单词 | security policies | ||||||||||||||||
释义 | security policies
更多释义 收起释义 例句释义: 安全策略,安全政策,资安政策 1. Enterprise security policies might be considered part of the conformance dimension, but security is often a complex cultural issue. 企业安全策略可能作为一致性维度的一部分,但安全性常常是一个复杂的文化问题。 www.ibm.com 2. CFS is now the only forum linking governments, international institutions and civil society in improving food security policies. 世界粮食安全协会是目前唯一一个联系政府,国际机构和公民社会并致力于食品安全政策的论坛。 www.bing.com 3. The experiment shows that this system can assess any kind of information system, and provides security policies for organizations. 实验表明,所设计的风险评估系统能用于各种信息系统的安全性评估,为组织实现自己的安全策略提供参考。 www.ceps.com.tw 4. The Security Configuration Wizard allows you to create XML-based security policies, which can then be applied to your servers. 安全配置向导允许你创建基于XML的安全策略。它们可以应用到你的服务器上。 www.bing.com 5. You will need to check with your security policies to determine what these values have been set to for your enterprise. 你需要对照你的服务器安全策略来决定该设哪些值。 blog.sina.com.cn 6. The value you choose for the AUTHENTICATION parameter depends on your particular environment as well as local security policies. 为AUTHENTICATION参数选择的值依赖于具体环境和本地安全策略。 www.ibm.com 7. Our intelligence and homeland security efforts must be integrated with our national security policies, and those of our allies and partners. 我国的情报工作和国土安全措施必须配合我国和盟国及伙伴的国家安全政策。 www.america.gov 8. The staff in this position should work safety and follow security policies and security procedures formulated by the company. 该职位员工须安全开展工作并遵循公司已建立的安全政策和安全程序。 jobs.zhaopin.com 9. Thus, whenever an MDM service is called, DataPower enforces the appropriate security policies before routing the call to MDM Server. 因此,当调用MDM服务时,DataPower会在将调用路由到MDMServer之前实施正确的安全策略。 www.ibm.com 10. Make sure they aren't prone to social engineering and educate and remind internal users of the company's security policies. 确保他们不受社交工程的侵害,教育并提醒内部用户公司的安全制度。 www.ibm.com 1. For one model, you may wish to have security policies and controls built upon the foundation of technologies. 对于一个模型,您可能会希望以技术为基础构建安全策略和控制。 www.ibm.com 2. Additional factors that can complicate the deployment of tools are the company's network structure and security policies. 其他的可能使得工具部署复杂化的因素是公司的网络结构及安全规则。 www.ibm.com 3. Instead your time can be dedicated to designing security policies, category trees, and the system labels. 相反,你的时间可以用来设计安全策略,目录树,以及系统标签。 www.ibm.com 4. Hence, how to maintain military alliance with the U. S. was the first priority in South Korea's foreign and security policies. 因此如何维持与美国的军事同盟成为南韩外交与安全的首要目标。 www.ceps.com.tw 5. Like the first model type, security policies fall into three types: built-in, customized and high-level. 和第一个模型类型类似,安全策略也分为三类:内置、自定义和高级策略。 www.ibm.com 6. The main tasks of the host firewall in DFW are capturing network_packets, receiving security policies, sending logs and "heartbeat" . DFW中主机防火墙的主要任务可归纳为以下几点:网络数据包拦截、安全策略接收、日志发送模块以及“心跳”发送。 www.fabiao.net 7. As shown in Figure 6, the core layer starts with security policies and procedures as a foundation. 如图6中所示,核心层以安全策略和过程作为基础。 www.ibm.com 8. Governance and risk management provide the mechanism to implement and enforce security policies within the larger SOA environment. 治理和风险管理提供了在更大的SOA环境中实现和强制执行安全策略的机制。 www.ibm.com 9. I'm the European Union and I'm responsible for my members' economic, social and security policies. 我就是欧盟并且我负责我成员国的经济,社会和安全政策问题。 www.kekenet.com 10. Are IT security policies, procedures and standards in place and provided to employees in the form of training? IT安全政策,程序,标准是否具备,并已培训的形式提供给员工。 bbs.fobshanghai.com 1. Both countries still refer to the alliance as a cornerstone of their security policies, but it is, says Mr Finnegan, a brittle one. 芬尼根说,尽管两国都还将同盟关系视作安全政策的基石,但它已臻脆弱。 www.bing.com 2. Security label components are the building blocks for security policies and labels. 