• The services are managed for identity and compliance through proper service-level security design and implementation.

    通过适当服务水平安全性设计实现对服务进行标识遵从性管理

    youdao

  • Roles assigned to users can be used in the design and implementation of custom security policies, as well as custom workflow and event escalation flows.

    分配用户角色可以定制安全策略设计实现中,以及定制的工作流事件升级流中。

    youdao

  • Application design and implementation: Actions that are taken by developers and designers during development that are crucial to security but might have little impact on the deployment process.

    应用程序设计实现开发人员和设计人员在开发期间所采取安全性至关紧要操作但是这些操作可能部署过程没有影响

    youdao

  • Active involvement in selecting technology standards, evaluating and selecting tools, macro and micro design, development, testing, implementation, reuse, and security aspects.

    积极参与选择技术标准评估挑选工具宏观微观设计开发测试实现重用以及安全方面等等

    youdao

  • Stay tuned for the upcoming articles in this series, which will continue to explore warehouse ETL process design and implementation, warehouse performance, security, and more.

    继续系列中的一篇文章其中继续探索仓库ETL过程设计实现、仓库性能安全性等。

    youdao

  • Design and implementation approaches for IKE protocols in the security VPN server are studied in this paper.

    研究了安全VPN服务器ike协议设计实现方法

    youdao

  • Finally, the design and implementation of security Ethernet chip based on SOPC are described in detail, which ensures the higher security and better control of networks.

    最后本文基于SOPC技术设计实现了一块安全以太网芯片,从根本上保证网络安全性可控性

    youdao

  • This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.

    课题现有网络通信技术数据库技术信息安全技术基础设计实现新型的安全即时通信系统。

    youdao

  • On the basis of the P2DR network security model, the paper discusses design and implementation of the Inner Network Behaviors Monitor & Audit System (for short NBAMS).

    本文P2DR(策略、防护、检测、响应)安全模型基础上,详细论述了内部网行为监管审计系统设计实现

    youdao

  • After introducing the architecture of J2ME and J2EE, we elaborate on the overall architecture and implementation of Mobile Bank. Finally, we discuss the security design.

    介绍J2MEJ2EE体系结构之后,阐述手机银行系统整体架构实现方案讨论了系统的安全性设计

    youdao

  • Finally, based on J2EE security framework, the design and implementation of the security management subsystem are given in detail.

    最后设计实现基于J2EE分布式安全框架网管系统的安全管理解决方案。

    youdao

  • The paper introduces the design methods and main functions of document issuance management system, corresponding security problems are proposed, and the implementation of security facility is focused.

    本文介绍开发办公行文自动化管理系统设计思想、主要功能,并说明相关安全问题强调了安全设施实现方法

    youdao

  • This paper focuses on the design and implementation of Metrological information system, and studied the security of this system.

    本文工作重点计量信息系统进行设计实现系统安全性进行研究。

    youdao

  • We mainly analyse design methodology, Transmission strategy and Access Control logic of Security Label. Then we present the design and implementation of Policy Configuration and Management platform.

    文章重点讨论了安全标签设计思想传输策略访问控制逻辑然后给出系统策略配置管理平台的设计和实现

    youdao

  • Secondly, the key techniques regarding to design and implementation of log-oriented security sensor (LOSS) are discussed, and the general solutions are suggested.

    其次,分析了设计实现日志安全传感器所需解决关键技术给出了初步解决方案。

    youdao

  • This article discusses the implementation methods of the house security system, and provides a design diagram.

    本文仅讨论其中家庭安全防范实现手段提供设计原理图供参考。

    youdao

  • In this thesis, the design and implementation of security strategies for data remanence in SRAM are comprehensively and thoroughly investigated.

    论文将全面深入地论述SRAM数据残留安全策略设计实现

    youdao

  • The core issue of this security scheme is the design and implementation of a secure and efficient key management algorithm which can protect network against attacks.

    安全模型核心问题需要设计安全和高效密钥管理算法来抵御攻击,保证网络的安全性。

    youdao

  • The core issue of this security scheme is the design and implementation of a secure and efficient key management algorithm which can protect network against attacks.

    安全模型核心问题需要设计安全和高效密钥管理算法来抵御攻击,保证网络的安全性。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定