网站首页  词典首页

请输入您要查询的英文单词:

 

单词 security requirements
释义

security requirements

  • 网络安全需求;安全要求;安全需求制定
1.
安全需求
信息安全术语大全... ... 423. 安全报告 security report 424. 安全需求 security requirements 425. 安全规则 security rules ...
lcyhunter02.blog.163.com
2.
安全要求
机械英语翻... ... 5 密封性 Sealing Performance 7 安全要求 Security Requirements 附:使用环境条件 Remarks:Usage Environ…
zhidao.baidu.com
3.
安全需求制定
安全需求制定(security requirements)安全操作(security operations) 风险管理(risk management):Touchpoints试图建立出一个 …
knowledge.twisc.ntust.edu.tw
4.
安全性需求
...formance Requirements) ? 安全性需求(Security Requirements) ? 系统运营需求(Operational Requirements) ? 可用性需求(…
www.docin.com
5.
安全性要求
... ) Security requirement 安全要求 ) security requirements 安全性要求 ) the security demand of France 法国的安全要求 ...
www.dictall.com
6.
资讯安全需求
国家型科技计划 ... 3.4资讯安全需求SECURITY REQUIREMENTS) 00003.4.1授权管理基础建设( AUTHORIZATION MAN…
www.ntpo.org.tw
7.
安检要求
:::::枫果旅游::::: »... ... 6. 餐饮的特别需求 Special meal 7. 安检要求 Security requirements 8. 行李锁 Lock ...
blog.51.ca

