system security信息详情
系统安全性
security───n.安全,安全性;保证;证券;抵押品;adj.安全的;保安的;保密的
security zone───安全地带
security control───安全技术;保安措施;安全技术,安全控制,保安措施
security features───安全特征(securityfeature的复数)
security officers───安全官员;安全人员
distressed security───危难证券
cumic security───cumic安全
it security───it安全
security check───安全检查;安检
System security consists of two somewhat contradictory goals.───系统安全包括两个有些冲突的目标。
It also provides shadow password support to enhance system security.───为了增强系统安全性它还支持影子口令。
Certified Information System Security professional.───信息系统安全专家认证。
The name attribute can be the name of one of the abstract classes found in the System. Security. Cryptography namespace.───name属性可以是位于System.Security.Cryptography命名空间中的某个抽象类的名称。
Any discussion of system security would be incomplete without at least a cursory word or two on the topic of passwords.───如果没有(哪怕是粗略地)提到一两句关于密码的话题,那么任何关于系统安全性的讨论都将是不完整的。
So needless to say, I was a bit disappointed by the lack of undergraduate software or system security courses offered at WPI.───所以不用说,我有一点失望的是WPI没有提供大学软件或系统安全课程。
Here, conducting an assessment of the threat of its system using markov latent effects (MLE) modeling from the point of system security.───从系统安全的角度,采用马尔科夫潜在作用(MLE)模型对供水系统进行威胁评价。
To call the OpenFile method, your assembly requires a privilege level granted by the System. Security. Permissions. FileIOPermission class.───若要调用OpenFile方法,程序集要求有System.Security.Permissions.FileIOPermission类授予的权限级别。
All or any of these technologies could be used to provide additional system security.───上述所有技术,或者任何一个,都可以为系统带来更强大的安全防护。
They provide system security and immediate reliable low level ground fault detection on three-phase AC resistance grounded or grounded electrical distribution systems.
When the system security log reaches its maximum size it will stop recording security events.
It is applicable to commercial computer system security model, and will have far-ranging applications in the areas of E business and E government.
In the tax - controlled system, security of data is the most basic demand of the whole system.
With the development of Electronic Commerce payment system, security problem is more and more important.
Most traditional embedded system security detection methods cannot meet all of the requirements of fast detection, independent detection and without interference to application program.
This paper presents a mobile agent system security mechanism for large scale network applications.
The design of a simulation system security log user interface, using MD5 algorithm users log on password security authentication.
There are two classes of security problems in distributed computing system, security of hosts and security of distributed applications.
- raster transform
- snatch blocks
- sim trade
- relais pian delle starze
- their hearts can be a better guide
- secondary energy source
- system segment
- technical documentation
- relapse records inc
- secondary engine
- stay behind with
- relapse records ins
- riskable
- sim tv
- the fact sheet
- uncle beard
- true dr
- the fact that she works hard
- pressure cowling
- uncle bears
- stay behind you