Although technology has made the attack more disruptive and more sophisticated, the security base is still as important as ever.
尽管技术让攻击变得更具破坏性,让防御变得更为复杂,但安全的基础仍像以往一样重要。
Enterprise portal technology provided stable, flexible and reliable security base and structure for enterprise information system.
企业门户技术是为企业的信息系统提供稳定、可伸缩和可靠的安全基础和框架结构。
The information security base are discussed, including security criteria, security expression model, system frame of the network security, some typical security technology.
论述了信息安全基础:安全标准,安全表述模型,网络安全体系结构:几种典型的安全技术。
Models from economics and demography become the definitive tools for examining the financial base of social security.
来自经济学和人口学的模型成为检验社会保障财政基础的最权威工具。
We should place equal emphasis on development and security, and develop nuclear energy on the base of security.
坚持发展与安全并重,在安全的基础上发展核能。
Base services can be implemented to integrate with common enterprise components that support workflow, security, and audit logging.
基本服务可以与支持工作流、安全性和审计日志记录的通用企业组件集成。
The virtual cube inherits the security definitions of its base cubes.
虚拟多维数据集将继承它的基础多维数据集的安全定义。
This scenario is frequently used when all components are internal, under the same security management and part of the trusted computer base.
此场景经常用于所有组件都是内部组件、使用相同的安全性管理且属于受信任计算机群的情况。
The successful migration has also helped the base improve service delivery as well as strengthen security by reducing entry points.
迁移成功也有助于改善基地服务,减少接入点,以加强安全性。
Trusted Computing Base (TCB) is the security feature available with IBM AIX versions later than version 4.1.
可信计算基础(Trusted Computing Base,TCB)是 4.1版以后的IBMAIX版本提供的安全功能。
Once this principal has been set, you can simply use the JEE security model and WebSphere Base Security APIs as you normally would.
一旦对这个principal 进行了设置,您就可以像往常那样使用 JEE安全模型和WebSphereBase SecurityAPI。
Atlas may be extended to provide alternate implementations of architectural mechanisms (such as persistence or security) that extend the base Atlas framework.
扩展atlas,以提供扩展了基本atlas框架的架构机制(例如,持久性或安全性)的实现。
If John were to submit a job against the second base node or the deployment manager cell, the job will fail because his security token is not authorized in these two environments.
如果John向第二个基本节点或部署管理器单元提交作业,作业将失败,因为他的安全令牌在这两个环境中未获授权。
By using the Debian distribution as a base, Ubuntu benefits from the security and performance aspects of Debian.
通过将Debian发行版作为基础,Ubuntu受益于Debian的安全性和性能。
Tencent has 600 million loyal users, it wants to finish 360 through packaged installation; whereas 360 holds its "security" shield to undermine QQ's loyalty base by using user's fear.
腾讯有6亿忠实用户,它想以打包安装的方式终结360;而360紧握“安全”盾牌,利用用户的恐惧心理蚕食着忠实的QQ群体。
We have covered how we restrict read access to Active Directory to members of the Pre-Windows 2000 Compatibility access security group as well as marking non-system-base as confidential.
我们还涉及到如何限制“Pre -Windows 2000 CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
We have covered how we restrict read access to Active Directory to members of the “Pre-Windows 2000 Compatibility Access” security group as well as marking non-system-base as confidential.
我们还涉及到如何限制“Pre-Windows 2000CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
He tells them the stiff penalties for any violation of the base security rules, as well as for the use of illegaldrugs, fighting, misuse of firearms and so on.
违反基地规则将受到严厉的惩罚。至于打架、吸毒、违章使用武器之类的事情我就不想多说了 你们都清楚的。
Scott Roberson, the base security chief, had also been following the preparations with unease.
该基地的负责人ScottRoberson也在不安地进行预备工作。
The evidence they have now collected suggests it was last November that somebody working in a high-security facility inside a US military base in Iraq started to copy secret material.
他们现在所收集的证据表明,美国伊拉克某军事基地一个高级别安全部门内,去年11月就有人开始复印秘密材料。
The thesis introduce the base of network database security, which includes modern cryptology and database security, and introduce principle of fingerprint characteristic in identity identification.
本文首先介绍网络数据库安全的基础:即现代密码学和数据库安全,接着介绍了指纹特征在身份认证中的原理。
The following example shows two user base DNs in /etc/security/ldap/ldap.cfg.
下面的示例显示了 /etc/security/ldap/ldap.cfg中的两个用户基本DN。
He said Russia would need to assure any partner countries that a new base would also enhance their own security.
他表示,俄罗斯向合作伙伴的国家承诺,新的基地也将加强他们的安全。
The mksecldap command, when used to configure an LDAP client, will find the base DN and will save it to the /etc/security/ldap/ldap.cfg file.
当使用mksecldap命令配置LDAP客户端时,将查找基本DN并将其保存到 /etc/security/ldap/ldap.cfg文件。
Finally, the author analyzes the function of SSL and XML in security area and provides the solution scheme of the security that makes use of all protocols base on SOAP security technology.
最后作者在剖析基于SSL和XML安全性的作用机制的基础上,结合目前所使用的基于SOAP安全技术给出了一个解决安全问题的方案。
In this article, the security and recovery techniques are introduced, which are implemented on a network data base-IDMS.
本文介绍了在网状型数据库idms上实现的安全技术和恢复数据库的过程。
Encrypting systems employed at present usually base the security of communication on the arithmetic complexity.
现有的加密系统通常把通信的安全性建立在计算复杂性基础上。
Classic secret communication system employed at present usually base the security of communication on the arithmetic complexity.
经典的保密通信系统通常把通信的安全性建立在计算复杂性基础上。
Classic secret communication system employed at present usually base the security of communication on the arithmetic complexity.
经典的保密通信系统通常把通信的安全性建立在计算复杂性基础上。
应用推荐