例句

释义:
1.
Once you know your program's security objectives, you can identify the security requirements by filling in more detail.
一旦知道了程序的安全性目标,就可以通过更详细地填充其内容来确定安全性需求。
www.ibm.com
2.
While designing the policy for a region, take into consideration the security requirements for deployment as well.
在设计一个区域的政策时,还应考虑到部署的安全需求。
www-128.ibm.com
3.
Note that the security requirements described here are not specific to SOAP, but they apply to any kind of message transmission.
请注意,这里所描述的安全性要求并不是SOAP所专有的,它们能适用于任何种类的消息传输。
www.ibm.com
4.
Though some specifics of security can be part of the policy, not all the security requirements need to be part of the policy.
尽管某些安全细节可以作为策略的一部分,但并非所有安全需求都必须成为策略的一部分。
www.ibm.com
5.
Security-transparent code passes all the security requirements of the code it calls back to its callers.
安全透明的代码会将其调用的代码的所有安全要求全部传递回调用方。
msdn2.microsoft.com
6.
In a production environment, ensure that your user account settings are in compliance with your network security requirements.
在生产环境中,请确保用户帐户设置符合您的网络安全性要求。
msdn2.microsoft.com
7.
It therefore lets you to plug in the appropriate authentication service to meet your security requirements.
它使您可以插入合适的身份验证服务来迎合您的安全需求。
www.ibm.com
8.
Each of these applications or activities has its own security requirements.
每一个应用程序或活动都具有自己的安全要求。
msdn2.microsoft.com
9.
A review of security requirements and implementation is an important part of this stage of the assessment.
对安全需求和实现的检查是这一阶段评估的重要部分。
www.ibm.com
10.
Describes the security requirements to use remoting and the basic approaches to help build secure remoting applications.
描述对使用远程处理的安全性要求以及帮助生成安全的远程处理应用程序的基本方法。
msdn2.microsoft.com
1.
First it briefly discusses security requirements and related key techniques which are necessary to protect an electronic business system.
文章首先简单地分析了电子商务系统在安全方面的需求,介绍了相关核心技术。
lib.nwnu.edu.cn
2.
As you plan your application, keep in mind its security requirements over its lifetime.
当您规划应用程序时,应牢记应用程序生存期内的安全要求。
technet.microsoft.com
3.
Policies include security requirements and other conditions that must be met to communicate with a service.
策略包括安全要求和其他条件,必须满足这些要求和条件才能与服务进行通信。
msdn2.microsoft.com
4.
Of course, security is a relative term; you will have to make some decisions as to the security requirements of your users.
当然,安全性是一个相对的术语;您必须作出一些关于用户安全性需求的决定。
www-128.ibm.com
5.
Satisfying security requirements without hamstringing programmers.
无需程序员即可满足安全需求。
www.ibm.com
6.
In a production environment, make sure that your user account settings are in compliance with the network security requirements.
在生产环境中,请确保用户帐户设置符合您的网络安全要求。
technet.microsoft.com
7.
Adopting practical approaches to interpreting and implementing measures will help ensure compliance with maritime security requirements.
培训师将通过实用而且效的方法来解释各项安全措施,保证其符合各项海事安全要求。
www.lr-china.org
8.
By including security in SOA life cycle management, all documents must be evaluated to ensure that security requirements are met.
通过在SOA生命周期管理中包括安全性,所有文档都必须经过评估才能确保安全需求得到满足。
www.ibm.com
9.
In the U. S. , security requirements for federal employee smart cards were developed under Federal Information Processing Standard 201.
在美国,对联邦雇员智能卡的安全要求根据联邦信息处理标准201规章进行规定。
www.etiri.com.cn
10.
Configuring Team Foundation Server to use HTTPS and SSL has advantages for businesses that have increased security requirements.
对于有更高安全要求的业务,将TeamFoundationServer配置为使用HTTPS和SSL具有一些优点。
msdn2.microsoft.com
1.
It also creates a set of documents that identify and justify the security requirements of the database.
同时,该过程还会创建一系列文件,以识别和调整数据库的安全需求。
shi-wei.net
2.
Before you apply any of these options, you must understand your application's security requirements.
在应用任何这些选择前,您必须先了解应用程序的安全要求。
msdn2.microsoft.com
3.
Instead, it serves as a guideline for ensuring Workplace Services Express meets your minimum security requirements.
相反,它是确保WorkplaceServicesExpress符合最低安全要求的指导原则。
www-128.ibm.com
4.
You may prefer another method, depending on your security requirements and personal preferences.
您可能更喜欢其他方法,具体的使用取决于安全需求和个人爱好。
www.ibm.com
5.
It may not meet the security requirements for a specific environment, and it should not be used exactly as shown.
该代码可能不符合特定环境的安全要求,因此不应原样搬用所显示的代码。
technet.microsoft.com
6.
Public environment of a lot of design thinking too little of human nature, human mind, not taken into consideration security requirements.
公共环境中很多设计人性化的思考太少,对人的心理、安全需求没有考虑。
www.qk114.net
7.
I wont directly address security requirements here; however, they are likely to be important to the choice of ESB technology.
我不想在这里直接提出安全需求,不过它们对选择ESB的实现技术非常重要。
www-128.ibm.com
8.