安全标签组件是用于安全策略和安全标签的构建块。 www.ibm.com 3. Combating these attacks ultimately requires a conscious effort, trained individuals, useful tools, and sound security policies. 最终挫败这些攻击需要投入自觉的努力、经过培训的人员、有用的工具以及良好的安全制度。 www-128.ibm.com 4. His removal may make it easier for the US to ease away from terrorism-centric foreign- and national-security policies. 对他的抹杀或许能让美国从围绕着恐怖主义的国内外安全政策中渐渐放松下来。 www.bing.com 5. The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules. 这个策略的范围包括了隐私策略和规则,安全性策略和规则、交易和实施规则。 www.ibm.com 6. Additional factors like network topologies and security policies can further complicate the configuration and deployment of GDD tools. 另外,例如网络拓扑以及安全策略会进一步使得配置及开发GDD工具变得更复杂。 www.ibm.com 7. China says its online security policies are needed to fight pervasive fraud, cyberattacks, pornography and rumormongering. 中国政府表示,国家需要网络安全政策来打击猖獗的网络诈骗、网络攻击、色情信息和网络谣言。 cn.nytimes.com 8. Access control. Enables the system to recognize security policies for groups of users. 访问控制—使系统能够识别用户组的安全性策略。 www.ibm.com 9. To agree what security policies, standards and tools are applicable to the enterprises participating in the collaborative efforts. 为了就适用于参加协作工作的企业的安全策略、标准和工具达成一致意见。 www.ibm.com 10. Like standard queries, answer solution queries are subject to query execution enforcement as specified by security policies. 与标准查询一样,回答解决方案查询也受到安全策略指定的查询执行条件的控制。 www.ibm.com 1. These security policies are defined using the master data in the system. The policies require no customer development. 使用系统中的元数据定义这些安全策略,客户不需要开发它们。 www.ibm.com 2. However, as more security is needed, new security policies can be created to restrict viewing. 然而,随着安全需求的增加,就会创建新安全策略来限制查看。 www.ibm.com 3. All security policies defined with RFIDIC have ALLOW semantics, meaning, the policies define what data can be disclosed. RFIDIC定义的所有安全策略都具有ALLOW语义,这意味着策略定义哪些数据是可以公开的。 www.ibm.com 4. Each grid resource may have different security policies that need to be complied with. 每一种网格资源都可能需要遵从多种不同的安全策略。 www-128.ibm.com 5. The database security administrator configures the LBAC system by creating security policies. 数据库安全管理员通过创建安全策略来配置LBAC系统。 www.ibm.com 6. This certificate will touch upon IT security policies and how digital forensics can help in investigating a security breach. 此课程将讨论其安全策略,并了解如何调查安全漏洞。 www.usa-degree.com 7. Initial application security policies can be defined in some deployment artifacts (e. g. , deployment descriptors for J2EE applications). 可在某些部署构件(如J2EE应用程序的部署描述符)中定义初始应用程序安全策略。 www.ibm.com 8. However, many labeling approaches often require complicated managerial efforts in order to set up and enforce security policies correctly. 然而,为了让安全政策可以正确的运行,这些方法需要复杂且冗长的管理。 dictsearch.appspot.com 9. Administrators can define security policies upfront, and empower project managers to choose the policy that best applies to their project. 管理员能够定于安全策略,并授权项目经理选择对于他们的项目最好的安全策略。 www.ibm.com 10. Yes, you can meet organizational security policies in the environments you dispense with WebSphere CloudBurst. 是的,您可以在WebSphereCloudBurst分发的环境中满足组织安全策略的要求。 www.ibm.com 1. Centralizing the implementation of security policies, log analysis and reporting is a good thing. 安全策略、日志分析与报告的中心化实现是个不错的主义。 www.infoq.com 2. Next, measure the level of business risk associated with your assets according to your security policies. 接下来,根据您的安全策略,度量与您的资产相关的业务风险级别。 www.ibm.com 3. Security-Create, implement, and maintain Security policies and procedures. 设计,集成和维护安全解决方案。 www.jobui.com 4. Users are granted access to projects through Security policies, and their actions are defined by their Role. 通过安全策略,用户被授权访问项目,他们的活动是通过他们的角色定义的。 www.ibm.com 5. The case for strategic energy security policies is not much stronger for natural gas. 在天然气领域,实施战略能源安全政策的理由并不更加充分。 www.ftchinese.com 6. Also important are the security policies that vary from one application to another and one operating system to another. 