• Resolved conflicts with several third-party security applications.

    解决第三安全软件的冲突

    youdao

  • Software, including OpenOffice, security applications, and GIMP, covers a wide range of common needs.

    软件包括OpenOffice安全性应用程序GIMP涵盖各种常见需求。

    youdao

  • Other security applications could include using neutrinos, which penetrate the Earth, to communicate with submarines.

    其他安全应用包括:利用中微子穿透地球潜艇进行通讯

    youdao

  • Research on unknown network protocol reverse parsing is of great significance in many network security applications.

    研究未知网络协议逆向解析技术网络安全应用中具有重要意义。

    youdao

  • Therefore, high-security applications may require some limits on which well-formed XML documents they're able to process.

    因此高安全性应用程序需要它们可以处理的良好格式XML文档加以限制。

    youdao

  • It may also find application in security applications such as video surveillance, where it would be looking for images of suspicious activity.

    应用各安全应用领域,例如视讯监督利用一技术寻找可疑活动图像

    youdao

  • The problem is particularly acute in security applications, where the inability to differentiate human faces hidden in shadows can be disastrous.

    这个难题安全应用上显得尤为尖锐无法分辨隐藏阴影中的人脸可能招致不幸。

    youdao

  • Browsers and other security applications using digital certificates can verify that the certificate has not been revoked by either the owner or the ca.

    浏览器其他使用数字证书程序都可以验证这个证书已经被其属主或CA撤销了。

    youdao

  • He added that it could also have implications for manufacturers of optical-data storage devices for security applications, optical sensing devices and display technology.

    补充可能运用安全方面、光学传感装置显示技术上的光学数据存储设备生产

    youdao

  • Designed for the most challenging security applications, it provides high contrast, brightness, and sharpness across the entire image plane for optimal image quality.

    该镜头对亮度整个图像平面清晰度最佳的图像质量可进行高度对比具挑战性安全应用设计

    youdao

  • Most security applications are increasingly using public key cryptography. It leads to a pressing need for a PKI (public key Infrastructure) to support the distribution of public keys.

    大多数安全应用现在都引入公钥密码算法,而公钥密码算法需要公钥基础设施PK I支持公钥分发

    youdao

  • The size of the spheres can be tailored to scatter particular wavelengths of light-a useful property for security applications in which it is important that materials can be identified precisely.

    聚苯乙烯球大小可以改变以适合散射特定波长的光,一非常重要的可用于安全领域特性使材料被准确地识别

    youdao

  • This paper describes the mathematics base of algebraic geometry and ECC. It also discusses the elliptic curve discrete logarithm problem (ECDLP) and the security applications of ECC on E-commerce.

    该文描述了代数几何ecc数学基础椭圆曲线离散对数问题困难性讨论了ECC电子商务中的安全应用

    youdao

  • To manage and control numerous, various, complicated, and dynamic security hardware, security applications and security events in the large-scope network is named network security management (NSM).

    网络安全管理即指大规模网络数量众多、种类繁杂动态变化的安全硬件、安全应用、安全事件管理控制

    youdao

  • You have to know how and where applications interact with security apparatus.

    必须知道应用程序在何处如何安全机制进行交互

    youdao

  • The security team then further divides the applications into security categories, such as high, medium, and low.

    安全团队然后进一步应用程序划分各个安全性类别、中和低。

    youdao

  • This article USES example code to demonstrate mouse dynamics for enhancing the security of applications in authentication and continuous usage contexts.

    本文使用示例代码演示鼠标力学从而增强验证连续使用应用程序安全性

    youdao

  • As part of this discussion, we'll suggest some potential ways to enhance network and data security for J2ME applications.

    作为讨论一部分,我们提出一些增强J2ME应用程序网络数据安全性可能方法

    youdao

  • One moment it is your work machine, complete with a set of corporate applications and tight security Settings.

    一会儿工作机器配备公司应用程序以及拥有严密安全设置

    youdao

  • It provides a way to safely communicate between applications or security contexts in the same process.

    提供同一进程中的应用程序安全上下文之间安全通信方法

    youdao

  • Often, they don't know it, mainly because they never really give a thought to security when developing their applications.

    通常他们知道这一点主要是因为他们在开发他们应用程序从未真正考虑安全性

    youdao

  • You use mechanisms to apply these security policies and enforce them by assigning responsibility for those policies to applications, SOA security services, and SOA components as needed.

    需根据需要这些策略职责分配应用程序、soa安全性服务SOA组件,从而利用相应的机制应用这些安全策略加以执行

    youdao

  • Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.

    当然不是所有应用程序都会访问关键数据这些程序开发人员确实能够通过加入访问控制增强应用程序的安全

    youdao

  • It is likely in application connectivity scenarios that as work requests pass between source and target applications, the security domain changes.

    应用程序连接性场景中工作请求目标应用程序之间通过时安全可能会发生改变。

    youdao

  • Next, we will discuss the processing and security advantages of J2ME applications over those of device-native applications.

    接下来我们讨论与那些设备本机应用程序相比,J2ME应用程序有哪些处理安全性优点

    youdao

  • This is a security feature that prevents applications being used maliciously over a network or the Internet.

    一个安全性特性它防止通过网络恶意使用应用程序

    youdao

  • The Website and applications adhere to common security and privacy standards.

    网站应用加上一般安全个人隐私标准

    youdao

  • This technique lets you can develop your JSF applications without considering security issues.

    使用这项技术可以不用考虑安全问题的情况下开发JSF应用程序

    youdao

  • Client authentication using digital certificates helps overcome the problem of using compromised credentials and provides a better sense of security about your applications.

    使用数字证书客户机身份验证可以帮助克服凭据被破坏问题,从而让应用程序的安全性更加有信心

    youdao

  • Understanding the implications of transparent data flow is key to the security of XML-based applications.

    理解透明数据牵涉对于基于XML应用程序安全性来说至关重要

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定