based on collective experience with XSLT 1.0, but it is closely tied to XPath 2.0, which is somewhat controversial.

    XSLTVersion 2.0集中 XSLT 1.0 使用体验基础提供了一些关键改善但是XPath 2.0 的联系更加紧密,而后者还存在一些争议。

    youdao

  • In some cases, you might find that guidelines for choosing the proper partitioning key based on collocation and data balancing contradict one another.

    某些情况下可能会发现根据并置数据平衡选择恰当的分区准则会相互矛盾

    youdao

  • This perspective has covered some of the key connectivity trends we are seeing in banks currently, and some key implementation recommendations based on engagements with financial institutions.

    图中揭示了我们当前银行看到一些关键连接趋势以及一些金融机构合作得到的关键实现建议

    youdao

  • A key component of SOA-based business processes management is the tooling and runtime framework which is used to create business processes from those services.

    基于SOA业务流程管理中的一个关键组件工具运行时框架用于这些服务创建业务流程。

    youdao

  • The size of the discount is a key business decision based on the type of customer.

    折扣多少一个基于客户类型重要业务决策

    youdao

  • If you choose a partitioning key based on your query workload, the partitioning key should typically consist of either a joined column or a set of columns that is frequently used in many queries.

    如果基于查询工作负载选择分区,那么此分区键通常应该包含一个合并用于很多查询

    youdao

  • The majority of the Amazon storage patterns were based on primary key access leading to single value or object.

    亚马逊大多数存储模式基于通过访问某个对象

    youdao

  • The key objective behind this type of work is to break existing process silos in order to create homogeneous business architecture based on key business functions.

    这种类型工作背后已存在过程分解创建基于关键业务功能同类业务架构

    youdao

  • It then encrypts the index using a searchable encryption scheme and encrypts the unique key with an attribute-based encryption scheme under an appropriate policy.

    然后它会使用搜索的加密模式索引进行加密基于属性的加密模式恰当的手段对唯一密钥加密。

    youdao

  • The optimizer will deduce key value selection based on the functional dependency of the column within the row.

    优化根据函数依赖性来推断关键选择

    youdao

  • Public-private key combination is at the heart of Public key Infrastructure (PKI), and is based on asymmetric cypher.

    公钥-组合公共密钥基础设施核心建立非对称密码的基础

    youdao

  • This password check is done even if the user is following the public key or host-based authentication.

    即使用户采用公共密钥基于主机身份验证,也会执行这个密码检查

    youdao

  • The article concludes with a high-level summary of key performance results based on internal case studies.

    本文最后将基于一些内部案例研究简要总结关键性能结果

    youdao

  • RSA public-key cryptography is based on this property of factorization.

    RSA公钥密码系统就是基于这种因数分解特性

    youdao

  • As you saw in Part 1, this public key would be based on the RSA algorithm.

    第1部分可以看到这个公钥基于rsa算法生成的。

    youdao

  • The cache request mediation generates a cache key based on the request message, and searches for a response in the cache.

    缓存请求中介基于请求消息生成缓存缓存中搜索响应

    youdao

  • Typically, the partitioning key is time-based, resulting in a design that directs data for a given week, month, or quarter to be stored in a certain partition.

    通常分区基于时间的,因此这种设计会把某一周季度数据存储特定分区中。

    youdao

  • Typically, the partitioning key is time-based, resulting in a design that directs data for a given week, month, or quarter to be stored in a certain partition.

    通常分区基于时间的,因此这种设计会把某一周季度数据存储特定分区中。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定