• High availability and security considerations.

    可用性安全注意事项

    youdao

  • Security considerations for the two service applications.

    对于两个服务应用程序安全考虑

    youdao

  • Security considerations when security is performed at the client.

    客户机实施安全性的安全性考虑

    youdao

  • There are no WS-Security or other complex security considerations.

    存在WS - Security其他复杂安全性考虑。

    youdao

  • First, there are some security considerations we need to deal with.

    首先一些安全注意事项需要处理

    youdao

  • Other security considerations could and should be taken into account when using this script.

    使用这个脚本,还要考虑其他一些安全问题,我们应该考虑这些问题。

    youdao

  • The article concludes with security considerations for the agent and job manager topologies.

    本文最后讨论代理拓扑作业管理器拓扑的安全注意事项。

    youdao

  • To understand the Expect source, it's easiest for the moment to neglect security considerations.

    了解expect源代码目前简便的做法是忽略安全性考虑事项。

    youdao

  • For more information about security boundaries as they apply to assemblies, see Assembly security Considerations.

    有关应用于程序安全边界更多信息请参见程序安全注意事项。

    youdao

  • The Internet has two major considerations: compatibility and security. The.

    英特大主要需要考虑的事:兼容性以及安全性

    youdao

  • The Internet has two major considerations: compatibility and security. The.

    英特大主要需要考虑的事:兼容性以及安全性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定