应用程序之间和操作系统之间的安全性策略不相同,这一点也很重要。 www-128.ibm.com 7. Describes guidelines and tools for adjusting. NET Framework security policies. 描述用于调整.NETFramework安全策略的指导和工具。 msdn2.microsoft.com 8. Client Security policies are applied at the computer level, not at the user level. ClientSecurity策略被应用于计算机级别,而非用户级别。 technet.microsoft.com 9. Ensure the security of all company assets and property, and that security policies are followed. 确保公司所有资产的安全,并确保公司严格遵循安全政策。 www.lietou.com 10. It is essential therefore that your security policies are regularly reviewed for relevance and effectiveness. 因此,定期评估你的安全政策的相关性和有效性是非常重要的。 blog.163.com 1. Client Security policies apply as a single discrete unit; they are applied as a whole and replaced as a whole. ClientSecurity策略作为单个离散单位进行应用;它们将作为一个整体进行应用,并且作为一个整体被替换。 technet.microsoft.com 2. If access to projects is a concern, then you can create security policies that control access to certain groups. 如果对项目的访问是您所关注的,那么您应该创建一个安全策略来控制一定的组能够访问项目。 www.ibm.com 3. Along with this database, the TE implements security policies that add another level to system security. 除了这个数据库以外,TE还实现了安全策略,从而增添了另一个级别的系统安全性。 www.ibm.com 4. You must adequately define all security policies to ensure uptime availability guarantees with little or no interruption thresholds. 用户必需充分定义所有的安全性策略以确保正常运行时间的可用性保证,而没有或很少有中断阈值。 www-128.ibm.com 5. Local security policies can help to protect your machines against local account usage. 本地安全策略可帮助你在使用本地账号的情况下保护机器。 www.bing.com 6. User authentication via LDAP linkage eases the enforcement of companylevel security policies. 通过LDAP链接进行的用户验证减轻了企业全局安全策略管理的工作量。 www.xerox.com.cn 7. Administrator: Users in this role can run any query in the Data Browser, create security policies, and browse and resubmit failed events. Administrator:属于这个角色的用户可以在DataBrowser中运行任何查询、创建安全策略以及浏览和重新提交失败的事件。 www.ibm.com 8. Windows Forms security is based on the security policies established within the. NET Framework. Windows窗体安全性基于.NETFramework内建立的安全策略。 msdn2.microsoft.com 9. Record of all security policies applied to all objects. 应用于所有对象的所有安全性策略的记录。 www.ibm.com 10. Testing result shows that GGFAC can support multiple security policies in grid and improve system performance. 系统测试结果表明,该框架能够支持网格环境中多安全策略需求,并有效提高系统效率。 www.ceps.com.tw 1. The administration must support those in the trenches who are advancing climate security policies. 政府必须对那些推动气候安全政策的行动给予支持。 ideacarbon.org 2. Figure 1 shows how WLAN security layers, security threats and security policies are correlated together. 图1所示为无线局域网安全层、安全威胁及安全策略的相互关系。 blog.sina.com.cn 3. The LSM framework was designed to be so flexible that it can implement many different kinds of security policies. LSM框架设计得如此灵活,它可以实现很多不同种类的安全策略。 www.ibm.com 4. High-level security policies are documents in manual or digital format. 高级安全策略是硬拷贝或数字格式的文档。 www.ibm.com 5. These groups and roles can be used in Security policies such as access permission for each object within the IBM Cognos 8 portal. 这些组和角色可用于一些安全性策略,比如针对IBMCognos8门户中的每个对象的访问权限。 www.ibm.com 6. The available filter actions are shared by all IP security policies. 所有IP安全策略共享可用的筛选器操作。 angel.w15.5tom.cn 7. Decrypt the response if the security policies dictate it. 如果安全策略要求,则对请求进行解密。 www.ibm.com 8. As part of assigning a risk level, you have to consider the security policies assigned to the data. 作为分配风险等级的一部分,必须考虑分配给数据的安全性策略。 www.ibm.com 9. The available IP filter lists are shared by all IP Security policies. 可用的IP筛选器列表被所有的IP安全策略共享。 angel.w15.5tom.cn 10. The table here lists the security policies for the security group default. 这里的表格列示了安全组default的安全策略。 www.ibm.com 1. SecurityAnalyst: Users in this role can create security policies. SecurityAnalyst:属于这个角色的用户可以创建安全策略。 www.ibm.com 2. It can help security managers find out the security law adjust security policies and improve the security of hosts and the network. 