This is the fundamental concept behind the privilege-separation security technique employed by qmail.
这就是被qmail使用的在其基础概念之后的权限分离安全技术。
Therefore it's necessary to use effective network security technique to detect and prevent such kind of attack.
因此,必须采取有效的网络安全措施来发现和防止网络攻击行为。
The security technique described in this article is fairly simple, and so are the Acegi facilities used to implement it.
本文所述的安全技术非常的简单,所以 Acegi使用这些技术实现安全性。
The research of external concrete sidewall security technique in extra-thickness clay blanket is also gived in this paper.
进行了过特厚粘土地层外层混凝土井壁施工安全技术研究。
Cryptography is the core domain in the information security technique. It provides many algorithms and protocols to meet practical need.
密码学作为信息安全技术的核心领域,提供了多种密码算法与应用协议以满足人们实际应用的需要。
The network information security technique commonly includes authentication, authorization, audit, data privacy, data integrity and so on.
网络信息安全技术一般包括身份认证、授权控制、审计、数据保密和数据完整性等几个方面。
Through analysing apparel electronic-commerce security technique, a systematic structure and ways used of it in network security are educed in this paper.
探讨服装电子商务的安全技术问题,得出了服装电子商务的网络安全的体系结构及其使用方法。
Based on the demand status of the information resource, analyses the network information security technique and the current status of authentication system.
就信息资源保护的需求现状,分析了当前网络信息安全通常采用的技术以及身份验证技术现状。
Therefore, the research of Internet security technique has been one of focuses in the communication and an important research area of the information science.
因此,网络安全技术的研究已成为现在计算机和通信界的一个热点,并且成为现在信息科学的一个重要研究领域。
Traditional security technique base on protection basically, but protection technique can only stop attack attempt to the best of its ability and leave this process.
传统的安全技术都基本上立足于防护,但是防护技术只能做到尽量阻止攻击企图的得逞和延缓这个过程,而不能阻止各种入侵行为的发生。
The article defines security, safety degree and safety Protocol Suite of Mobile Grid Services and proposes a new Mobile Grid Services security frame based on XML security technique.
定义了移动网格服务的安全性、安全级别及安全协议簇,给出了一种利用XML安全技术确保移动网格服务安全的新架构。
Since the situation of information security becomes increasingly severe, any single security technique or product cannot completely meet the requirements of users for the network security.
在信息安全日益严峻的形势下,单一的安全技术和产品已经不能完全满足用户的网络安全。
This technique improved the security by separating the user information from the password data.
这项技术通过将用户信息与密码数据分离而提高了安全性。
This technique lets you can develop your JSF applications without considering security issues.
使用这项技术,可以在不用考虑安全问题的情况下开发JSF应用程序。
This is probably the most widely used technique for signing or encrypting messages with WS-Security, and it does have some advantages.
这是使用WS - Security进行消息签名或加密中最广泛使用的技术,而且它有一些优势。
The callback technique lets you use any verification technique you want as an extension of the Rampart security handling.
回调技术可以让您使用任何检查技巧来扩展Rampart安全处理。
Host security is becoming an urgent problem that every computer user has to face. Host hole scanning technique is an important security technology to provide security guarantee for host.
主机安全正成为每一个计算机用户都面临的紧迫问题,主机漏洞扫描技术就是为主机安全提供保证的一项重要的安全技术。
An digital image watermark algorithm is proposed based on the synergetic neural network, combined with encryption technique, to guarantee its robustness and security.
为保证图像数字水印的鲁棒性和安全性,结合加密技术,提出了一种使用协同神经网络的图像数字水印算法。
Firstly, this method USES the continuation power flow (CPF) technique and both of static security and transient stability constraints are considered.
算法采用连续潮流(CPF)技术并考虑了系统的静态安全约束和暂态稳定约束。
The author introduce the structure, function, feature, main technique parameters and system operation condition of the main dam security monitor system of the Chengbihe reservoir.
介绍澄碧河水库大坝安全监测系统的结构、功能、特点,主要技术参数及系统运行情况;
Intrusion detection technique, which as a kind of solution of protecting network security, has been paid more and more attention by people.
入侵检测技术作为保护网络安全的一种解决方案,越来越受到人们的重视。
The SAR technique allows one to capture both sides of the market as the security fluctuates up and down over time.
特区技术允许一个捕捉双方市场的安全上下波动一段时间。
The category of the digital watermarking technique belongs to the information security area.
数字水印技术属于信息安全的范畴。
As a sort of security mechanism, Role Based Access Control (RBAC) technique has been one of the hotspots in current research.
基于角色的访问控制(RBAC)作为一种安全机制,是当前研究的热点之一。
Digital signature is an important technique in security field, and blind digital signature differs from traditional signature in characteristics, which make it possible to apply electronic vote.
数字签名是安全领域中的一项重要技术,盲签名有着与传统签名不同的特性,这使得电子投票的应用成为可能。
Whether power network is rational or not is coming into being the long influence to technique capability, economy benefit, security, high quality and running.
电网结构合理与否,对电网的技术性能和经济效益以及安全、优质、经济、高效运行将产生长期的影响。
The key technique includes remote cooperation frame, database security coding and so on.
关键技术涉及远程协作网架构、数据库安全保密等。
The key technique includes remote cooperation frame, database security coding and so on.
关键技术涉及远程协作网架构、数据库安全保密等。
应用推荐