The software also offers an IT security guide which explains how to set up a secure system.
该软件还提供了一个IT安全指南,其中介绍了如何设置安全系统。
Leveraging native application server authentication is crucial to creating a properly secure system.
利用本机应用服务器身份验证对创建完全安全的系统至关重要。
It's called package management, and it's a dynamic game everyone has to play to maintain a secure system.
这就被称为软件包管理,它是一个每个人都必须参与以维护安全的系统的动态游戏。
For a truly secure system, the message will be encrypted in a way that requires a mathematical key to unlock it.
实际使用的安全系统中,信息进行加密后,只有借助一段数字密钥才能解密密文。
Detection SystemSince protection is not enough, a detection system is needed to build a real time monitor for the secure system.
检测系统除了防范体系之外,我们还需要一个检测系统来实时的监测系统的运行状态。
The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.
真正安全的系统只能关机断电,放到一个混凝土浇注的建筑物中的一个密闭的房间中,并配备警力进行守卫。
The Fail-stop signature is a very secure system, even though the attacker gains signature key, it is difficult to forge signature.
防失败签字是一种十分安全的签字体制,即使攻击者得到签字密钥后也难以伪造签字。
While security features do not guarantee a secure system, they are necessary to build a secure system. Security features have four categories.
虽然安全特性并不能担保一个安全的系统,但是他们是构建安全系统所必需的。
This will facilitate a common platform for system support and operations, thus improving efficiency and maintaining a reliable and secure system.
这将为系统支持和运营促成一个共同平台,从而提高效率和保持一个安全可靠的系统。
Identity authentication is an important part of a perfect secure system, the first defense, and the foundation of secure communication and access control.
身份认证是一个完善的安全系统的重要组成部分,是第一道安全屏障,它是安全通信和访问控制的基础。
The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.
其优势是显然的:你会有一个无drm(数字版权管理)限制的、甚至能在老硬件上跑的安全的系统;而那最好的事就是:所有软件完全免费。
Instead, the baseline configuration should call for a completely secure system with the additional cost in time, administration, or tools factored into the project up front.
相反,基准配置应该要求完全安全的系统,并在项目之初考虑到附加的时间、管理、或工具方面的成本。
I'm not even at a medium level when considering cryptography coding, but I dont want to implement a high secure system for one part and 0 secure system for another part.
在考虑加密编码时,我甚至没有中级,但我不想为一部分实现高安全系统,为另一部分实现0安全系统。
Then, starting from thee-mail security, primarily achieved assigned package and encrypt-decrypt authentication mechanism, and elaborated the implementation of a secure system.
然后,从电子邮件安全角度入手,主要设计实现了分包机制和加解密认证机制,详细阐述了安全系统的实现。
As the centralized monitoring system is a non secure system, it is necessary to adopt a secure communication protocol between the centralized monitoring system and other systems.
由于集中监测系统为非安全系统,从系统边界防护角度考虑,应该对集中监测系统和其它系统之间的通信接口采用安全通信协议。
This design presents a reasonably secure system; as long as each voting user has one and only one acceptable E-mail account, there is reasonable assurance that users could not vote twice.
这种设计可以得到一个比较安全的系统;条件是每个投票的用户都有且只有一个可以接受的电子邮件帐号,这样就可以保证每个用户都不会投两次票。
You should now be able to deal with common disasters without losing your cool, and you'll be able to prepare in advance for problems by keeping incremental backups and having a secure system.
现在,您应该可以冷静地处理常见的灾难,并通过增量备份和确保系统安全的措施为将来的问题做好准备。
And last elucidates the structure of the secure system. By aiming at PKI, information secure core technology and analyses the RSA algorithm and sorts of the tech of info exchanging encryption.
最后就信息交换加密技术的分类及RSA算法作以分析,并针对PK I技术这一信息安全核心技术,论述了其安全体系的构成。
If your code simply calls a secure system library that exposes a protected resource, you do not need to demand a permission just because the library exposes the resource protected by that permission.
如果您的代码仅调用公开了保护的资源的一个安全系统库,则不必仅因为该库公开了一个权限保护的资源而请求该权限。
The system login uses information such as source ID (SID), domain and system user name for authentication, so it is considered secure.
系统登录会使用到诸如源ID(安全识别符),域和系统用户名等信息进行身份验证,因此被认为是安全的。
Secure messages are created via a system of digital certificates.
安全的消息是通过数字证书系统创建的。
This technique is a valid way to keep the system secure, but because there is no real sanitization of the data (only conditions on it), current static analysis tools do not properly analyze such code.
这种技术保持使系统安全的一种有效的方法,但是因为并没有真正地清除数据(仅仅以它作为条件),那么当前的静态分析工具就不能适当地分析这样的代码。
To secure your AIX system, you may need to implement hundreds of security Settings.
为了保护AIX系统,您可能需要实现数百个安全设置。
In 2008, I was given an old PC, which I got working, and in which I wanted to install a reliable, secure operating system.
2008年我有了新的工作,并获得了一台旧电脑我想要在这台旧电脑上安装一个可靠的、安全的操作系统。
Creating a painless, easy, and secure password-replacement system will be a major cash cow for any firm that can effectively bring it to market.
如果有公司能够把一个没有烦恼、简单安全的密码替代系统推向市场,那绝对是财源滚滚的现金奶牛。
You should consult other sources of information to ensure your system is secure, or run it on a private network that provides a suitable level of protection.
您应当参考其他信息来源以确保您的系统安全,或者在提供适当保护的内部网络上运行它。
Linux is a fast and secure operating system with many thousands of programmers familiar with it.
快速且安全的操作系统,有成千上万名的程序员对它都很熟悉。
Assume you've been asked by a department store to implement a secure register balance accounting system.
假定一家商店委托您来实现一个安全的收银机结算会计系统。
Assume you've been asked by a department store to implement a secure register balance accounting system.
假定一家商店委托您来实现一个安全的收银机结算会计系统。
应用推荐