Additionally, EMC EFDs safeguard data with full round-trip error correcting code (ECC) data integrity protection and destage power backup.
此外,EMCEFD也使用全双工错误修正码(ECC)数据完整性保护和离线电源备份来保护数据。
Past NFS versions did not have this ability and therefore could not negotiate for the quality of protection, data integrity, the requirement for authentication, or the type of encryption.
以前的NFS版本都没有这种能力,因此不能对保护的质量、数据的完整性、认证的要求或加密类型进行协商。
This standard adds a data integrity field (DIF) to each sector to maintain data protection on the medium.
这个标准为每扇区都增加了一个数据完整性字段(DIF)以保护介质上的数据。
Embedded within ZFS is an implementation of an important set of features such as snapshots, copy-on-write clones, continuous integrity checking, and data protection through RAID-Z.
ZFS内嵌入的是重要功能集(如快照、即写即拷克隆、连续完整性检查和通过RAID - Z的数据保护)的实现。
It also includes the management objective of internal audit, which includes not only the audit IS protection of asset security and data integrity, but also the effectiveness of IS.
又包括内部审计的管理目标—即不仅包括被审计IS保护资产安全及数据完整,且包括IS的有效性目标。
The data integrity is an important content of the database protection.
数据完整性是数据库保护的重要内容。
The air interface security technologies for the protection of data confidentiality and data integrity in 3g are discussed.
讨论了第3代移动通信系统的空中接口安全保护技术,包括数据机密性保护、数据完整性保护。
Analysis results show that this algorithm satisfied the requirement of protection and solve the consistency and integrity problem of communication data.
结果表明该算法能够满足保护需求,初步解决了通信数据的完整性和一致性问题。
Even recent memory protection techniques like segmentation, paging, protection keys and simulated segmentation flunks to assure data integrity.
即使是近期的内存保护技术,例如数据分割、分页、保护秘钥和模拟分割都无法确保数据的完整性。
After introducing the organization form of the memory database, it focuses on the HASH arithmetic of index and protection of integrity and consistence of the data.
在介绍了内存数据库的组织形式之后,本文重点分析了索引HASH算法以及数据完整性和一致性保护。
Since memory is the primary place to store the data, the most effective way to against attack is the protection of off-chip memory, i. e. confidentiality protection and integrity protection.
鉴于存储器是数据最主要的驻留场所,因此,防范攻击首要的是对处理器的片外存储器进行保护,其关键技术手段包括存储器的机密性和完整性保护。
The first fragile watermarking scheme is more suitable for high precision data in the traditional network model of integrity protection;
第一种脆弱水印方案更适合于数据精度要求高、集中式网络模式的数据完整性保护;
Confidentiality protection ensures that the data can't be understudied by attackers and integrity protection ensures that the data can't be tampered.
存储器的机密性保证了数据不被攻击者窃取,完整性保证了数据不被攻击者篡改。
Confidentiality protection ensures that the data can't be understudied by attackers and integrity protection ensures that the data can't be tampered.
存储器的机密性保证了数据不被攻击者窃取,完整性保证了数据不被攻击者篡改。
应用推荐