• Let's imagine that you live in a small home with a wireless security setup that offers a functional anti-jamming system.

    想象一下一间房子里,里面安装具有抗干扰功能无线安全装置。

    youdao

  • The security setup requires the Namespace ID.

    安全设置需要名称空间id

    youdao

  • Allow adequate time for security setup and validation.

    设置验证安全性保留足够时间

    youdao

  • Figure 3 shows the bind security setup between CICS and TXSeries regions.

    3显示CICSTXSeries区域之间绑定安全性设置

    youdao

  • I must stress that data encryption is only one of the tools in a comprehensive Internet security setup.

    必须强调数据加密只是英特网综合安全设置中的数据设置综合具。

    youdao

  • For example, executing the security setup command before the user has a web application does not make any sense.

    例如用户拥有Web应用程序之前执行security setup命令没有任何意义

    youdao

  • The architecture in Figure 1 provides an example of the security setup for CICS TS and TXSeries integration using IPIC (IP Connectivity) with SSL.

    1中的架构提供了一个面向CICSTSTXSeries集成安全设置示例使用了经ssl加密IPIC (ip连接)。

    youdao

  • For example, the security setup command, which installs Spring security into the project, is not visible until the project is a web application.

    例如security setup命令Spring security安装项目中,除非项目一个Web应用程序,否则它可见

    youdao

  • This is both a good and a bad thing because it simplifies the security setup scenario but also leaves you unable to practice the Principle of Least Privilege.

    这种方法简化安全设置场景但是这样一来无法使用最小特权原则了,因此方法既有优点也有缺点。

    youdao

  • It could be that a security setup that was acceptable several years ago when the queue manager was first defined is no longer consistent with your site security policy.

    可能出现下面的情况:一个安全性设置几年首次定义队列管理器合适的,但现在不再符合站点安全策略

    youdao

  • Before starting the file-based security setup process, you need to copy the user.props and groups.props text files to the Rational Asset Manager profile for your WebSphere Application Server.

    开始基于文件安全配置过程之前,需要user . propsgroups . props文本字段复制WebSphereApplicationServerRationalAssetManager配置档案中。

    youdao

  • This setup has a number of advantages, such as detailed resource management and security.

    设置具有大量优势比如详细资源管理安全性

    youdao

  • This article has also shown you configuration walk-through including environment setup and security enablement for process integration.

    本文介绍了配置全过程包括用于流程集成环境设置安全支持

    youdao

  • In addition, GVPE is also easy to setup and configure as a restartable and permanent service, while still retaining security.

    另外作为一个可重启永久服务GVPE容易设置配置同时仍然保持安全性

    youdao

  • Every organization requires a full-fledged mail client with rich features, security, and easy setup.

    每个组织都需要一个成熟电子邮件客户端,它提供了丰富功能安全安装简单

    youdao

  • File-realm-demo: Demonstrates how to setup security restrictions using a flat file of users and groups.

    file - realm - demo展示如何使用用户平面文件设置安全约束

    youdao

  • Depending on the setup of your MySQL server and its security Settings and passwords, your command might vary a bit.

    根据MySQL服务器设置及其安全设定口令命令可能略有不同。

    youdao

  • We are going to enable the security, finish the DataSource setup and finally deploy the EAR that we created.

    我们启用安全性完成DataSource设置并且最终部署我们所创建EAR

    youdao

  • Database security administrator (DBSECADM) is a new built-in role introduced to perform all security-related administration, including setup of the LBAC security infrastructure.

    数据库安全管理员(DBSECADM)一个新的内置角色用于执行所有安全相关管理包括LBAC安全基础设施的设置

    youdao

  • Permissions could not be properly configured for the Fax Operators security group. Run Setup again and choose to reinstall the Administration component.

    无法传真操作员安全正确配置权限。请再次运行安装程序选择重新安装管理组件

    youdao

  • The password above will not be encrypted during Setup. For maximum security, you may leave the password blank, and Setup will prompt you later for the password.

    以上密码安装期间不会得到加密为了安全可以不填密码,安装程序以后提示您填入密码。

    youdao

  • In the third one, the design model based on the sharing technology of the security resources is setup in order to improve the P2P security.

    第三部分提出了一种基于P 2 P安全资源共享提高P 2 P安全性设计模型

    youdao

  • For maximum security, you may leave the password blank, and Setup will prompt you later for the password.

    为了安全可以不填密码安装程序以后提示您填入密码。

    youdao

  • Most hosting providers does not support above setup. For security reason they stop networking as soon as they detect multiple MAC addresses.

    大多数托管服务提供商支持以上设置出于安全原因他们停止联网尽快为他们检测多个MAC地址

    youdao

  • Allows you to easily protect your desktop from entering your system setup and protect your desktop security.

    能够让容易保护桌面防止进入你的系统设置保护你的桌面安全。

    youdao

  • With professional communication user constantly requiring more quickly setup a call, more reliability and more security, Trunking system complexity and business functions constantly increase.

    随着专业通信用户对通信网络的接续时间、可靠性以及安全性要求不断提高,数字集群系统的系统复杂性也不断提高、业务功能不断增多。

    youdao

  • This paper introduces the network construction, the software setup, user management and authorize, and information security measurement.

    介绍系统的网络结构方案、软件调试设置、对用户管理授权信息安全措施

    youdao

  • Specifies setup information - environment, data, prerequisite tests, security access.

    指定条件信息-环境数据预置的条件测试安全入口等

    youdao

  • This paper mainly studies on the security and trusted status of a PC system, points out that we can setup a BIOS security subsystem to protect our PC.

    本文主要针对计算机系统安全性可信赖度进行了研究,提出利用BIOS实现系统的安全保护的观点。

    youdao

  • According to the characteristic of the CAN bus's effective support of the distributing real time control which have high security, this paper setup an ECU inspect equipment based on the CAN bus.

    根据CAN总线有效地支持具有很高安全等级分布实时控制特点建立基于CAN总线的ECU检测设备

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定