go top

access security

  • 接入安全
  • 访问安全
  • 通道防卫

网络释义专业释义

  通道防卫

... access lift通道电梯 access security通道防卫 access switch通道开关,维修用开关access way进出通道 ...

基于136个网页-相关网页

  存取安全

access security 存取安全; 存取保密; 通道防卫; 通路安全..

基于18个网页-相关网页

短语

code access security 代码访问安全 ; 代码访问安全性 ; 安全性

data access security 数据存取安全性 ; 数据存取保全

Network Access Security 存取安全

Code Access Security Policy 代码访问安全策略

Cloud Access Security Brokers 云端访问安全代理服务 ; 云安全访问代理

Cross-Domain Data Access Security Issues 交叉域数据访问安全

Site Access Security Management 会场通道安全管理

database access security [计] 数据库存取安全性

resource access security 资源存取安全性

 更多收起网络短语
  • 接入安全 - 引用次数:11

    The content of this paper contains the relevant technique of access security, authentication, intrusion tolerance and so on.

    本文的研究内容涵盖了身份认证、入侵容忍等接入安全相关技术。

    参考来源 - 空间信息网络接入安全技术仿真研究
  • 通道防卫

·2,447,543篇论文数据,部分数据来源于NoteExpress

双语例句原声例句权威例句

  • You can also take advantage of the code access security that's built into the CLR.

    可利用内在 CLR 中的代码访问安全性

    youdao

  • This has not always been an easy job, especially when data and access security was at stake.

    不是件简单的事情尤其是数据访问安全处于危险境地时。

    youdao

  • Provide data governance capabilities to enforce and audit both transaction and data access security.

    提供数据治理功能实现审计事务数据访问安全

    youdao

更多双语例句
  • The UAE says the services are a threat to national security because government officials cannot access or monitor users' information.

    VOA: special.2010.08.06

  • The eyewitness says the two vehicles first attempted to enter through the airport, but were refused access by security guards.

    VOA: standard.2009.09.17

  • Despite the fact that many have been living in Lebanon for generations, they are still refugees, and as such are forced to live in squalid camps, are denied access to the state's social security, health-care or education systems, and can only work in menial jobs.

    VOA: standard.2010.06.29

  • The PTCO allowed DIR and the pilot agencies to a gain a greater understanding of cloud infrastructure offerings for state government and document options and issues with provider selection, pricing, access security, data security, credentialing, provisioning time frames, service levels, service remedy options, terms of use, billing models, interoperability, mobility, scalability, capacity management, provider compliance, and monitoring and licensing.

    FORBES: Cloud Management Broker: The Next Wave In Cloud Computing

  • In security, IBM offers Security Access Manager and Security End Point Manager which offer context-based security.

    FORBES: IBM Takes Mobile To The Road With Tools & Strategy

  • Similarly, the U.S. government should refrain from granting those like CAIR access to security-sensitive facilities and operations.

    CENTERFORSECURITYPOLICY: War on the Home Front

更多权威例句
$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定