security implementation造句
例句與造句
- provides an overview of the windows forms security implementation
提供windows窗體安全性實現(xiàn)的概述。 - as far as the average program is concerned, the details of the security implementation don t matter very much
就一般程序來說,安全性實現(xiàn)的細(xì)節(jié)并不重要。 - security qos specifies whether a service invocation supports security and the exact security implementation
安全qos定義了服務(wù)調(diào)用是否需要支持安全以及明確的安全實現(xiàn)。 - axis ws-security implementation is based on handlers so that you can don t have to change the code to secure it
:axisws-security實現(xiàn)是基于處理程序的,所以不必通過更改代碼來保護(hù)它。 - transport-level security implementation in gsi achieves authentication between grid entities using tls and x509 certificates
在gsi中,傳輸層的安全實現(xiàn)可以在網(wǎng)格實體之間使用tls和x509證書進(jìn)行身份驗證。 - It's difficult to find security implementation in a sentence. 用security implementation造句挺難的
- community is the efficient carrier of the social security implementation and it exerts important function in the social security system
社區(qū)是社會保障實施的有效載體,在社會保障體系中發(fā)揮重要的功能。 - in other words, the applications that developers build should be loosely coupled from security implementation and infrastructure
換句話說,開發(fā)人員構(gòu)建的應(yīng)用程序應(yīng)該在安全實現(xiàn)和基礎(chǔ)設(shè)置之間保持松耦合的關(guān)系?!?/li> - gluecode ships with a login module for ldap that can be configured against ldap servers for a more robust security implementation
gluecode為ldap所附帶的登入模組,能夠針對ldap伺服器進(jìn)行設(shè)定,以得到一個更為健壯的安全實作。 - deciding which security implementation is best for a web service begins with looking at two key security principles : authentication and authorization
要決定哪個安全實現(xiàn)最適合web服務(wù),先考慮兩個關(guān)鍵的安全原則:身份驗證和授權(quán)。 - many security implementations make the fundamental assumption that the user interacting with it is a real user think about auditing, and so on
許多安全實現(xiàn)都進(jìn)行一個基本假定,即與其進(jìn)行交互的用戶是一位真實用戶(考慮到審核等)。 - for the security implementation to function correctly, the servlet is put into the secured area that only authenticated auditors and users can access
為了讓安全實現(xiàn)正確發(fā)揮作用,servlet被放到受保護(hù)區(qū)域,以便只有通過認(rèn)證的審計員和用戶可以訪問。 - changes in the security implementation do not warrant any changes in the application code itself since they are all being enforced by the j2ee container using the jaas standards
安全實現(xiàn)中的更改并不保證應(yīng)用程序代碼本身的任何更改,因為它們都是由采用jaas標(biāo)準(zhǔn)的j2ee容器執(zhí)行的。 - anti-virus software is a necessary part of any security implementation, but some machines may not have the anti-virus software installed, or may be out-of-date, leaving them open to attack
反病毒軟件是任何安全性實現(xiàn)的一個必需部分,但是有些機器可能沒有安裝反病毒軟件,或者軟件可能過時了,從而使它們門戶大開易受攻擊。 - the information security management committee and the government information security incident response office were set up to oversee it security implementation and advise bureaux and departments on it security issues
政府成立了資訊保安管理委員會和政府資訊保安事故應(yīng)變辦事處,以監(jiān)察資訊保安政策的執(zhí)行情況,并就資訊保安事宜為各決策局和部門提供意見。 - the security implementation of this system is based on pki / ca . the pki / ca frame realizes the creating, storing, issuing, recalling certificates so as to provide data integrity and identity authentication for the system
pkica是一個比較全面的實施安全的體系結(jié)構(gòu),用來實現(xiàn)基于公鑰密碼體制的證書產(chǎn)生、管理存儲、發(fā)行和作廢等功能,其中證書體制和ca得到了廣泛的應(yīng)用。
更多例句: 下一頁