• These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    youdao

  • Specific functionality I am looking for includes a real-time network-wide view, security, accountability, configuration management, and scalability.

    所需要具体功能包括整个网络内实时视图安全性可说明性配置管理可扩展性

    youdao

  • System administration covering topics such as user management, printer configuration, X11, package management, building a kernel, system initialization, and security.

    系统管理包括用户管理打印机配置X11管理、建立内核、系统初始安全主题

    youdao

  • Configuration management begins with well-tested and documented security baselines for your various systems.

    配置管理开始充分测试记录安全基线各种制度

    youdao

  • This article analyses the hardware and software configuration for this Information Security Laboratory and its operation management.

    本文探讨了信息安全实验室各部分硬件软件配置运行管理等问题。

    youdao

  • ISO has defined the five functions of network management: performance management, accounting mangment, security mangment, configuration mangment and fault mangment and they have been widely accepted.

    ISO定义网络管理五大功能性能管理,计费管理,安全管理,配置管理,故障管理,广泛接受。

    youdao

  • Absrtact: TMN includes configuration management, performance management, fault management, security management and system tools.

    摘要:电信管理TMN包括配置管理性能管理、告警管理、安全管理以及系统工具等模块。

    youdao

  • Enterprise networks must be monitored for performance. configuration, security. accounting and fault management. Current management practices typically involve the use of complex.

    计算机论文-现在企业需要有一个系统来监视企业网工作性能、配置安全和错误的统计以及错误的管理

    youdao

  • We mainly analyse design methodology, Transmission strategy and Access Control logic of Security Label. Then we present the design and implementation of Policy Configuration and Management platform.

    文章重点讨论了安全标签设计思想传输策略访问控制逻辑然后给出系统策略配置管理平台的设计和实现

    youdao

  • We mainly analyse design methodology, Transmission strategy and Access Control logic of Security Label. Then we present the design and implementation of Policy Configuration and Management platform.

    文章重点讨论了安全标签设计思想传输策略访问控制逻辑然后给出系统策略配置管理平台的设计和实现

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定