Because component tests deal with multiple layers of an architecture, they often deal with databases, file systems, network elements, etc.
由于组件测试处理一个架构的多个层次,所以它们经常用于处理数据库、文件系统、网络元素等。
The operational architecture artifact represents a network of computer systems that support some of the performance, scalability, and fault tolerance (among others) requirements of the solution.
操作体系结构构件表示计算机系统的网络,这些系统支持解决方案的某些性能、可伸缩性和容错等需求。
Services include system of systems engineering and integration, network and interoperability engineering, architecture development and information assurance.
服务内容包括系统工程和集成、网络工程和互操作性、体系研发和信息保障系统。
These are intertwined in the network architecture in a plethora of service adjuncts, each with its own systems for operations, provisioning and maintenance.
这些交织在一起,纠缠着网络架构,每个部分都有单独的运行、服务、维护系统。
Representational State Transfer (REST) is a style of software architecture for distributed network systems that takes advantage of the technologies employed by the Web.
Representational StateTransfer (REST)是分布式网络系统软件结构的一种形式,它利用了网络所采用技术所带来的优势。
Embedded in the Derby Network server the Derby engine is running in a standard client-server architecture like most other database systems.
嵌入在Derby NetworkServer中的Derby引擎在一个标准的客户机-服务器架构中运行,这和大多数其他数据库系统是一样的。
The advantages of using P2P architecture in collaboration systems are analyzed, the details of the design and implementation of a P2P NetWork for collaboration system.
文章分析了协同工作系统采用P 2 P架构所具有的优点,并提出一个用于协同工作系统的分组P 2 P网络的设计与实现方案。
This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.
本文描述AT M网络中的信息安全、可能受到的威胁、安全结构和端系统之间的鉴别技术。
In this paper, the architecture and the detection principle of adaptive model generation systems are studied, then the adaptive model for intrusion detection of computer network is established.
本文介绍了该模型的体系结构,并对其工作原理进行了分析,在此基础上建立自适应入侵检测模型。
In order to protect these systems, we need to construct layered network security guarantee architecture, and IDS is one of the most important components of the architecture.
为了保障系统的安全,我们需要构建一个层次的网络安全保障体系,而入侵检测技术就是网络安全层次结构的一个重要组成部分。
With more application systems joining unified identity authentication serve, this system will play a more important role in the CERNET info security architecture. And network management is simpler.
随着更多的应用系统加入到统一认证服务,本系统将会在教科网的信息安全体系中发挥更重要的作用,而且网络管理更加简单。
With more application systems joining unified identity authentication serve, this system will play a more important role in the CERNET info security architecture. And network management is simpler.
随着更多的应用系统加入到统一认证服务,本系统将会在教科网的信息安全体系中发挥更重要的作用,而且网络管理更加简单。
应用推荐