• Systems and methods for integrating facility access with other security systems are described.

    描述了设施访问其他安全系统集成的系统方法

    youdao

  • The system can support 125 zones and more than 500 sensors on each control panel and can be integrated with other security systems.

    系统每个控制面板支持125个500多个传感器,它还可以集成其他安全系统

    youdao

  • UML provides an effective means for the analysis and design of collaborative intrusion detection system, which facilitates its integration with other security systems.

    UML协同入侵检测系统分析设计提供有效手段方便其它安全系统的集成

    youdao

  • It also offers some flexible security mapping interface to combine with other security systems easily and confess access control service for the applications of enterprises.

    提供灵活安全映射接口,使其易于其他安全系统相结合,企业及企业间应用提供访问控制服务

    youdao

  • TATA Advanced Systems, as the lead on the program, along with other TATA partners will be responsible for project management, security, software development, production, integration and delivery.

    塔公司先进系统分部该项目的领导者,它其他伙伴一起负责计划管理安全软件开发制造集成交付等工作

    youdao

  • This file is used most commonly to take a security snapshot for use as a documentation tool on one's own system or to take the configuration data and apply it on other systems.

    这个文件用于获取安全快照,以用作本身系统文档工具或者用于获取配置数据其应用到其他系统上。

    youdao

  • New technologies allowing voters to cast ballots via the Internet or other electronic means are catching on in the United States and elsewhere, even as fears mount about security of the systems.

    科技使得网上投票其他电子投票方式美国其他一些地区流行起来尽管人们一系统安全顾虑日益继增。

    youdao

  • Keeping Content Management Systems (CMS) up to date is also crucial and ensures other security aspects of the site are updated.

    使内容管理系统(CMS)保持最新很关键并且确保网站其他安全方面更新了

    youdao

  • Other geological efforts require similar computing power, such as designing systems to predict earthquakes and designing multispectral satellite imaging systems for security work.

    其他地理学方面的研究也需要类似的计算能力例如用来预测地震系统用于安全性工作的多谱段卫星成像系统。

    youdao

  • Having stated the previous, it may not be the security policy of some systems to divulge passwords to other users.

    某些系统安全策略可能允许其他用户泄露密码

    youdao

  • Other operating systems use more elaborate security models.

    其他操作系统则使用了更精细安全模型

    youdao

  • The Linux operating system offers superior security, reliability, and uptime on par with other UNIX-like operating systems.

    Linux操作系统提供较高安全性可靠性同时保证象UNIX操作系统能提供的正常运行时间

    youdao

  • All other security mechanisms (digital certificates, SSL, WS-Security, etc.) are value-added features offered by client and server JAX-RPC run-time systems.

    所有其他安全机制(数字证书SSLWS - Security)都是客户机服务器运行时系统所提供增值功能

    youdao

  • Local OS registry (other operating systems) : user security name.

    本地OS注册中心(其他操作系统):用户安全名称

    youdao

  • For these systems, the organizations have no monetary incentive to balance usability with security, or to find some other way of protecting user accounts.

    对于这些系统这些组织没有资金激励平衡易用性安全性或者找到其他方法包含用户账号

    youdao

  • On the other hand, there are several security systems that provide good, powerful administration, from user registration down to managing permissions, and that could be adapted to be JACC providers.

    一方面,几种安全系统能够提供出色强大的管理用户注册一直管理权限而且可以通过修改成为 JACC 提供程序。

    youdao

  • Other applications now on sale include wireless home-security systems and wireless beacons for sailors to tell the crew when someone has fallen overboard.

    其他待售应用包括无线家庭安全系统无线信标——水手有人落水时用其通知全体船员。

    youdao

  • In other words, the systems need to ensure a high level of security compliance.

    话说,系统需要确保很高安全合法性。

    youdao

  • Medical devices, like other computer systems, are also vulnerable to security breaches, which affect the security and effectiveness of the device.

    医疗设备其它计算机系统一样,同样容易出现安全漏洞从而影响到设备安全性有效性

    youdao

  • Can interlink with the other systems through web net and date-base system conveniently, can not only realize data sharing function, but also ensure the independent ability and security of the system.

    通过网络数据库系统方便其他系统互连,既能实现数据共享保证系统独立性安全性

    youdao

  • Other costs include the office construction, the installation of security systems and access control systems, and design fees.

    其他费用包括办公场地建造保安系统出入控制系统安装设计费用

    youdao

  • Organizations responsible for public safety and security are investing in systems that will maximize the effectiveness of their response to incidents and other potentially dangerous situations.

    那些负责公共安全组织建立一整套安全体系付出大量努力,使该体系能对突发事件其他可能发生危险局势作出最有效反应

    youdao

  • With the extensive applications of the network and other information technologies, the security of network systems has become critical.

    随着网络其它信息技术广泛应用,网络系统安全变得至关重要

    youdao

  • For constructing network security systems, other measures preventing from being threaten and enhancing operators' quality are needed for the whole security plan in command automation system.

    同时指挥自动化网络整体安全计划中加入其它防止威胁措施加强人的素质教育。

    youdao

  • Lastly, personnel management, security systems, auditing system security management and other aspects of e-commerce.

    最后人员管理保密制度审计制度方面论述电子商务安全管理。

    youdao

  • People can no longer trust each other and have to resort to elaborate security systems to protect themselves and their possessions.

    人们不再相互信任不得不凭借精密安全设备保护自己财产。

    youdao

  • Participate in integration systems and services of the third party logistics must be strong, but on the other hand, green supply chain and supply chain security must also as a factor.

    参与一体化系统服务第三物流必须强有力的但是一方面,绿色供应链供应链安全必须作为考虑因素。

    youdao

  • Network security has been paid more attention to and hackers often take advantage of buffer overflow to attack other systems or spread virus.

    网络安全日益引起人们重视,而利用缓冲区溢出进行攻击是黑客病毒较为常用的手段。

    youdao

  • Network security has been paid more attention to and hackers often take advantage of buffer overflow to attack other systems or spread virus.

    网络安全日益引起人们重视,而利用缓冲区溢出进行攻击是黑客病毒较为常用的手段。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定