Security transparency separates code that runs as part of the application from code that runs as part of the infrastructure.
安全透明度可将作为应用程序的一部分运行的代码与作为基础结构的一部分运行的代码分离。
And I will focus on two broad areas: first, issues relating to guantanamo and our detention policy; second, issues relating to security and transparency.
我将以两大问题为重点:首先,涉及关塔纳摩监狱和我们的关押政策的问题;其次,涉及安全与透明度的问题。
The increased transparency of XML data requires an increased transparency of application processing workflow in order to mitigate problems from security to state control.
XML数据所带来的透明性要求应用程序的处理工作流的透明性也相应增加,从而减少从安全性到状态控制方面的问题。
"Huawei has transparency problems" said James A.Lewis a cyber-security expert at the Center for Strategic and International Studies in Washington.
华盛顿战略和国际研究中心的网络安全专家詹姆斯•a•刘易斯说:“华为存在透明度问题。”
"Huawei has transparency problems" said James A. Lewis a cyber-security expert at the Center for Strategic and International Studies in Washington.
华盛顿战略和国际研究中心的网络安全专家詹姆斯•a•刘易斯说:“华为存在透明度问题。”
"Huawei has transparency problems," said James A. Lewis, a cyber-security expert at the Center for Strategic and International Studies in Washington.
华盛顿战略和国际研究中心的网络安全专家詹姆斯•a•刘易斯说:“华为存在透明度问题。”
Indeed, full transparency is often associated with breaches to established rights such as privacy, confidentiality, security and safety.
其实,每每提到完全透明人们往往想起这是对既有权利——隐私、机密、安全——的侵犯。
In all, the pipeline approach doesn't hide from the transparency of XML data, hoping to shrug off security problems.
总之,管道方法不隐藏XML数据的透明性,而是试图摆脱安全性问题。
Pipeline architecture can be an important tool in managing security issues from XML's transparency.
管道架构在管理XML透明性所带来的问题时是一种重要的工具。
The director said Chinese companies can improve transparency on information security and give foreign markets more confidence in their products.
何茂春说,中国公司应当提高自身在信息安全方面的透明度,增强外国市场对于其产品的信心。
Meanwhile, the Security Council has made considerable progress in reforming its working methods, with the aim of enhancing transparency.
同时,安全理事会以提高透明度为目的,在改进工作方法方面取得了很大进展。
Furthermore, the topic about optimized AES is proposed to satisfy the encryption demand of real-time, field and transparency, such as audio and video data flow in the field of information security.
本文简要阐述了AES算法,并为适应信息安全领域中音视频高速数据流所需的实时、现场和透明加密的要求,探讨了AES算法的优化问题。
The other one is to analyze Address Resolution Protocol (ARP) and implement the transparency of the security and encryption route platform to the original network structure by ARP cheat technology.
其二,分析ARP协议的实现细节,采用ARP欺骗技术实现安全加密路由平台对原有网络结构的彻底透明。
What are the boundaries of transparency - are they privacy, security, or the ability to quietly ponder tough decisions, or should there be none at all?
什么是透明的界限-他们的隐私,安全,或静静地思考的能力,艰难的决定,还是应该有没有呢?
A utilizable Digital watermark system should own good Robustness, security, transparency.
一个有效的水印体系必需具备较强的鲁棒性、安全性和透明性。
This is not a security issue, but rather an issue with project file clarity and transparency.
这不是安全问题,而是项目文件的清晰度和透明度的问题。
In the container transportation, RFID significantly enhance the transparency and security of the transportation process of transportation, and this promotes the supply chain management.
在集装箱运输上,RFID显著的提高了运输过程的透明度和安全性,使得供应链管理的思想得到进一步的推广。
A quantitative risk assessment is needed for each quarantine insect pest to ensure quarantine security without sacrificing the transparency of international trade.
为了保证检疫的安全性而又不失国际贸易的透明度,需要对检疫害虫进行定量的风险评估。
Now, let me touch on a second set of issues that relate to security and transparency.
我要谈的第二个方面的问题涉及安全和透明度。
This lecture will talk about issues on transparency & security markets, how we should think about information and risk management, advantages and limitations.
此次讲座将探讨债券市场的透明性等问题,如何管理信息和风险,各自的优势和劣势又是什么等问题。
When you use Level 1 transparency, you are using a security model that separates code into security-transparent, security-safe-critical, and security-critical methods.
使用1级透明度时,您会使用一种安全模型,该模型将代码分成三类方法:安全透明的方法、安全可靠关键的方法和安全关键的方法。
When you use Level 1 transparency, you are using a security model that separates code into security-transparent, security-safe-critical, and security-critical methods.
使用1级透明度时,您会使用一种安全模型,该模型将代码分成三类方法:安全透明的方法、安全可靠关键的方法和安全关键的方法。
应用推荐