• Additionally, it is designed to rectify issues found with IPv4 such as data security.

    此外还改进了IPv 4使用上的一些问题比如数据安全。

    youdao

  • When dealing with a Web application, the importance of data security cannot be overstated.

    处理Web应用程序时,数据安全性重要性怎么强调也不过分

    youdao

  • Yet while it has been this way for years, data security is still frequently treated lightly.

    尽管多年以来情况一直如此,但数据安全性的重要性依然往往低估

    youdao

  • In this case, field hiding provides user interface management rather than true data security.

    这种情况下字段隐藏用户提供的是接口管理不是真正数据安全

    youdao

  • Network and data security can be guaranteed by establishing point-to-point secure connections.

    可以通过建立点对点安全连接来保证网络数据安全性

    youdao

  • Sanitize provides four methods for applying varying levels of data security to user-submitted data.

    Sanitize提供了4 个方法,可以各种级别数据安全性应用用户提交的数据。

    youdao

  • Then we look at securing a Web server through Web authentication, server security, and data security.

    然后查看如何通过Web身份验证服务器安全性数据安全性来确保Web服务器的安全。

    youdao

  • If nothing else gets bosses to focus on data security, surely the prospect of ending up in court will.

    如果没有什么别的可以使老板关注数据安全,那么吃官司法庭后果(prospect)总可以吧。

    youdao

  • There are good business reasons for this, too, ranging from data security to Sarbanes-Oxley compliance.

    数据库安全性遵守Sarbanes - Oxley法案,她都没有参与进来,她这样有充足的业务理由

    youdao

  • Data security by providing support for username and password authentication and for digital certificates.

    通过支持用户密码认证以及数字证书的数据安全

    youdao

  • New features enhance OLTP data security, OLTP performance, data warehouse performance, and administration.

    特性增强OLTP数据安全性、OLTP性能、数据仓库性能管理

    youdao

  • Develop policies and procedures that tell you what to do before, during and after a breach of data security.

    制定公司政策过程,以告诉平时应该什么,发现数据安全问题应该做什么。

    youdao

  • The second issue is data security because there is no check of roles or users to ensure proper access to the data.

    第二问题数据安全性没有任何角色用户访问检查确保适当的数据访问。

    youdao

  • Data security, retention, and management will be part of your standards discussion as well as programming conventions.

    数据安全性保留管理标准有关的讨论以及编程约定一部分。

    youdao

  • As part of this discussion, we'll suggest some potential ways to enhance network and data security for J2ME applications.

    作为讨论一部分,我们提出一些增强J2ME应用程序网络数据安全性可能方法

    youdao

  • So, although the apps look good and cost nothing, users have to trade a lot of convenience for a modicum of data security.

    所以尽管Tonido应用界面美观(截图)不收取费用,但用户牺牲掉方便,换来数据的那么一点点安全

    youdao

  • Describe their location, systems, access approaches, source data traffic and update frequency, data security, and data quality.

    描述位置系统访问方法数据流通更新频率、数据安全性和数据质量

    youdao

  • As more companies implement data security measures, audits will likely bring to light older, overlooked breaches from the past.

    随着越来越多公司部署数据安全措施审计报告有可能揪出很多被忽视旧账

    youdao

  • It doesn't matter how beautiful and elegant your Web application is, bad data security will bring your application to its knees.

    就算编写出人类历史上最美妙最优雅Web应用程序没有多大意义。糟糕数据安全性将会使应用程序崩溃

    youdao

  • Several XML security protocols have been proposed to support communication data security in XML applications. Among them are the following.

    提出了几个XML安全性协议XML应用程序支持通信数据安全性。

    youdao

  • IDSLBACREADSET: Each set component of the user security label must include the set component of the data security label to allow access to data.

    IDSLBACREADSET:要访问数据用户安全标签每个集合组件必须包括数据安全标签的集合组件。

    youdao

  • IDSLBACWRITESET: Each set component of the user security label must include the set component of the data security label to allow access to data.

    IDSLBACWRITESET访问数据用户安全标签每个集合组件必须包括数据安全标签的集合组件。

    youdao

  • Address major technical risks, such as resource contention risks, performance risks, and data security risks, by implementing and validating actual code.

    通过实现验证实际代码处理主要技术任务比如资源争夺风险性能风险和数据安全风险。

    youdao

  • Most SaaS application architectures take data security measures that prevent one tenant from seeing another tenant's data as a baseline requirement. But.

    大多数SaaS应用程序架构采取了一些保护数据安全性措施,将阻止租户查看一个租户数据作为基本要求

    youdao

  • IDSLBACWRITEARRAY: Each array component of the user security label must be equal to the array component of the data security label to allow access to data.

    IDSLBACWRITEARRAY:要访问数据用户安全标签每个数组组件必须等于数据安全标签的数组组件。

    youdao

  • A wise boss will also appoint a senior executive to be responsible for data security-and not just to have a convenient scapegoat in the event of a leak.

    明智老板同时也会指派名高级管理人员切实对信息安全负责,而不仅仅为了发生了信息泄露的时候能找一个替罪羊

    youdao

  • In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.

    本文中,谈到数据安全性机密性方面确保受保护数据只能授权用户系统访问

    youdao

  • But there are new opportunities, as well: Akamai is bringing its customers into cloud computing, mobile computing, data security, and the delivery of HD video.

    不过还有新的机会Akamai正在帮助客户引入计算移动计算、数据安全和高清视频传输业务。

    youdao

  • But there are new opportunities, as well: Akamai is bringing its customers into cloud computing, mobile computing, data security, and the delivery of HD video.

    不过还有新的机会Akamai正在帮助客户引入计算移动计算、数据安全和高清视频传输业务。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定