An SOA team, however, should not fear that compliance will be compromised by using a less-known product or framework.
但是,一个SOA团队不应该害怕使用一种不知名的产品或者框架,将会损害一致性。
She said the ability to study, play sport, work and even enjoy a social life could be compromised by migraine symptoms.
她指出学习能力、体育运动、工作以及享受社会生活都必须让步与偏头痛。
Even operations that have been successfully qualified can be compromised by poor operational, maintenance, or personnel practices.
即使是经过成功确认的操作也可能会由于不良操作、维护或人员做法而有问题。
Most troubling of all, Botezatu predicts that unsecured XP machines of all kinds will be compromised by hackers to form new botnets.
博泰扎图认为,最令人担忧的是,各种不安全的XP电脑可能会被黑客改造成新的僵尸网络。
Conclusion: Bonding to sclerotic dentin is different from sound dentin, and may be compromised by the fewer resin tags and communications.
结论:硬化牙本质的粘接特性与正常牙本质存在差异。树脂突的数量及交通枝不足是硬化牙本质粘接强度受限的可能因素。
Quality cannot get mixed up with other bargaining and be compromised by the usual adversarial relationship between workers and management.
谈判混为一谈,也不能由于 劳资 双方通常的敌对关系而受到影响。
FOS1 function in japonica appears to be compromised by a functional nucleotide polymorphism (FNP) at the putative processing site of the signal peptide.
位于信号肽加工位点的一个功能性核苷酸多态性(FNP)可能影响了FOS1在粳稻中的功能。
Facebook accounts can be compromised by an attacker who might steal this information from another site-or guess it by trying many combinations in succession (a so-called brute-force attack).
Facebook的账户可以被黑客破解,通常黑客可能从其他网站盗取或是通过尝试很多种组合(所谓的强力攻击)来猜测这些登录信息。
Useful information could be abstracted from audit log of computers by most of host-based intrusion detection systems. Therefore, audit system become a target to be compromised by hackers or attackers.
审计日志是多种入侵检测系统的重要信息来源,因而审计系统就成为黑客或攻击者对付的主要目标。
Should an ID become compromised, a new public key can be generated by the creation of a new ID, locking the old ID out of the system.
如果一个ID存在安全危险,那么应该通过创建一个新的ID生成一个新的公钥,在系统中锁定老的ID。
He added that the problem could be compounded by the fact that many companies' risk management strategies will have been compromised by downsizing in the aftermath of the financial crisis.
他补充称,许多企业在金融危机之后缩减规模,这将影响到企业的风险管理战略,从而可能让问题更加复杂。
An organization's data is always secure and is less apt to be stolen or compromised by others.
组织的数据总是安全的,别人很难窃取或破坏数据。
This kind of safety can be provided to applications even if their operating system is fundamentally compromised by malware.
即使安装应用程序的操作系统从根本上已经被黑客软件所劫持,此类的安全措施仍能被加载于运用程序上。
By providing strong, standards-based encryption and integrity algorithms, SSL provides system developers and users with confidence that data will not be compromised in the Internet.
通过提供强大的、基于标准的加密和完整性算法,ssl向系统开发人员和用户保证数据在Internet上不会受到危害。
A botnet is a network of compromised machines that can be remotely controlled by an attacker.
僵尸网络是一个可以由攻击者远程控制的已被攻陷主机组成的网络。
By separating processes for each content instance, if one TAB were to crash, the entire session would not be compromised.
为每个内容标签页分配一个进程,如果某个标签页崩溃了,整个会话窗口不会受到影响。
When the private key of a ca is compromised, all the certificates issued by that ca should be revoked.
CA的私有密钥一旦泄露,该CA签发的所有证书就只能全部作废。
When the private key of a ca is compromised, all the certificates that are issued by this ca would be revoked.
CA的私有密钥一旦泄露,它所签发的所有证书将全部作废。
It is the foundation of entire ca field safety that protection private key do not reveal. When the private key of a ca is compromised, all the certificates by that ca should be revoked.
保护私钥不泄露是整个CA域的安全基础,CA的私有密钥一旦泄露,该CA签发的所有证书就只能全部作废。
It is the foundation of entire ca field safety that protection private key do not reveal. When the private key of a ca is compromised, all the certificates by that ca should be revoked.
保护私钥不泄露是整个CA域的安全基础,CA的私有密钥一旦泄露,该CA签发的所有证书就只能全部作废。
应用推荐