• Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.

    基于安全系统全面信息安全策略网络安全技术网络安全管理两个层次上研究内部网安全性

    youdao

  • The second type of security policy rules, called disclosure rules, specifies what information can be disclosed in a query result and the conditions under which result objects are disclosed.

    第二安全策略规则类型公开规则,它们指定一个查询结果可以公开哪些信息以及公开结果对象条件

    youdao

  • Implementing a password policy can be time consuming when presenting the information in a clearer format for reporting to security managers, especially when dealing with a large enterprise network.

    如果需要清楚的格式安全经理报告信息实现密码策略非常费时间尤其是处理大型企业网络时。

    youdao

  • This is the mechanism the container USES to pass security policy information to the provider.

    容器用于安全策略信息传递提供程序机制

    youdao

  • For instance, a policy that receives a SOAP request validates security information in the SOAP header to validate that a user may receive previously cached response data.

    例如收到一个SOAP请求时的策略,这个策略会SOAP消息头里验证安全信息确认用户也许可以接受先前缓存响应数据

    youdao

  • Now we can get down to extracting what information is required for a daily audit report, extracting the information that is relevant to your own audit security policy.

    现在我们可以提取日常审计报告需要信息,只提取自己的审计安全策略有关信息。

    youdao

  • It also stores the information about the cell as a whole, such as cell-wide security policy, ticket lifetimes, etc.

    存储单元整体信息比如单元范围的安全策略票证有效期

    youdao

  • Tivoli Security Policy Manager - Provides a uniform point of administration of users, federation of user information, and privilege management.

    TivoliSecurity PolicyManager——提供针对用户用户信息联合特权管理统一管理点。

    youdao

  • The new access to information policy, launched in July 2010, opens up access to all information unless specifically excepted for privacy of personal or financial security reasons.

    2010年7月出台新版信息获取政策要求公开所有信息,但出于个人隐私金融安全等原因而不得公开的信息除外

    youdao

  • You also need to add WSIT custom extensions to the policy information on both client and server sides with user-configuration details to indicate how the security handling will be implemented.

    需要同时服务器客户端策略信息中添加WSDL自定义扩展通过用户配置细节表明如何实现安全处理

    youdao

  • For example, the WS-Security Policy domain will be the only source of information as to whether two security assertions contradict each other or are complementary refinements of each other.

    例如WS - Security策略领域作为判断2个安全断言是互相矛盾还是互为补充的唯一信息源。

    youdao

  • The Auditing subsystem enables the systems administrator to record security-relevant information, which can be analyzed later to detect potential and actual violations of the system's security policy.

    系统管理员可以通过审计系统记录安全性相关信息以后可以分析这些信息,寻找违反可能违反系统安全策略的地方。

    youdao

  • When we use third parties to assist us in processing your personal information, we require that they comply with our Privacy Policy and any other appropriate confidentiality and security measures.

    我们使用第三协助我们处理个人信息时,我们要求他们遵守我们隐私政策以及任何其他适当的保密安全措施

    youdao

  • The best security policy is to be aware of fraud and cautious about where you share personal information.

    最好安全政策应该意识欺诈谨慎那里分享个人信息。

    youdao

  • For more information about how the runtime decides which permissions to grant, see Security Policy and permission Grants.

    有关运行时如何决定授予权限更多信息请参见安全策略权限授予

    youdao

  • For more information about evidence, code groups, and permission sets, see Security Policy Model.

    有关证据代码权限更多信息请参见安全策略模型

    youdao

  • Your information is protected by ZUJI's privacy and security policy.

    资料受到zuji私隐安全政策保护。

    youdao

  • For more information about using these tools, see Administering Security Policy.

    有关使用这些工具更多信息请参见管理安全策略

    youdao

  • For more information, see Security Policy Model.

    有关更多信息请参见安全策略模型

    youdao

  • Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.

    负责公司的信息系统安全评估控制风险制定安全政策、制定灾难恢复计划确保政策与计划执行。

    youdao

  • How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.

    基于此,研究了如何维持策略空间穿越中的安全信息完整性有效性,提出了基于安全信息的动态访问控制算法

    youdao

  • In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.

    本文通过CORBA中间件技术实现基于策略安全信息系统从而解决棘手问题。

    youdao

  • The paper also presents the layout of security safeguard system of information system and discusses implement policy of security safeguard system of information system.

    本文还给出了信息系统安全保障体系规划方式构建信息系统安全保障体系实施策略

    youdao

  • Covert channel can leak sensitive information in a manner that violates the system's security policy, so it will threaten the security of the system.

    通道一种违背系统安全策略的方式泄露秘密信息系统安全造成很大威胁。

    youdao

  • For more information about default security Settings, see default security Policy.

    有关默认安全设置更多信息请参见默认安全策略

    youdao

  • For more information about the evidence the common language runtime USES to determine security policy, see evidence.

    有关公共语言运行时用来确定安全策略证据更多信息请参见证据。

    youdao

  • The following information applies only to Level 1 assemblies or assemblies using legacy security policy.

    下面信息适用于级别1程序使用安全策略的程序集。

    youdao

  • Since this information may affect national level decisions, write a memo to the Director of Homeland Security and the Director of TSA with a technical analysis of this enhanced screening policy.

    因为这些信息影响整个国家级决定,给国土安全局主任TSA主任备忘录,告诉他们对强化扫描政策的技术分析

    youdao

  • Some of the methods require the caller to supply evidence, which is the set of information that constitutes input to security policy decisions, such as which permissions can be granted to code.

    有些方法要求调用提供证据。证据构成安全策略决策(哪些权限可以授予代码)输入的一信息

    youdao

  • Some of the methods require the caller to supply evidence, which is the set of information that constitutes input to security policy decisions, such as which permissions can be granted to code.

    有些方法要求调用提供证据。证据构成安全策略决策(哪些权限可以授予代码)输入的一信息

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定