结论利用该方法获得的评估结果能够指导安全管理人员调整安全策略,以便提高主机和网络的安全性。 www.ceps.com.tw 3. The use of security policies is a fundamental concept in the design. 安全策略的使用是设计中的基础概念。 www.ibm.com 4. new security policies from HTC. 新的安全政策 blog.sina.com.cn 5. In order to develop effective security policies and security testing, you must first understand the components that make up your network. 为了开发有效的保密性措施和保密性测试,你首先应该理解组成网络的各个部件。 bbs.51testing.com 6. And because it can be monitored by your IT department, it can be managed according to your organization's security policies. 由于LotusSametimeEntry可由IT部门进行监视,因此就能够根据组织的安全政策对之加以管理。 www.ibm.com 7. Security policies vary according to the type of the device and how it is used. 安全策略因设备的类型和使用方式而异。。 msdn2.microsoft.com 8. Depending on the security policies that your installation uses, you might want to create a new username for Microsoft SQL Server use. 根据您的安装所使用的安全性策略,您可能想创建一个新用户名来使用MicrosoftSQLServer。 www-128.ibm.com 9. Implement security policies such as account locking, password age, and so on. 执行安全策略,例如帐户锁定、密码期限,等等。 www-128.ibm.com 10. Mastering MS Windows Operation System - system administration, troubleshooting, security policies; 控制微软操作系统:操作系统管理;问题解决;安全策略… www.office1.cn 1. Service registry if security policies or profiles are held with a service definition in the registry 服务注册中心,如果安全策略或配置文件在注册中心中使用服务定义配置 www.ibm.com 2. Comparison of Energy Security Policies within the Global 能源安全政策的国际比较 www.ilib.cn 3. Use the WebSphere Application Server console to disable web service security policies for the sample service 使用WebSphereApplicationServer控制台禁用示例服务的Web服务安全策略 www.ibm.com 4. Theoretical Enlightenment of Reforms in Social Security Policies in Western Countries 西方社会保障政策改革的理念启示 scholar.ilib.cn 5. Identify Risk Analyze Risk Manage Risk Loss Prevention and Security Policies Systems and procedures 确认风险分析风险管理风险防损与安全政策系统和流程 wenku.baidu.com 6. History Sensitivity of the Multilevel Security Policies 多级安全性政策的历史敏感性 www.ilib.cn 7. Security Policies for Enterprises in Information Strategy 企业网络信息安全策略 service.ilib.cn 8. Destructive effects of security policies of Ming Dynasty on environment 论明朝安全政策的环境影响 www.ilib.cn 9. Analysis and Resolution of Integration of Multi Security Policies 多安全策略集成性问题的分析与解决 www.ilib.cn 10. familiar with work process and social security policies of human resources; 熟悉了解人力资源管理工作内容和环节,熟悉了解社保各项政策; 010.zp.com 1. The Influence of Pragmatic Philosophy on US Foreign and Security Policies 实用主义哲学对美国外交与安全政策的影响 ilib.cn 2. Malpractice in the enforcement of social security policies in the Ming Dynasty 略论明代社会保障政策实施中的弊端 www.ilib.cn 3. Security Policies Study for Information Systems 信息系统安全策略研究 service.ilib.cn 4. Run-time integrity check by configuring security policies 通过配置安全策略来执行运行时完整性检查 www.ibm.com 5. Security architecture to support multiple security policies based on access control space 基于访问控制空间的多策略安全体系结构 www.ilib.cn 6. Securing Desktops and Services by Using Security Policies 用安全策略保护台式机和服务器 club.yesky.com 7. Using Group Policy to deploy Client Security policies 使用组策略部署ClientSecurity策略 technet.microsoft.com 8. Security Policies for News Non-linear Editing Network 新闻非编制播网安全策略 www.ilib.cn 9. Social Security Policies of Bush Government 布什政府的社会保障政策 ilib.cn 10. Security Policies on Campus Networks 校园网安全策略的探讨 service.ilib.cn 1. Security policies in stock network 证券网络的安全策略 www.ilib.cn 2. Partial Security Policies to Support Timeliness in RTDBS 支持实时数据库的局部安全性策略 www.ilib.cn 3. Security Policies Based on Object in Security-Enhanced Operating System 安全操作系统中基于客体的保护机制 www.ilib.cn 4. security policies, which we have improved in 1. 1 安全策略,这个在1.1里面有了改进 www.infoq.com 5. Social Security Policies in China 中国社会保障政策 lwbase.com 6. A Discussion on the Social Security Policies of Informal Employment Group in Our Country 我国灵活就业群体的社会保障政策探讨 www.ilib.cn |
||||||||||||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。