• Duties for network and security controls of virtual machines may not be well separated.

    虚拟网络安全控制职责可能没有好地分隔。

    youdao

  • The games will use an estimated 900 servers, 1,000 network and security devices, and 8,000 computers.

    这次奥运会估计将会用到900台服务器、1000个网络安全设备以及8000台电脑。

    youdao

  • The games will use an estimated 900 servers, 1, 000 network and security devices, and 8, 000 computers.

    这次奥运会估计将会用到900台服务器、1000个网络安全设备以及8000台电脑。

    youdao

  • The essence of AIXPert is that it is a network and security hardening tool, which incorporates many functions into one system.

    AIXPert实质上网络安全性强化工具很多功能合并系统中。

    youdao

  • Chaotic encryption applies a new research approach to solve security of information in computer network and security communication inaugurate.

    混沌加密计算机网络安全通信方面应用解决信息安全问题开辟一种新的研究途径

    youdao

  • Have studied the vulnerability of the network and security countermeasure of vulnerability and established the foundation further for the online security respect.

    网络安全方面进一步研究网络脆弱性以及脆弱性安全对策奠定了基础

    youdao

  • This paper focuses on the key technology and control of this system's development, voice card programming technology, as well as the network and security with its application in practice.

    论文重点阐述系统开发关键技术控件语音编程技术、网络安全技术及其在实际中的应用

    youdao

  • As part of this discussion, we'll suggest some potential ways to enhance network and data security for J2ME applications.

    作为讨论一部分,我们提出一些增强J2ME应用程序网络数据安全性可能方法

    youdao

  • The J2EE Server provides for network communications and security that can be configured to the needs of the system.

    J2EE服务器网络通信安全性提供支持,它们可以根据系统需求进行配置

    youdao

  • Network and data security can be guaranteed by establishing point-to-point secure connections.

    可以通过建立点对点安全连接来保证网络数据安全性

    youdao

  • Work with the people in your corporation responsible for network administration and security to resolve potential connectivity issues.

    公司内负责网络管理安全人员协作,解决潜在连接问题

    youdao

  • The research will be presented at the Network and Distributed System Security Symposium in early February.

    研究二月网络分布式系统安全座谈会上发表。

    youdao

  • As you'll see later, this can seriously damage network security allowing attackers to capture passwords and sensitive data.

    正如稍后将会看到的,可能严重地损害网络安全性使攻击捕获密码敏感数据。

    youdao

  • Additional factors that can complicate the deployment of tools are the company's network structure and security policies.

    其他可能使得工具部署复杂化因素公司网络结构安全规则

    youdao

  • While not every developer can be a security expert, all developers should know enough to perform some basic network and traffic analysis and to build rudimentary security into their applications.

    并非所有开发人员安全专家,但所有开发人员都应该了解足够多的知识执行某些基本网络流量分析应用程序内构建基本安全性

    youdao

  • Risk, training, and culture: Conduct risk assessment and physical security of your facility that houses the computer and network infrastructure.

    风险培训文化执行风险评估容纳计算机网络基础结构设施物理安全性评估。

    youdao

  • There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.

    同样网络无线安全技能人群以及那些具有认证信息系统安全专业证书的也备受青睐

    youdao

  • Architects, however, need to understand the physical layer in order to avoid network bottlenecks and security exposures.

    但是架构需要了解物理层避免网络瓶颈安全暴露

    youdao

  • In fact, in many cases, subversive network applications and some security methods will deliberately use non-standard ports.

    事实上大多数情况一些破坏性网络应用一些安全性方法故意使用非标准端口

    youdao

  • Which means they are supposed to be largely immune to viruses and other network security threats.

    因此人们认为它们不会病毒其他网络安全威胁的影响。

    youdao

  • SSO can also improve the productivity of network users, reduce the cost of network operations, and improve network security.

    SSO可以提高网络用户生产力减少网络操作成本增强网络安全性

    youdao

  • The service grid lets participating companies act as a loose federation, each with its own internal computer, network, and security infrastructure and policies.

    这些服务网格使参与公司可以形成松散联盟每个公司具有自己内部计算机网络以及安全基础结构策略

    youdao

  • The contract includes network operations and security, computer network defense, security life cycle management, and identity management, the Defense Department said.

    国防部合同内容包括网络运行安全计算机网络防御、安全的全寿命管理以及识别管理等。

    youdao

  • The effort is designed to help streamline the Army’s European IT infrastructure and improve network integrity and security, company officials said.

    该项工作设计用于帮助实现美国陆军欧洲信息基础设施的无缝化,提高网络一体化和安全性。

    youdao

  • Additional factors like network topologies and security policies can further complicate the configuration and deployment of GDD tools.

    另外例如网络拓扑以及安全策略进一步使得配置开发gdd工具变得更复杂。

    youdao

  • Requesters can authenticate recipients using network and transport-provided security, claims proven in messages, and encryption of the request using a key known to the recipient.

    通过网络由传输提供的安全性消息已批准的声明以及收件人已知密钥请求进行加密请求可以收件人进行身份验证

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务主要客户是美国情报和军事部门。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定