Compression Coding technology in the video communication is very sensitive to data distortion. Any distorted video datum will have an important influence on the quality of the videos.
视频通信中压缩编码技术对数据失真非常敏感,视频数据的任何失真,对视频质量都将产生重要的影响。
All too often breaches are caused by simple blunders, such as failing to separate systems containing sensitive data from those that do not need access to them.
很多情况下,破坏是由简单的失误造成的,比如未能将包含敏感数据的系统与不需要访问这些数据的系统分离开来。
If your database contains sensitive data, you might want to limit access to the catalog views, because the catalog describes every object in the database.
如果你的数据库包含敏感信息,您可能希望限制对编目视图的访问,因为编目描述了数据库中的每一个对象。
So you have to plan for the fact that these devices will be lost with sensitive data on them, and you need to protect that data.
因此你要正视这些存储有敏感机密数据的移动设备会丢失的事实,并且你需要去保护这些数据。
It also questions the responsibility of smartphone makers to protect the sensitive data that flows through their devices.
它还质疑智能手机制造商对经过他们设备的敏感数据的保护责任。
Sensitive data selected in a textual document representation is mapped to the graphical document representation.
选中的以文本文档表示中的敏感数据会映射到图形文档表示。
To ensure that sensitive data is protected, one best practice is to encrypt all sensitive data.
为了确保敏感数据得到保护,公认的最佳实践就是加密所有敏感数据。
If all of your data is sensitive, you might opt to choose the DATA_ENCRYPT authentication mode, which encrypts a lot of the data traveling between client and server.
如果所有数据都是敏感的,那么应该选择DATA_ENCRYPT身份验证模式,这种身份验证模式会对客户机和服务器之间传输的很多数据进行加密。
This avoids the risk of exposing sensitive data and it also allows common statements to be grouped.
这就避免了暴露敏感数据的风险,而且也允许把常见语句分组。
One way to protect sensitive data from attacks built on document transparency is to curtail the transparency by encrypting parts of XML documents.
一种保护在文档透明性基础上构建的敏感数据免受攻击的方法是通过加密部分 XML 文档来降低透明性。
Yet, regardless of the growth in remote users, just 27% of respondents say their companies currently use hard disk encryption to protect sensitive data on corporate endpoints.
但在被调查者中,除去正不断增多的远程用户,只有27%的人表示他们的公司目前使用了硬盘加密技术来保护企业终端的敏感数据。
As a best practice, consider using LBAC as a way to control access to sensitive data.
作为一项最佳实践,应考虑使用LBAC作为控制对敏感数据的访问的一种方法。
Sensitive data is also likely to require confidentiality (that is, encryption), and you must take care when you mash it with other sources to not put it at risk.
敏感数据也可能要求一定的机密性(即加密),我们必须要清楚何时将它们与其他资源集成在一起,而不会带来风险。
These two types differ in whether they're sensitive to changes made to the underlying data while the cursor is open.
这两种类型的不同之处是:它们在游标打开时对底层数据的变化是否敏感。
Mitigating this exposure usually means enforcing policies for data storage or implementing encryption software at the desktop level to protect sensitive data.
为了降低数据泄漏的风险,常常需要实施数据存储策略,或在桌面级使用加密软件保护敏感数据。
The best hope for a positive outcome is to promote clear principles that govern how these sensitive data are collected and put to work.
最乐观的结果是,这可能会推动清晰法则的产生,来管理这些敏感数据的收集方式及使用方式。
Use the key that was previously generated to encrypt the sensitive data within the SOAP message (symmetric encryption).
使用以前生成的密钥加密SOAP消息中的敏感数据(对称加密)。
Creating the new table to hold sensitive salary information and migrating data from the old table to this new one.
创建用于存放敏感薪水信息的新表,并将数据从旧表迁移到新表。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
In addition, the administrator role is required to access traditionally secure information (passwords, key files, etc.) to provide better protection to sensitive data.
另外,还要求管理员角色用传统的方式访问安全信息(密码、密钥文件等等)以更好地保护敏感数据。
How companies can turn privacy from threat to opportunity by giving sensitive consumer data to customers.
公司如何通过把客户的敏感资料提供给客户,然后把客户的隐私,这个公司的威胁转变成公司的机遇。
Label-based access control (LBAC), which provides new ways of controlling access to the sensitive data within the database.
基于标签的访问控制(LBAC),这为数据库中的敏感数据提供新的访问控制方法。
Executable processes can compose together several Web services, tie in business logic, and access sensitive data, to achieve business goals for the organization.
可执行流程可以与几个Web服务组合在一起(用业务逻辑连接),并访问敏感性数据,以实现组织的业务目标。
The last advice on protecting sensitive data is to avoid using immutable data types like String.
最后的建议是关于保护敏感数据的,就是要避免使用不可变的数据类型,比如string。
Reset to factory defaults - administrators can reset a device to its factory defaults in order to wipe sensitive data in case the device was stolen or lost.
恢复出场设置——管理员可以将设备重置为出场设置,这样就能在设备被偷或丢失后擦除上面的敏感数据了。
LulzSec also separately posted a message justifying its attack on Sony, saying the company's approach to handling sensitive data was "disgraceful and insecure".
LulzSec同时分别发布一条消息为它对索尼的攻击辩护,说这家公司控制敏感信息的方法是“丢脸和不安全的”。
As you'll see later, this can seriously damage network security allowing attackers to capture passwords and sensitive data.
正如您稍后将会看到的,这可能严重地损害网络安全性,使攻击者捕获密码和敏感数据。
A hacker could perform a memory dump at the right time and then gain access to this sensitive data.
黑客则会在适当的时刻,将内存中的信息转储出来,进而成功地访问这些敏感数据。
Usually when you want to send some sensitive data, you have two chances to secure the communication.
通常,在需要发送一些敏感数据时,可以通过两种方法来保护通信。
Access to data can now be controlled down to an individual cell of information, providing greater security for your critical data and sensitive customer information.
现今的资料存取控制可精细到个别资料格中的资讯,以便为重要资料及机密客户资讯,提供更严密的安全防护。
应用推荐