• Security considerations in large consolidated cells

    大型整合 cell 的安全考虑

    youdao

  • Security considerations when issuing instance-level commands.

    发出实例级命令安全性考虑

    youdao

  • Security considerations when performing SQL statements after connecting to the database.

    连接数据库之后执行sql语句安全性考虑

    youdao

  • For more information on security considerations when using.vsdisco files, see Resources.

    有关使用.vsdisco文件安全注意事项请参见参考资料

    youdao

  • All security considerations have to exist on the spectrum between convenience and protection.

    所有安全性考虑必须兼顾方便保护

    youdao

  • Security considerations when connecting to a database from a client system to a server system.

    客户机系统通过服务器系统连接数据库安全性考虑

    youdao

  • Or they cite 'security considerations' or explain the' uniqueness 'of our conflict with the Arabs.

    或者他们会引用安全策略’或者去解释我们阿拉伯冲突独特性

    youdao

  • Or they cite 'security considerations' or explain the 'uniqueness' of our conflict with the Arabs.

    或者他们会引用安全策略’或者去解释我们阿拉伯冲突独特性

    youdao

  • I'll be writing on topics like performance issues and security considerations of each of these modules as well.

    我会这些模块一些关于性能安全考虑主题。

    youdao

  • Whether or not the connection should be used is dependent upon the verification result and security considerations.

    是否应该使用连接取决于验证结果安全方面的考虑

    youdao

  • In this context, for our energy security considerations, the building of new energy base has great significance.

    这种背景下基于我国能源安全考虑建设新的能源基地意义重大

    youdao

  • I do now is a J2EE OA project, based on security considerations, Project name hereinafter referred to as J2EEOA.

    现在正在一个J2EEOA项目基于安全保密考虑,项目名称以下称为J2EEOA。

    youdao

  • This is partially because of security considerations, but this is also due to the pernicious effects of competition.

    其中一部分是出于安全性考虑也是竞争中的致命财产。

    youdao

  • Security considerations should be included in all aspects of your application development, from design to deployment.

    开发应用程序所有环节设计部署)都考虑到安全性

    youdao

  • Security from within means that security considerations are coincidental to all the activities within an SOA implementation.

    内部安全性安全性考虑SOA实现中的所有活动对应

    youdao

  • The general approach to security considerations starts with authenticating the user, commonly with username and password.

    一般安全措施首先验证用户通常使用用户密码进行验证。

    youdao

  • In order to bus system security considerations, there is an urgent need to intelligence, automation bus voice stops system.

    为了公交系统安全考虑目前迫切需要智能化自动化的公交语音报站系统。

    youdao

  • Or they citesecurity considerationsor explain theuniquenessof our conflict with the Arabs. But many others are not even ashamed…

    那些自惭形愧人可能会发现合理性解释:‘我们无路可走或者考虑安全因素’或者去解释说我们阿拉伯人冲突独特

    youdao

  • The hub ports were chosen on the basis of proximity to international shipping routes, draught, facilities and security considerations.

    枢纽选择基于距离国际航线远近吃水深度设施安全因素等等

    youdao

  • The article then shows you how to use these nodes within message Broker message flows, including caching strategy and security considerations.

    然后本文介绍如何MessageBroker消息使用这些节点包括缓存策略安全注意事项

    youdao

  • Stemming from system's factor and so on security considerations, before a system design, needs to carry on the plan and the technical proof.

    出于系统安全性因素考虑一个系统设计之前需要进行方案技术论证

    youdao

  • And, some smaller organizations will be able to get away with using Hyper-V in production, though everyone needs to be aware of security considerations.

    同时一些人机构能够得到生产使用Hyper-V尽管每个人都需要意识到安全考虑

    youdao

  • Security considerations may have prevented the debugger from reading stack, thread, register, and other context information from the program you are debugging.

    出于安全考虑可能禁止调试从在调试的程序中读取堆栈线程其他上下文信息

    youdao

  • However, there are still some situations where choosing static SQL makes sense, involving security considerations, and maximizing performance for certain OLTP workloads.

    然而仍然一些适合静态SQL情形比如涉及到安全性因素针对某些OLTP工作负载最大化性能等情况。

    youdao

  • With that said, OAuth can be implemented in a very secure manner and the specification includes a good amount of security considerations to take into account when working with sensitive resources.

    就是说OAuth可以非常安全的方式实现,并且处理敏感资源规范本身提供很多安全方面的考虑。

    youdao

  • The Internet has always been a source of security worries and the IETF has always been keenly attentive to security considerations, including this high-level discussion with regard to XML processing.

    Internet一直安全担忧因素而IETF非常关注安全问题,包括关于XML处理这种高层讨论

    youdao

  • This article also provides an overview of security environment considerations when designing your MDM solution.

    本文概述了在设计MDM解决方案安全环境考虑的一些方面。

    youdao

  • As an example to show how each deserves different considerations, security concerns of external applications are much more stringent then internal applications.

    作为一个展示两者不同注意事项示例外部应用程序的安全考虑内部应用程序的严格得多。

    youdao

  • Next month, we will conclude this 3-part article series with administration and security requirements, integration and coexistence considerations, and how to get started.

    下个我们总结这个系列文章管理安全需求整合共存注意事项以及如何开始

    youdao

  • Next month, we will conclude this 3-part article series with administration and security requirements, integration and coexistence considerations, and how to get started.

    下个我们总结这个系列文章管理安全需求整合共存注意事项以及如何开始

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定