Additionally, it is designed to rectify issues found with IPv4 such as data security.
此外它还改进了IPv 4使用上的一些问题,比如数据安全。
When dealing with a Web application, the importance of data security cannot be overstated.
在处理Web应用程序时,数据安全性的重要性怎么强调也不过分。
Yet while it has been this way for years, data security is still frequently treated lightly.
尽管多年以来情况一直都是如此,但数据安全性的重要性依然往往被低估。
In this case, field hiding provides user interface management rather than true data security.
在这种情况下,字段隐藏为用户提供的是接口管理,而不是真正的数据安全。
Network and data security can be guaranteed by establishing point-to-point secure connections.
可以通过建立点对点安全连接来保证网络与数据安全性。
Sanitize provides four methods for applying varying levels of data security to user-submitted data.
Sanitize提供了4 个方法,可以将各种级别的数据安全性应用于用户提交的数据。
Then we look at securing a Web server through Web authentication, server security, and data security.
然后将查看如何通过Web身份验证、服务器安全性和数据安全性来确保Web服务器的安全。
If nothing else gets bosses to focus on data security, surely the prospect of ending up in court will.
如果没有什么别的可以使老板关注数据安全,那么吃官司上法庭的后果(prospect)总可以吧。
There are good business reasons for this, too, ranging from data security to Sarbanes-Oxley compliance.
从数据库安全性到遵守Sarbanes - Oxley法案,她都没有参与进来,她这样做也有充足的业务理由。
Data security by providing support for username and password authentication and for digital certificates.
通过支持用户名和密码认证以及数字证书的数据安全。
New features enhance OLTP data security, OLTP performance, data warehouse performance, and administration.
新特性增强了OLTP数据安全性、OLTP性能、数据仓库性能和管理。
Develop policies and procedures that tell you what to do before, during and after a breach of data security.
制定公司政策及过程,以告诉您平时应该做什么,发现数据安全问题时又应该做什么。
The second issue is data security because there is no check of roles or users to ensure proper access to the data.
第二个问题是数据安全性,没有任何角色或用户访问检查来确保适当的数据访问。
Data security, retention, and management will be part of your standards discussion as well as programming conventions.
数据安全性、保留和管理将是与标准有关的讨论以及编程约定的一部分。
As part of this discussion, we'll suggest some potential ways to enhance network and data security for J2ME applications.
作为讨论的一部分,我们将提出一些增强J2ME应用程序的网络和数据安全性的可能方法。
So, although the apps look good and cost nothing, users have to trade a lot of convenience for a modicum of data security.
所以,尽管Tonido的应用界面美观(截图)且不收取费用,但用户却得牺牲掉方便,换来数据的那么一点点安全。
Describe their location, systems, access approaches, source data traffic and update frequency, data security, and data quality.
描述其位置、系统、访问方法、源数据流通和更新频率、数据安全性和数据质量。
As more companies implement data security measures, audits will likely bring to light older, overlooked breaches from the past.
随着越来越多公司部署数据安全措施,审计报告将有可能揪出很多被忽视的旧账。
It doesn't matter how beautiful and elegant your Web application is, bad data security will bring your application to its knees.
就算编写出人类历史上最美妙、最优雅的Web应用程序也没有多大意义。糟糕的数据安全性将会使应用程序崩溃。
Several XML security protocols have been proposed to support communication data security in XML applications. Among them are the following.
已提出了几个XML安全性协议以在XML应用程序中支持通信数据安全性。
IDSLBACREADSET: Each set component of the user security label must include the set component of the data security label to allow access to data.
IDSLBACREADSET:要访问数据,用户安全标签的每个集合组件必须包括数据安全标签的集合组件。
IDSLBACWRITESET: Each set component of the user security label must include the set component of the data security label to allow access to data.
IDSLBACWRITESET:要访问数据,用户安全标签的每个集合组件必须包括数据安全标签的集合组件。
Address major technical risks, such as resource contention risks, performance risks, and data security risks, by implementing and validating actual code.
通过实现和验证实际的代码,处理主要的技术任务,比如资源争夺风险、性能风险和数据安全风险。
Most SaaS application architectures take data security measures that prevent one tenant from seeing another tenant's data as a baseline requirement. But.
大多数SaaS应用程序架构采取了一些保护数据安全性的措施,将阻止一个租户查看另一个租户的数据作为一个基本要求。
IDSLBACWRITEARRAY: Each array component of the user security label must be equal to the array component of the data security label to allow access to data.
IDSLBACWRITEARRAY:要访问数据,用户安全标签的每个数组组件必须等于数据安全标签的数组组件。
A wise boss will also appoint a senior executive to be responsible for data security-and not just to have a convenient scapegoat in the event of a leak.
明智的老板同时也会指派一名高级管理人员切实对信息安全负责,而不仅仅是为了在发生了信息泄露的时候能找一个替罪羊。
In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.
在本文中,我将谈到数据安全性的机密性方面:确保受保护的数据只能被授权用户或系统访问。
But there are new opportunities, as well: Akamai is bringing its customers into cloud computing, mobile computing, data security, and the delivery of HD video.
不过,还有新的机会:Akamai正在帮助它的客户引入云计算、移动计算、数据安全和高清视频传输业务。
But there are new opportunities, as well: Akamai is bringing its customers into cloud computing, mobile computing, data security, and the delivery of HD video.
不过,还有新的机会:Akamai正在帮助它的客户引入云计算、移动计算、数据安全和高清视频传输业务。
应用推荐