对于binding . ws或WSDL指定的端点,请输入与CustomHttpEndpoints文本框中的输入相同的基础uri信息(协议、主机和端口)。
For binding.ws or WSDL-specified endpoints, enter the same base URI information (protocol, host, and port) that you entered in the Custom Http endpoints text box.
SOA借用了网络管理和IT基础设施管理等其他信息技术领域的一些概念,比如策略、服务水平协议和服务质量。
SOA borrows concepts such as Policy, service Level Agreement and Quality of service from other aspects of Information Technology such as network management and managing it infrastructure.
正是在这些案例中,协议必须完全透明,使民众能够在获得完整信息的基础上形成自己的判断。
It is precisely in these cases that the agreements must be fully transparent so that citizens can form their own judgment on the basis of full information.
大多数服务器协议是一个包,这个包的基础是第一个X位的描述头,它包含了完整包的长度等详细信息。
The most common server protocol is a packet based protocol where the first X bytes represent a header and the header contains details of the length of the complete packet.
Git也有一个定制的有状态的支持更快的信息交换的协议,但是这和Google的基础建设不太匹配。
Git also has a custom stateful protocol that supports much faster exchanges of information, but this is not a good match for Google infrastructure.
缺乏上下文或国家信息使之不能把包过滤用于数据包为基础的协议,如文件传送协议。
Lack of context or state information makes it impossible to use packet - filters for datagram-based protocols such as File Transfer protocol.
缺乏上下文或国家信息使之不能把包过滤用于数据包为基础的协议,如文件传送协议。
Lack of context or state information makes it impossible to use packet-filters for datagram-based protocols such as File Transfer protocol.
本文主要在掌握了一定的数据加密与信息安全、身份认证等知识的基础上,对EKE协议和CAPTCHA作了较为深入的研究。
This paper deeply researches on EKE protocol and CAPTCHA on the base of the knowledge of Data Encryption and Information Security.
以PK I技术为基础,应用ssl协议,研究PK I技术在保障网络信息传输安全上的应用。
In this paper, using SSL protocol we mainly research on the application of PKI in information security on network.
信息安全主要是由安全协议和密码算法组成,其中密码算法是信息安全的基础和核心技术。
Information security is composed of security protocol and cryptographic algorithm, the latter is the base and core.
本文在深入理解HTTP协议规范的工作流程基础上提出并实现了一种新型的实时查找并取证网络上存在的非法网站和有害信息的系统—“非法互联网网站及服务实时监管取证系统”。
In this article, a design of a real-time monitoring and controlling forensics system of illegal website and its services has been proposed on the basis of understanding working flow the HTTP.
首先,论文对SNMP的基础理论作了必要介绍,包括管理信息结构,管理信息库以及协议操作过程。
In the first place, the paper introduces some knowledge about SNMP, include SMI (Structure of Management Information), MIB (Management Information Base) and protocol operations.
信息安全主要是由安全协议和密码算法两方面组成,其中密码算法是信息安全的基础和核心技术。
Information security mainly consists of security protocols and cryptographic algorithm. Cryptographic algorithm is the basis and key technology of the information security.
简单网络管理协议(SNMP)及其管理信息库(MIB)结构和功能将在本课程的网络管理基础部分讲述。
The Simple Network Management Protocol (SNMP) and its Management Information Base (MIB) structure and function are described in this foundation session for Network Management.
简单网络管理协议(SNMP)及其管理信息库(MIB)结构和功能将在本课程的网络管理基础部分讲述。
The Simple Network Management Protocol (SNMP) and its Management Information Base (MIB) structure and function are described in this foundation session for Network Management.
应用推荐