• 如果自己IP地址那么我们就可以网络使用接入点本身这样做的安全要差一些,用于演示方面会有趣

    If it has its own IP address, we can use the access point itself over the network; this is less secure, but more fun to use for a demo.

    youdao

  • 黄色稳定自发颜色所以如果暗示稳定性安全应避免使用黄色。

    Yellow is an unstable and spontaneous color, so avoid using yellow if you want to suggest stability and safety.

    youdao

  • 无论如何这项研究提供信息评估手机使用安全中具有巨大的价值

    However, this study provides information that will be of great value in assessing the safety of cell phone use.

    youdao

  • 这样设置免除连接安全使用非常小心或者根本不要使用。

    A setting like this, which exempts a connection from security, should be used with great caution, or not at all.

    youdao

  • 材料之间结合决定了电池的特性包括能量功率密度以及安全使用寿命和成本。

    The combination of materials determines the characteristics of the battery, including its energy and power density, safety, longevity and cost.

    youdao

  • 我们示例中,人工任务没有使用安全允许任何人请求执行任务。

    In our example, the human task does not use security and allows anyone to claim or work on the task.

    youdao

  • 这些运行时环境应该配置使用全局安全而且应该配置为通过相同LTPA密钥进行LTPA身份验证

    These runtime environments should be configured to use global security, and they should be configured to use LTPA authentication with the same LTPA key.

    youdao

  • 链接安全使用中时,所有请求获得一个链接用户ID定义授权

    When link security is in use, all requests are given an authority defined by the link user ID.

    youdao

  • 总之安全方面优势使用多个卷的重要原因之一。

    Taken together, the safety advantages of volumes constitute a powerful reason for using multiple volumes.

    youdao

  • 本文样例中,使用传输安全否则密码处于明文形式。

    In the sample, you used transport level security because the password would otherwise be in clear text.

    youdao

  • 生成使用传输安全密钥时,会出现两个问题

    When generating keys for use with transport security, two issues arise.

    youdao

  • 部署过程中,将检查消息使用安全配置文件是否存在

    During the deployment process, the existence of the security profiles used in the message flows is checked.

    youdao

  • 这个总线操作系统后台进程使用安全非常好,以使得任意应用程序不能欺骗系统事件。

    This bus is used by the operating system and daemons and is tightly secured so that arbitrary applications cannot spoof system events.

    youdao

  • 大量对于使用者其他公路使用者安全测试令人生畏的。

    The amount of safety testing for both the occupants and other road users is formidable.

    youdao

  • 可以配置数据源使用集成安全以便可以使用当前用户帐户进行数据库连接

    Data sources can be configured to use integrated security so that database connections are made using the current user's account.

    youdao

  • 提高安全明智做法是使用多种保护方法(称为深度防御”)。

    To improve security, it's often wise to use more than one method of protection (also called "defense in depth").

    youdao

  • 使用属于全局安全所用注册表任何用户ID进行身份验证

    Authenticate using any user ID that is part of the registry used for global security.

    youdao

  • 研究者评估这些其他精神类药物儿童青少年使用的安全有效性问题。

    Researchers are evaluating the safety and efficacy of these and other psychotropic medications in children and adolescents.

    youdao

  • 必须启用全程安全才能够使用特性

    End-to-end security must be enabled to use this feature.

    youdao

  • 讨论JACC带来利弊我们考虑如何将这种关系映射标准J2EE安全以及JACC使用

    Let us consider how this maps to standard J2EE security, and then to JACC usage before we look at the trade-offs that come with JACC.

    youdao

  • 而从 8.2开始以上每种情况可以使用安全插件

    Starting with Version 8.2, security plug-ins can be used in each of these situations.

    youdao

  • 默认情况下,全局安全使用本地操作系统用户注册表进行身份验证

    By default, global security USES the local operating system user registry for authentication.

    youdao

  • 使用安全插件优点

    Advantages of using security plug-ins.

    youdao

  • 使用安全插件的常见问题

    Common problems working with security plug-ins.

    youdao

  • 我们使用以下安全配置运行测试

    The tests were run using each of the following security configurations.

    youdao

  • 默认情况下,DB 2附带安全插件使用以下身份验证机制执行身份验证。

    By default, DB2 ships with security plug-ins that perform authentication using the following authentication mechanisms.

    youdao

  • 为了使安全最大化,应该使用加密链接

    To maximize security, use encrypted links.

    youdao

  • EAR部署描述符创建安全角色使用RoleMapping按钮

    To create the security roles in the EAR deployment descriptor, use the role Mapping button.

    youdao

  • 本文所述安全技术非常的简单所以 Acegi使用这些技术实现安全性。

    The security technique described in this article is fairly simple, and so are the Acegi facilities used to implement it.

    youdao

  • 本文所述安全技术非常的简单所以 Acegi使用这些技术实现安全性。

    The security technique described in this article is fairly simple, and so are the Acegi facilities used to implement it.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定