They provide daily up dated news, information on the latest viruses, security articles and more.
他们提供每日更新的新闻,在最新的病毒,安全性文章和更多的信息。
Security articles and devices containing coded holographic platelets and methods of manufacturing the same.
Cestmir HRADENCY:包含经编码的全息板的安全物品和设备及其制造方法。
However, if you think all hackers are attackers, you'll have a lot of trouble understanding many security articles, so I'll use the definition shown here.
但是,如果您认为所有的黑客都是攻击者,那么您在理解许多安全性文章时会碰到很多麻烦,所以我将使用这里指出的定义。
Of course, you can find a wide range of security articles in the developerWorks Security topic, and our XML zone is always an excellent resource for developers working with the language.
当然,您可以在 developerWorks「安全性」主题中找到许多安全性文章,而且对于使用该语言的开发者来说,我们的XML专区始终是一个极好的资源。
Even in the relatively small number of security configurations tested for the security discussions and performance comparisons in the articles of this series, I found several problems of this type.
尽管在本系列文章中,关于对安全性讨论和性能比较进行测试的安全性配置的数目较少,但我还是发现了这种类型的几个问题。
In these articles, we have emphasized the importance of comparing and contrasting technologies and coming up with those that best meet system security requirements.
在这些文章中,我们强调了比较和对比技术的重要性并提出了最符合系统安全性要求的技术。
This is the same configuration used in earlier articles with Axis2 examples of WS-Security asymmetric signing and encrypting.
这与此前文章中WS-Security非对称签名和加密的Axis2例子中的配置一致。
In future articles, I will discuss Security Assertion Markup Language (SAML) and XML Key Management System (XKMS).
在今后的文章中,我将要讨论安全性断言标记语言(Security Assertion Markup Language,SAML)和xml密钥管理系统(XML Key Management System,XKMS)。
In this series of articles, I introduced you to using Acegi security System to enforce both URL-based security and method-based security.
在这份共分三部分的系列文章中,我介绍了如何使用Acegi安全系统增强基于URL的安全性和基于方法的安全性。
For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
Stay tuned for the upcoming articles in this series, which will continue to explore warehouse ETL process design and implementation, warehouse performance, security, and more.
继续本系列中的下一篇文章,其中将继续探索仓库ETL过程的设计和实现、仓库性能、安全性等。
Security in. NET 4.0 has been completely redesigned. There are sever articles on the MSDN on this, a good starting point is here and here.
的安全。NET 4.0已经完全重新设计。MSDN上有切断的文章,是一个很好的起点在这里和在这里。
For more information on securing your web server, check out our recent series of security blog articles, "The Merciless Malignancy of Malware," especially Part 3 and Part 4.
想了解更多保护网站服务器的信息,请看我们最近发表的有关安全的系列博文,“残暴不仁的恶意软件”尤其是第三部分和第四部分。
Recently a number of articles have discussed the security of browsers' password managers.
近来有许多文章讨论浏览器密码管理的安全性。
Load into the aircraft articles which have not gone through security inspection or for which no other security measures have been taken.
将未经安全检查或者采取其他安全措施的物品装入航空器。
Ca technology is very popular to solve the application security problem, but there are few articles to introduce the design of RA system.
CA技术在解决应用系统安全问题比较流行,但很少有介绍RA系统设计的文章。
Article 28 the working personnel (including crew members) and the articles brought along by them shall be subject to security inspection while entering the departure sterile area.
第二十八条进入候机隔离区的工作人员(包括机组人员)及其携带的物品,应当接受安全检查。
The cabinets for containing articles shall be placed on the side of the security check door for temporary consignation of articles.
物品柜放置于安全检查门的一侧,以备暂时寄存物品。
His research is focused on audio information processing and multimedia security and he has published more than 30 articles in these fields.
在音频信息处理及多媒体信息安全领域发表文章30余篇。
His research is focused on audio information processing and multimedia security and he has published more than 30 articles in these fields.
在音频信息处理及多媒体信息安全领域发表文章30余篇。
应用推荐