Security considerations in large consolidated cells
大型整合 cell 的安全考虑
Security considerations when issuing instance-level commands.
发出实例级命令时的安全性考虑。
Security considerations when performing SQL statements after connecting to the database.
连接到数据库之后执行sql语句时的安全性考虑。
For more information on security considerations when using.vsdisco files, see Resources.
有关使用.vsdisco文件时的安全注意事项,请参见参考资料。
All security considerations have to exist on the spectrum between convenience and protection.
所有安全性考虑必须兼顾方便和保护。
Security considerations when connecting to a database from a client system to a server system.
客户机系统通过服务器系统连接到数据库时的安全性考虑。
Or they cite 'security considerations' or explain the' uniqueness 'of our conflict with the Arabs.
或者他们会引用‘安全策略’或者去解释我们与阿拉伯人冲突的独特性。
Or they cite 'security considerations' or explain the 'uniqueness' of our conflict with the Arabs.
或者他们会引用‘安全策略’或者去解释我们与阿拉伯人冲突的独特性。
I'll be writing on topics like performance issues and security considerations of each of these modules as well.
我会为这些模块写一些关于性能和安全考虑的主题。
Whether or not the connection should be used is dependent upon the verification result and security considerations.
是否应该使用连接取决于验证结果和安全方面的考虑。
In this context, for our energy security considerations, the building of new energy base has great significance.
在这种背景下,基于我国能源安全的考虑,建设新的能源基地意义重大。
I do now is a J2EE OA project, based on security considerations, Project name hereinafter referred to as J2EEOA.
我现在正在做一个J2EE的OA项目,基于安全保密考虑,项目名称以下称为J2EEOA。
This is partially because of security considerations, but this is also due to the pernicious effects of competition.
这其中有一部分是出于安全性的考虑,但这也是竞争中的致命财产。
Security considerations should be included in all aspects of your application development, from design to deployment.
开发应用程序的所有环节(从设计到部署)都应考虑到安全性。
Security from within means that security considerations are coincidental to all the activities within an SOA implementation.
内部安全性指安全性考虑与SOA实现中的所有活动对应。
The general approach to security considerations starts with authenticating the user, commonly with username and password.
一般的安全措施首先会验证用户,通常使用用户名和密码进行验证。
In order to bus system security considerations, there is an urgent need to intelligence, automation bus voice stops system.
为了公交系统的安全考虑,目前迫切需要智能化、自动化的公交语音报站系统。
Or they cite ‘security considerations’ or explain the ‘uniqueness’ of our conflict with the Arabs. But many others are not even ashamed…
那些自惭形愧的人可能会发现合理性的解释:‘我们无路可走’或者‘考虑到安全因素’或者去解释说我们与阿拉伯人冲突很独特。
The hub ports were chosen on the basis of proximity to international shipping routes, draught, facilities and security considerations.
枢纽港的选择是基于距离国际航线的远近、吃水深度、设施和安全因素等等。
The article then shows you how to use these nodes within message Broker message flows, including caching strategy and security considerations.
然后本文将介绍如何在MessageBroker消息流中使用这些节点,包括缓存策略和安全注意事项。
Stemming from system's factor and so on security considerations, before a system design, needs to carry on the plan and the technical proof.
出于系统的安全性等因素的考虑,一个系统设计之前,需要进行方案和技术论证。
And, some smaller organizations will be able to get away with using Hyper-V in production, though everyone needs to be aware of security considerations.
同时,一些人小机构将能够得到了在生产与使用Hyper-V,尽管每个人都需要被意识到的安全考虑。
Security considerations may have prevented the debugger from reading stack, thread, register, and other context information from the program you are debugging.
出于安全考虑,可能禁止调试器从在调试的程序中读取堆栈、线程和其他上下文信息。
However, there are still some situations where choosing static SQL makes sense, involving security considerations, and maximizing performance for certain OLTP workloads.
然而,仍然有一些适合静态SQL的情形,比如涉及到安全性因素、针对某些OLTP工作负载最大化性能等情况。
With that said, OAuth can be implemented in a very secure manner and the specification includes a good amount of security considerations to take into account when working with sensitive resources.
也就是说,OAuth可以以非常安全的方式实现,并且在处理敏感资源时,规范本身提供了很多安全方面的考虑。
The Internet has always been a source of security worries and the IETF has always been keenly attentive to security considerations, including this high-level discussion with regard to XML processing.
Internet一直是安全担忧的因素,而IETF非常关注安全问题,包括关于XML处理的这种高层讨论。
This article also provides an overview of security environment considerations when designing your MDM solution.
本文还概述了在设计MDM解决方案时对安全环境要考虑的一些方面。
As an example to show how each deserves different considerations, security concerns of external applications are much more stringent then internal applications.
作为一个展示两者不同的注意事项的示例,外部应用程序的安全考虑要比内部应用程序的严格得多。
Next month, we will conclude this 3-part article series with administration and security requirements, integration and coexistence considerations, and how to get started.
下个月,我们将总结这个系列的文章的管理和安全需求、整合和共存的注意事项,以及如何开始。
Next month, we will conclude this 3-part article series with administration and security requirements, integration and coexistence considerations, and how to get started.
下个月,我们将总结这个系列的文章的管理和安全需求、整合和共存的注意事项,以及如何开始。
应用推荐