• Although technology has made the attack more disruptive and more sophisticated, the security base is still as important as ever.

    尽管技术攻击变得更具破坏性,让防御变得更为复杂安全基础以往一样重要

    youdao

  • Enterprise portal technology provided stable, flexible and reliable security base and structure for enterprise information system.

    企业门户技术是为企业的信息系统提供稳定可伸缩可靠安全基础框架结构

    youdao

  • The information security base are discussed, including security criteria, security expression model, system frame of the network security, some typical security technology.

    论述了信息安全基础:安全标准,安全表述模型网络安全体系结构几种典型安全技术。

    youdao

  • Models from economics and demography become the definitive tools for examining the financial base of social security.

    来自经济学人口学模型成为检验社会保障财政基础权威工具

    youdao

  • We should place equal emphasis on development and security, and develop nuclear energy on the base of security.

    坚持发展安全并重,在安全基础发展核能

    youdao

  • Base services can be implemented to integrate with common enterprise components that support workflow, security, and audit logging.

    基本服务可以支持工作流安全性审计日志记录的通用企业组件集成

    youdao

  • The virtual cube inherits the security definitions of its base cubes.

    虚拟多维数据集将继承基础多维数据集安全定义

    youdao

  • This scenario is frequently used when all components are internal, under the same security management and part of the trusted computer base.

    场景经常用于所有组件都是内部组件、使用相同安全性管理属于受信任计算机情况。

    youdao

  • The successful migration has also helped the base improve service delivery as well as strengthen security by reducing entry points.

    迁移成功有助于改善基地服务减少接入点加强安全性

    youdao

  • Trusted Computing Base (TCB) is the security feature available with IBM AIX versions later than version 4.1.

    可信计算基础(Trusted Computing BaseTCB 4.1以后IBMAIX版本提供安全功能

    youdao

  • Once this principal has been set, you can simply use the JEE security model and WebSphere Base Security APIs as you normally would.

    一旦这个principal 进行了设置可以像往常那样使用 JEE安全模型WebSphereBase SecurityAPI

    youdao

  • Atlas may be extended to provide alternate implementations of architectural mechanisms (such as persistence or security) that extend the base Atlas framework.

    扩展atlas提供扩展基本atlas框架架构机制(例如持久性安全性)的实现

    youdao

  • If John were to submit a job against the second base node or the deployment manager cell, the job will fail because his security token is not authorized in these two environments.

    如果John第二基本节点部署管理器单元提交作业,作业失败因为安全令牌两个环境中获授权

    youdao

  • By using the Debian distribution as a base, Ubuntu benefits from the security and performance aspects of Debian.

    通过Debian发行版作为基础Ubuntu受益于Debian安全性性能

    youdao

  • Tencent has 600 million loyal users, it wants to finish 360 through packaged installation; whereas 360 holds its "security" shield to undermine QQ's loyalty base by using user's fear.

    腾讯6亿忠实用户打包安装的方式终结360;360紧握安全盾牌利用用户恐惧心理蚕食着忠实QQ群体

    youdao

  • We have covered how we restrict read access to Active Directory to members of the Pre-Windows 2000 Compatibility access security group as well as marking non-system-base as confidential.

    我们涉及到如何限制“Pre -Windows 2000 CompatibilityAccess安全访问AD以及标记“非系统基础”保密。

    youdao

  • We have covered how we restrict read access to Active Directory to members of the “Pre-Windows 2000 Compatibility Accesssecurity group as well as marking non-system-base as confidential.

    我们涉及到如何限制“Pre-Windows 2000CompatibilityAccess安全访问AD以及标记“非系统基础”保密

    youdao

  • He tells them the stiff penalties for any violation of the base security rules, as well as for the use of illegaldrugs, fighting, misuse of firearms and so on.

    违反基地规则将受到严厉惩罚至于打架吸毒、违章使用武器之类的事情我就不想多了 你们都清楚的。

    youdao

  • Scott Roberson, the base security chief, had also been following the preparations with unease.

    基地的负责人ScottRoberson不安地进行预备工作。

    youdao

  • The evidence they have now collected suggests it was last November that somebody working in a high-security facility inside a US military base in Iraq started to copy secret material.

    他们现在所收集证据表明美国伊拉克军事基地一个高级别安全部门去年11月有人开始复印秘密材料。

    youdao

  • The thesis introduce the base of network database security, which includes modern cryptology and database security, and introduce principle of fingerprint characteristic in identity identification.

    本文首先介绍网络数据库安全基础现代密码学数据库安全,接着介绍了指纹特征身份认证中的原理

    youdao

  • The following example shows two user base DNs in /etc/security/ldap/ldap.cfg.

    下面示例显示了 /etc/security/ldap/ldap.cfg中的两个用户基本DN

    youdao

  • He said Russia would need to assure any partner countries that a new base would also enhance their own security.

    表示俄罗斯合作伙伴的国家承诺,新的基地加强他们的安全。

    youdao

  • The mksecldap command, when used to configure an LDAP client, will find the base DN and will save it to the /etc/security/ldap/ldap.cfg file.

    使用mksecldap命令配置LDAP客户端时,查找基本DN保存 /etc/security/ldap/ldap.cfg文件

    youdao

  • Finally, the author analyzes the function of SSL and XML in security area and provides the solution scheme of the security that makes use of all protocols base on SOAP security technology.

    最后作者剖析基于SSLXML安全性作用机制的基础上,结合目前所使用的基于SOAP安全技术给出了一个解决安全问题的方案。

    youdao

  • In this article, the security and recovery techniques are introduced, which are implemented on a network data base-IDMS.

    本文介绍网状型数据库idms上实现安全技术恢复数据库的过程。

    youdao

  • Encrypting systems employed at present usually base the security of communication on the arithmetic complexity.

    现有加密系统通常通信安全性建立计算复杂性基础上。

    youdao

  • Classic secret communication system employed at present usually base the security of communication on the arithmetic complexity.

    经典的保密通信系统通常把通信安全性建立计算复杂性基础上。

    youdao

  • Classic secret communication system employed at present usually base the security of communication on the arithmetic complexity.

    经典的保密通信系统通常把通信安全性建立计算复杂性基础上。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定