• It can be hard to identify which parcels are carrying crucial items such as Social Security checks, but USPS and UPS try their best to prioritize sensitive material.

    虽然很难辨别哪些包裹里装的社会保障支票重要物品美国邮政(USPS)联合包裹服务公司(UPS)会其所优先处理敏感材料

    youdao

  • Identify whether it security can be implemented in all application tiers.

    确认IT安全是否可以所有应用程序实现

    youdao

  • Identify issues to Teams that they might overlook, such as scalability, performance, security, etc.

    识别出团队可能忽略问题比如可伸缩性性能安全性等等

    youdao

  • Security experts are deploying a new worldwide system to identify Internet addresses that will make it very difficult to forge or spoof a Web site.

    安全专家正在部署一个新的全球系统系统能鉴定互联网地址使网站伪造欺骗变得更加困难

    youdao

  • Security experts are deploying a new worldwide system to identify Internet addresses that will make it very difficult to forge or spoof a Web site.

    安全专家正在部署一个新的全球系统系统能鉴定互联网地址使网站伪造欺骗变得更加困难

    youdao

  • For example, the implementer could retrieve the requestor's user id from the security context on each request and use that to identify the target calculator total.

    例如实现人员可以每个请求中的安全性上下文里检索请求用户ID使用确定目标计算器总数

    youdao

  • There's actually an international standard that you can use to formally identify security requirements and determine if they are met.

    事实上可以使用一个国际标准正式确定安全性需求确定它们是否满足要求

    youdao

  • The Guardian reported earlier this month that former SAS soldiers and other western employees of private security companies are helping Nato identify targets in the Libyan port city of Misrata.

    卫报本月早些时候SAS士兵一些私营保安公司西方雇员帮助北约识别利比亚港口城市米苏拉目标

    youdao

  • Identify your security requirements.

    确定安全性需求

    youdao

  • Once you know your program's security objectives, you can identify the security requirements by filling in more detail.

    一旦知道程序安全性目标可以通过详细填充其内容来确定安全性需求

    youdao

  • Identify your security objectives.

    确定安全性目标

    youdao

  • This information is used to help identify potential security "holes" that may be weak points for attacks against customers.

    这些信息用于帮助发现潜在安全漏洞”,此类弱点可能利用客户发起攻击

    youdao

  • Usually, as you identify your security objectives, you'll find that there are some things your program just can't do on its own.

    通常确定安全性目标时,您的程序自己不能完成某些事情

    youdao

  • The primary security duty of a requirements specifier is to identify at a high level the core security model for the application.

    需求主要安全责任应用程序定义一个水平核心安全模型

    youdao

  • This approach interacts with a running instance of the application, effectively attempting to perform light hacks (mostly harmless) to identify security holes.

    这种方法与这个应用程序运行实例相互影响,从而有效地执行轻度攻击(绝大多数是无害的)检查安全漏洞。

    youdao

  • Passengers will have to drink bottled water and other beverages they carry into the subway if security machines and police dogs could not identify them.

    乘客随身携带的瓶装饮料无法被识别,需当场饮用后才可通过。

    youdao

  • Security officials with the Israeli airline el al already spend a long time questioning passengers in order to identify behavioural traits that mark them out as dangerous.

    以色列航空公司ElAl安全官员为了识别出让他们显得危险的行为特征,他们已经好长时间询问乘客

    youdao

  • You need to do this because the WS-Security specification allows attaching multiple tokens for authentication, thus additional metadata is required to identify which is the primary security token.

    这样原因是因为WS - Security规范允许身份验证附加多个,这样就需要更多元数据识别哪一个安全令牌。

    youdao

  • An example of this pattern would be to identify all variables that are declared public and flag them as potential security problems.

    模式一种范例识别所有声明为public变量它们标记安全性问题

    youdao

  • The Isolator USES a control field in the input to identify the customer tenant and applies the relevant security and partition logic to store in the correct place.

    Isolator输入中指定一个控制确定使用客户应用相关安全性分区逻辑将它存储正确位置

    youdao

  • Better security and lower risk by enabling an organization to identify and authenticate a user once, and then use that identity information across multiple systems, including external partners.

    支持组织识别验证用户一次然后多个系统(包括外部合作伙伴)使用那个身份信息,从而提高安全性降低风险

    youdao

  • Once you know what your environment is, you can identify your security objectives, which are basically high-level requirements. Typical security objectives cover areas such as.

    一旦知道了身处什么环境;就可以确定安全性目标它们基本上高级需求

    youdao

  • ArcSight, a maker of software that is used to identify suspicious activity on a corporate network, may help HP better incorporate security features into other products.

    ArcSight一家生产鉴别公司网络可疑行为软件生产商,将会有助于惠普更好安全特性整合其他产品中。

    youdao

  • Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.

    漏洞攻击扫描有助于识别操作系统LotusDomino配置潜在安全漏洞

    youdao

  • As an acknowledgement of the importance of security, we provide an "Identify security Patterns" task that ensures the level of security required by the system.

    为了认识安全重要性我们提供了一个Identify SecurityPatterns任务,它可以保证系统所需要安全级别

    youdao

  • Such ploys can make it hard to identify exactly who is behind a particular online assault, says Adam Vincent of Cyber Squared, another security firm.

    来自另一家网络安全公司CyberSquaredAdamVincent,这样(僵尸网络的)形式的攻击真的很难定位某次入侵的幕后真凶

    youdao

  • 'With just four attempts he was also able to identify the first five digits of the test subjects' social security Numbers, potentially a goldmine for id thieves.

    仅仅经过了4次尝试就成功鉴别出实验对象社保号码。这对于ID小偷来讲可是一个金矿

    youdao

  • 'With just four attempts he was also able to identify the first five digits of the test subjects' social security Numbers, potentially a goldmine for id thieves.

    仅仅经过了4次尝试就成功鉴别出实验对象社保号码。这对于ID小偷来讲可是一个金矿

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定