• Generally, developers don't expect the mobile cloud to be free from security threats any more than they expect that of any other information technology (it) model used to support business.

    通常开发人员认为移动免受安全威胁,就如同他们不认为其他任何信息技术(IT)模式支持业务一样。

    youdao

  • We first analyse the security threats that authentication of DBMS must face and introduce a security threat model.

    本文首先分析数据库身份认证系统安全威胁提出一个安全威胁模型

    youdao

  • In the third part, the paper emphasizes the study of information security risk quantification assessment model based on assets, threats and weaknesses.

    第三部分论文着重研究了一种基于资产威胁弱点信息安全风险评估量化模型

    youdao

  • We first analyse the security threats that DBMS must face and introduce a security threat model.

    本文首先分析数据库管理系统可能面临的各种安全威胁引入了一个安全威胁模型

    youdao

  • A relevant Content Lifecycle Protection Model (CLPM), which divides the whole lifecycle protection of digital content into 4 phases, is provided to deduce the security threats in each phase.

    基于保护理念作者提出了相应保护模型CLPM,该模型四个阶段分析壳对数字内容保护过程,针对性的解除不同阶段面临的威胁

    youdao

  • A relevant Content Lifecycle Protection Model (CLPM), which divides the whole lifecycle protection of digital content into 4 phases, is provided to deduce the security threats in each phase.

    基于保护理念作者提出了相应保护模型CLPM,该模型四个阶段分析壳对数字内容保护过程,针对性的解除不同阶段面临的威胁

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定