P2P model on the IPV6 can solve problem of security and control in the network finally.
IPV 6上的P 2 P模式能最终解决网络上的安全管理问题。
Consider the effectiveness of the company's internal control system, including information technology security and control.
评价公司内部控制系统的有效性,包括信息技术安全和控制。
The new version of WAS increases users' security and control, and delivers automated enhancements for the installation, maintenance, testing and problem resolution of business applications.
新版本增加了用户的安全和控制,并提供了安装,维修,测试和解决问题的商业应用自动增强功能。
Separate the areas in the element security control cube by target area definitions and by IF statements according to the business logic you need.
根据您需要的业务逻辑,按照目标区域定义和IF 语句分离元素安全性控制多维数据集中的区域。
Therefore, license plate recognition technology has the particularly important practical application value in the public security and the traffic control.
因此,汽车牌照识别技术在公共安全及交通管理中具有特别重要的实际应用意义。
Interceptors are a special kind of invokers that provide additional function, such as data transformation, security, and transaction control.
拦截器是一种特殊的调用器,它提供其他的功能,比如数据转换、安全性和事务控制。
This feature is intended to improve security and to control accessibility.
这个特性的用途是提高安全性和控制可访问性。
The following class diagram shows the relationship between the SAML assertion, security data parser, and control object.
下面的类图说明SAML断言、安全数据解析器和控制对象之间的关系。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.
通过适当地认证和访问控制,确保只有具有适当身份和经过授权的用户可以访问数据,可以处理大多数数据安全问题。
Document services include document generation, collaboration, document control, archival support, and security.
文档服务包括文档生成、合作、文档控制、文档支持和安全。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
This module also comes with a pre-built spam control and security features.
这个模块还附带预先构建的垃圾控制和安全特性。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.
服务安全性的重点是管理联合标识和跨服务的访问控制、确保能安全访问服务和应用程序,以及使服务的安全策略得到一致执行。
This allows project managers to better control costs, manage security, and allocate resources to clouds a project is assigned to.
这样项目管理人员可以更好地控制成本、管理安全问题和分配资源。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
Document control and security: for managing access to business-critical information and certifying document authenticity with digital signatures.
文档控制和安全:目的是为了管理以业务为主的信息的访问以及使用数字签名验证文档的真实性。
Increasing the training of the Iraqi police and military forces so they can assume control of security.
加强伊拉克警察和武装力量的训练,让他们能够承担安全保障任务。
Originally designed for consumer use, these devices typically lack security, control and auxiliary management tools.
这些设备本来是作为消费级应用的产品,因此普遍缺乏安全,控制以及辅助管理工具。
Others say Mr Nurgaliev, who has a security-service background, has lost control and is about to be sacked.
其他人认为具有安全服务部门背景的利耶夫先生已经失去了控制并即将被解这个。
With regard to its mandate, the CD's importance is reflected in its responsibility to cope with issues of security and arms control, issues that impact world peace and stability.
就其职权而言,裁谈会处理的安全与军控问题,事关国际和平与稳定,责任和意义重大。
The hosting PaaS itself can be hardened as a box (appliance) with a web-based administration console exposed as solely an access portal for security control and client-side customization submissions.
主机PaaS自身可以固化为一个盒子(设备),带有单纯作为安全控制和客户端定制提交访问门户输出的基于 web 的管理控制台。
Have security requirements like access control and data privacy been met in both existing and legacy systems?
访问控制和数据隐私等安全要求在现有和遗留系统中都得到满足了吗?
It also contains security namespace information and access control policies on all the Cognos objects.
它还包含针对所有Cognos对象的安全名称空间信息以及访问控制策略。
Records Management Services manage the retention, access control and security, auditing and reporting, and ultimate disposition of business records.
RecordsManagementServices管理业务记录的保存、访问控制和安全性、审计和报告以及最终处置。
The philosopher is ultimately driven by a need for safety and security which is expressed through tight control.
严密控制带来安全,哲学家的终极动力源于此。
These areas included rules for enabling remote services, IP security filtering, and more granular control for startup files, which included inittab, rc.tcpip, and inetd.
这些领域包括启用远程服务的规则、IP安全性过滤和对启动文件,包括inittab、rc.tcpip 和inetd 的更细粒度的控制。
In the center of the diagram in Figure 2 is Tivoli's WebSEAL product, which serves the role of a proxy and provides a security mechanism to control access to documents and Web objects in the network.
图2的中心展示的是Tivoli的WebSEAL产品,该产品充当代理的角色并提供安全机制来控制对网络中的文档以及Web对象的访问。
In the center of the diagram in Figure 2 is Tivoli's WebSEAL product, which serves the role of a proxy and provides a security mechanism to control access to documents and Web objects in the network.
图2的中心展示的是Tivoli的WebSEAL产品,该产品充当代理的角色并提供安全机制来控制对网络中的文档以及Web对象的访问。
应用推荐