Duties for network and security controls of virtual machines may not be well separated.
对虚拟机的网络和安全控制职责可能没有很好地分隔。
The games will use an estimated 900 servers, 1,000 network and security devices, and 8,000 computers.
这次奥运会估计将会用到900台服务器、1000个网络和安全设备,以及8000台电脑。
The games will use an estimated 900 servers, 1, 000 network and security devices, and 8, 000 computers.
这次奥运会估计将会用到900台服务器、1000个网络和安全设备,以及8000台电脑。
The essence of AIXPert is that it is a network and security hardening tool, which incorporates many functions into one system.
AIXPert实质上是一个网络和安全性强化工具,它将很多功能合并到一个系统中。
Chaotic encryption applies a new research approach to solve security of information in computer network and security communication inaugurate.
混沌加密在计算机网络和安全通信方面的应用为解决信息安全问题开辟了一种新的研究途径。
Have studied the vulnerability of the network and security countermeasure of vulnerability and established the foundation further for the online security respect.
为网络安全方面进一步研究网络脆弱性以及脆弱性的安全对策奠定了基础。
This paper focuses on the key technology and control of this system's development, voice card programming technology, as well as the network and security with its application in practice.
论文重点阐述了本系统开发的关键技术和控件、语音卡编程技术、网络和安全技术及其在实际中的应用。
As part of this discussion, we'll suggest some potential ways to enhance network and data security for J2ME applications.
作为讨论的一部分,我们将提出一些增强J2ME应用程序的网络和数据安全性的可能方法。
The J2EE Server provides for network communications and security that can be configured to the needs of the system.
J2EE服务器为网络通信和安全性提供支持,它们可以根据系统需求进行配置。
Network and data security can be guaranteed by establishing point-to-point secure connections.
可以通过建立点对点安全连接来保证网络与数据安全性。
Work with the people in your corporation responsible for network administration and security to resolve potential connectivity issues.
与您公司内负责网络管理和安全的人员协作,解决潜在的连接问题。
The research will be presented at the Network and Distributed System Security Symposium in early February.
研究将在二月初网络和分布式系统安全座谈会上发表。
As you'll see later, this can seriously damage network security allowing attackers to capture passwords and sensitive data.
正如您稍后将会看到的,这可能严重地损害网络安全性,使攻击者捕获密码和敏感数据。
Additional factors that can complicate the deployment of tools are the company's network structure and security policies.
其他的可能使得工具部署复杂化的因素是公司的网络结构及安全规则。
While not every developer can be a security expert, all developers should know enough to perform some basic network and traffic analysis and to build rudimentary security into their applications.
并非所有开发人员都是安全专家,但所有开发人员都应该了解足够多的知识,执行某些基本的网络和流量分析,并在其应用程序内构建基本的安全性。
Risk, training, and culture: Conduct risk assessment and physical security of your facility that houses the computer and network infrastructure.
风险、培训和文化:执行风险评估和容纳计算机及网络基础结构的设施的物理安全性评估。
There's also strong interest in people with network and wireless security skills, as well as those with Certified Information Systems security Professional accreditation.
同样,有网络和无线安全技能的人群以及那些具有认证信息系统安全专业证书的也备受青睐。
Architects, however, need to understand the physical layer in order to avoid network bottlenecks and security exposures.
但是,架构师需要了解物理层以避免网络瓶颈和安全暴露。
In fact, in many cases, subversive network applications and some security methods will deliberately use non-standard ports.
事实上,大多数情况下一些破坏性网络应用和一些安全性方法会故意使用非标准端口。
Which means they are supposed to be largely immune to viruses and other network security threats.
因此人们认为它们不会受病毒和其他网络安全威胁的影响。
SSO can also improve the productivity of network users, reduce the cost of network operations, and improve network security.
SSO还可以提高网络用户的生产力,减少网络操作的成本,增强网络安全性。
The service grid lets participating companies act as a loose federation, each with its own internal computer, network, and security infrastructure and policies.
这些服务网格使参与公司可以形成松散的联盟,每个公司具有自己的内部计算机、网络以及安全基础结构和策略。
The contract includes network operations and security, computer network defense, security life cycle management, and identity management, the Defense Department said.
国防部称,合同内容包括网络运行与安全、计算机网络防御、安全的全寿命管理以及识别管理等。
The effort is designed to help streamline the Army’s European IT infrastructure and improve network integrity and security, company officials said.
该项工作设计用于帮助实现美国陆军欧洲信息基础设施的无缝化,提高网络一体化和安全性。
Additional factors like network topologies and security policies can further complicate the configuration and deployment of GDD tools.
另外,例如网络拓扑以及安全策略会进一步使得配置及开发gdd工具变得更复杂。
Requesters can authenticate recipients using network and transport-provided security, claims proven in messages, and encryption of the request using a key known to the recipient.
通过网络和由传输提供的安全性、消息中已批准的声明,以及用收件人已知的密钥对请求进行加密,请求者可以对收件人进行身份验证。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.
ACI公司提供信息技术和网络安全解决方案,以及系统工程学和开发服务,其主要客户是美国情报和军事部门。
应用推荐