Resolved conflicts with several third-party security applications.
解决和第三方安全软件的冲突。
Software, including OpenOffice, security applications, and GIMP, covers a wide range of common needs.
软件包括OpenOffice、安全性应用程序和GIMP,涵盖了各种常见需求。
Other security applications could include using neutrinos, which penetrate the Earth, to communicate with submarines.
其他安全应用包括:利用中微子穿透地球,与潜艇进行通讯。
Research on unknown network protocol reverse parsing is of great significance in many network security applications.
研究未知网络协议逆向解析技术在网络安全应用中具有重要的意义。
Therefore, high-security applications may require some limits on which well-formed XML documents they're able to process.
因此,高安全性应用程序需要对它们可以处理的良好格式的XML文档加以限制。
It may also find application in security applications such as video surveillance, where it would be looking for images of suspicious activity.
或将其应用于各安全应用领域,例如视讯监督利用这一技术寻找可疑活动的图像。
The problem is particularly acute in security applications, where the inability to differentiate human faces hidden in shadows can be disastrous.
这个难题在安全应用上显得尤为尖锐,无法分辨隐藏在阴影中的人脸可能招致不幸。
Browsers and other security applications using digital certificates can verify that the certificate has not been revoked by either the owner or the ca.
浏览器和其他使用数字证书的程序都可以验证这个证书已经被其属主或CA撤销了。
He added that it could also have implications for manufacturers of optical-data storage devices for security applications, optical sensing devices and display technology.
他补充说它可能也会运用于安全方面、光学传感装置和显示技术上的光学数据存储设备的生产。
Designed for the most challenging security applications, it provides high contrast, brightness, and sharpness across the entire image plane for optimal image quality.
该镜头对亮度和整个图像平面清晰度最佳的图像质量可进行高度对比,为最具挑战性的安全应用而设计。
Most security applications are increasingly using public key cryptography. It leads to a pressing need for a PKI (public key Infrastructure) to support the distribution of public keys.
大多数的安全应用现在都引入公钥密码算法,而公钥密码算法需要公钥基础设施PK I来支持公钥的分发。
The size of the spheres can be tailored to scatter particular wavelengths of light-a useful property for security applications in which it is important that materials can be identified precisely.
聚苯乙烯球的大小可以被改变以适合散射特定波长的光,一种非常重要的可用于安全领域的特性,它能使材料被准确地识别。
This paper describes the mathematics base of algebraic geometry and ECC. It also discusses the elliptic curve discrete logarithm problem (ECDLP) and the security applications of ECC on E-commerce.
该文描述了代数几何与ecc的数学基础及椭圆曲线离散对数问题困难性,讨论了ECC在电子商务中的安全应用。
To manage and control numerous, various, complicated, and dynamic security hardware, security applications and security events in the large-scope network is named network security management (NSM).
网络安全管理即指对大规模网络中数量众多、种类繁杂、动态变化的安全硬件、安全应用、安全事件的管理和控制。
You have to know how and where applications interact with security apparatus.
您必须知道应用程序在何处如何与安全机制进行交互。
The security team then further divides the applications into security categories, such as high, medium, and low.
安全团队然后将进一步把应用程序划分到各个安全性类别,如高、中和低。
This article USES example code to demonstrate mouse dynamics for enhancing the security of applications in authentication and continuous usage contexts.
本文将使用示例代码来演示鼠标力学,从而增强在验证和连续使用应用程序时的安全性。
As part of this discussion, we'll suggest some potential ways to enhance network and data security for J2ME applications.
作为讨论的一部分,我们将提出一些增强J2ME应用程序的网络和数据安全性的可能方法。
One moment it is your work machine, complete with a set of corporate applications and tight security Settings.
一会儿它是你的工作机器,配备着一套公司应用程序以及拥有严密的安全设置。
It provides a way to safely communicate between applications or security contexts in the same process.
它提供了同一进程中的应用程序或安全上下文之间安全通信的方法。
Often, they don't know it, mainly because they never really give a thought to security when developing their applications.
通常,他们不知道这一点,主要是因为他们在开发他们的应用程序时从未真正考虑到安全性。
You use mechanisms to apply these security policies and enforce them by assigning responsibility for those policies to applications, SOA security services, and SOA components as needed.
需根据需要将这些策略的职责分配到应用程序、soa安全性服务和SOA组件,从而利用相应的机制来应用这些安全策略并加以执行。
Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.
当然不是所有的应用程序都会访问关键数据,但这些程序的开发人员确实能够通过加入访问控制来增强其应用程序的安全。
It is likely in application connectivity scenarios that as work requests pass between source and target applications, the security domain changes.
在应用程序连接性场景中,当工作请求在源和目标应用程序之间通过时,安全域很可能会发生改变。
Next, we will discuss the processing and security advantages of J2ME applications over those of device-native applications.
接下来,我们将讨论,与那些设备本机应用程序相比,J2ME应用程序有哪些处理和安全性优点。
This is a security feature that prevents applications being used maliciously over a network or the Internet.
这是一个安全性特性,它防止通过网络恶意使用该应用程序。
The Website and applications adhere to common security and privacy standards.
网站和应用加上了一般的安全及个人隐私的标准。
This technique lets you can develop your JSF applications without considering security issues.
使用这项技术,可以在不用考虑安全问题的情况下开发JSF应用程序。
Client authentication using digital certificates helps overcome the problem of using compromised credentials and provides a better sense of security about your applications.
使用数字证书的客户机身份验证可以帮助克服凭据被破坏的问题,从而让您对应用程序的安全性更加有信心。
Understanding the implications of transparent data flow is key to the security of XML-based applications.
理解透明数据流的牵涉对于基于XML的应用程序的安全性来说至关重要。
应用推荐