For more precise security control, you should.
要获取更精确的安全控制,您应该。
The costs must not exceed the benefits of a security control.
付出的成本绝对不能超过安全控制所带来的优势。
It solves the problems of function extension and security control.
解决了功能扩展与安全控制的实现问题。
If the costs are high, you may need to change the security control for less money.
如果成本太高的话,可能需要改变安全控制来节省资金。
It is imperative to strengthen the security control over the accounting by EDP.
加强会计电算化系统的安全管理势在必行。
Meanwhile another Iraqi province has been handed over to local security control.
同时,又一个伊拉克的省被移交给当地防卫部门控制。
The process actually helps in terms of security control and resource management.
这个过程实际上有助于在安全方面的控制和资源管理。
Duty Manager is responsible for the security control of the hotel keys whilst on duty.
在当班时,值班经理根据安全需要负责控制酒店的钥匙。
Security control is a key technique problem of finance computerizing information system.
安全性控制是金融电子化信息系统的技术关键。
Security Control is an important means to ensure Information Resource Sharing System running in gear.
安全控制是保障信息资源共享系统正常运行的重要手段。
It is a security control for a cement factory which use the alarm and control instrument of jetting and falling.
单片机用于水泥厂机立窑喷窑、塌窑报警控制,能有效地保证水泥厂立窑窑面操作工的生命安全。
The recent leakage of personal data on credit CARDS in USA serves as a warning to payment system security control.
近日美国信用卡个人数据信息泄露事件,为支付系统安全控制敲响了警钟。
Aim: To explore the effect of radio frequency identification (RFID) technology used in the area of drug security control.
前言:目的:探讨无线射频识别技术在药品安全监管领域的应用与作用。
Because of the distribution of peer in P2P system, concentrative security control method is difficult to work efficiently.
由于P2 P系统节点的分布性,集中式的安全控制方式难以有效使用。
The critical techniques such as data processing, design of reviewing algorithm and security control strategy are discussed.
讨论了系统的关键技术,包括数据的处理、阅卷算法的设计和安全控制策略等。
It made information system, from access system to operate database and sign badge, all these things under security control.
使该所信息系统从用户访问系统,到操作数据库与具体实现签章等工作,都处在系统安全控制之下。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
And then, security control of platform is introduced which include data encrypting, access control and other security control means.
然后介绍了平台的安全控制方法:数据加密、访问控制和其他安全控制方法。
Separate the areas in the element security control cube by target area definitions and by IF statements according to the business logic you need.
根据您需要的业务逻辑,按照目标区域定义和IF 语句分离元素安全性控制多维数据集中的区域。
The thesis emphasizes the significance of the security control in the construction works, and stresses the key points of the security control work.
在建筑施工中安全控制工作意义重大,重点阐述安全控制工作的要点。
Strengthening information systems security control to protect key customers and our company's information confidentiality, integrity and availability.
强化资讯系统之安全控管措施,保护重要客户及本公司资料之机密性、完整性及可用性。
The key point here is that Shiro's API is largely intuitive because it reflects the natural tendency for developers to think in 'per-user' security control.
这里的关键点是Shiro的API非常直观,因为它反映了开发者以‘每个用户’思考安全控制的自然趋势。
The fifth step: maintenance personnel must be repaired before and after the guardrail plate, the layout of the security control area to the whole camera.
第五步:维修人员必需对护栏板进行维修复前、后拍照,布置安全控制区要全程摄像。
Analyze the methods of organization control, system development and maintenance control, system security control, hardware and software control in detail.
详细讨论了组织控制、系统开发与维护控制、系统安全控制、硬件及系统软件控制、操作控制等控制方法。
The authentication based on JAAS together with authorization and audit function provided by J2EE application server assure the security control for system.
利用基于JAAS的认证功能和J2EE服务器特有的授权和审计体系,为系统的安全控制提供了保障。
Prevent guests from taking flammable and explosive items into hotel floors or rooms. Any case happens, report to Security Control Center in a timely manner.
劝阻客人不要将易燃易爆等物品带入楼层或房间,如劝阻不听或已带入房间的人,要及时报告保安部控制中心。
So beneath this security attacking model of inner-mesh, we have to get more special security control management for all the component points and participants.
因此,在这样的一个模型下,必须对内网中所有实体对象进行更加全面、颗粒度更小的安全管理以及控制。
Mainly describes the integration and the update of anti-virus software on the security control units and realized the virus scanning on data of buffering area.
重点描述了安全控制单元中杀毒软件的集成和升级,并实现了对缓冲区中数据的病毒扫描。
He repeated his two prerequisites - that the Palestinians recognize Israel as a Jewish state and that Israel maintain security control over the entire West Bank.
他重述了自己的两个先决条件——巴勒斯坦人承认以色列是一个犹太国家,以色列保持对整个约旦河西岸的安全控制。
He repeated his two prerequisites - that the Palestinians recognize Israel as a Jewish state and that Israel maintain security control over the entire West Bank.
他重述了自己的两个先决条件——巴勒斯坦人承认以色列是一个犹太国家,以色列保持对整个约旦河西岸的安全控制。
应用推荐