The configuration you choose is influenced by the security requirements of the application you develop.
您开发的应用程序的安全性要求将影响选择的配置。
msdn2.microsoft.com
9.
Determine the security requirements for your e-mail communication.
确定电子邮件通信的安全要求。
msdn2.microsoft.com
10.
Meeting security requirements for smart devices requires products and services that are built with device specifications in mind.
要达到智能设备的安全要求,需要具备根据设备规范构建的产品和服务。
www.certicom.com
1.
The analysis shows that the new protocol meets the security requirements of password authenticated key exchange protocols .
分析结果表明,新协议满足基于口令的认证密钥交换协议的安全性要求。
dictsearch.appspot.com
2.
Used the case methodology to carry on the analysis to the information system security requirements.
采用个案研究法对信息系统安全需求进行分析。
www.594wm.com
3.
As part of identifying cyber security requirements, include user agreements and notification and warning banners.
作为确定网络安全要求的一部分,包括用户协议和通知和警告标语。
blog.sina.com.cn
4.
Depending on the application, there can be additional security requirements.
根据应用程序的不同,可能会有额外的安全需求。
www.ibm.com
5.
Administrator meet the security requirements of this application.
管理员满足此应用程序的安全要求。
msdn2.microsoft.com
6.
Is backup data maintained in a manner to support applicable availability and security requirements?
备份数据是否被保存用来支持应用的有效性和安全要求吗?
zhidao.baidu.com
7.
Satisfy the entire set of security requirements listed in the requirements document.
满足需求文档中列出的整个安全需求集。
www.ibm.com
8.
W. Bush, both foreign-policy presidents who subordinated their domestic ambitions to America's national-security requirements.
布什是相反的,尼克松和布什都是外交政策总统,他们国内的目标是服从于美国国家安全要求的。
www.bing.com
9.
Their failure doesn't directly impact the completion of a transaction, and security requirements are minimal.
它们的失败并不会直接影响事务的完成,安全需求最小。
www.ibm.com
10.
The more intricate security requirements are definitely something that developers, especially ones not versed in security, may easily miss.
就会有更复杂的安全需求来明确开发人员,尤其是对安全并不十分熟悉的人员,他们更容易遗忘。
www.ibm.com
1.
But once the system has been installed to meet security requirements, only half the battle is won.
但是为了确保满足安全性需求而安装系统之后,整个战役才打赢了一半。
www.ibm.com
2.
They have to design and implement software solutions and applications that meet these tight security requirements.
它们必须设计和实现能够满足这些严格的安全需求的软件解决方案和应用程序。
www.ibm.com
3.
Establishing security requirements Introduction evaluation and review of security policy.
建立安全政策的介绍评价和回顾。
www.securitycn.net
4.
For security requirements, this new scheme satisfies confidentiality, unforgeability and public verifiability.
在安全性方面,新方案满足机密性、不可伪造性和可公开验证性。
www.ceaj.org
5.
Good security requirements and analysis practices will significantly reduce system security risk.
良好的安全需求与分析实践将极大地减少系统安全风险。
www.ibm.com
6.
This topic describes the security requirements that must be fulfilled before a Microsoft Office 2003 solution can be used.
此主题介绍使用MicrosoftOffice2003解决方案前必须满足的安全要求。
msdn2.microsoft.com
7.
Determine the security requirements that are unique to your environment.
确定具体环境特有的安全要求。
technet.microsoft.com
8.
Answer: The Version 5 Tech Preview does not express security requirements in the Web Services Description Language (WSDL) files.
答:版本5技术预览并不用Web服务描述语言(WebServicesDescriptionLanguage,WSDL)文件表达安全性需求。
www.ibm.com
9.
Everything is now working, but because of security requirements, you can access only the server from which you downloaded the applet.
现在万事俱备,但是因为安全性要求,您只能访问下载applet的服务器。
www.ibm.com
10.
The security proof in the standard model ensures that the security of protocol in the real application to meet higher security requirements.
标准模型下的安全性证明能保证协议在实际应用中的安全性,满足更高的安全要求。
www.fabiao.net
1.
Typically, if new customers are added, you can add a stack with the same configuration, meeting security requirements more easily.
通常,如果添加了新客户,则需要添加一个相同配置的栈,以便更轻松地满足安全需求。
www.ibm.com
2.
Technical product documentation. Handling of computer-based technical information. Part 1 : security requirements.
技术产品文献加工.计算机技术信息处理.第1部分:安全要求
www.mapeng.net
3.
There's actually an international standard that you can use to formally identify security requirements and determine if they are met.
事实上您可以使用一个国际标准来正式确定安全性需求并确定它们是否满足要求。
www.ibm.com
4.
Passengers cooperation in complying with all security requirements will ensure safe air travel for all.
旅客遵照所有保安规定,有助保障航空旅行的安全。
www.hongkongairport.com
5.
Then you can concentrate on the security requirements of your program.
然后您可以将精力集中在您程序的安全性需求上。
www.ibm.com
6.
The following table generalizes some of the security requirements from common regulatory compliances.
下面的表格归纳了常见法规遵从性的一些安全需求。
www.ibm.com
7.
Together these two standards support describing WS-Security requirements in machine-readable form.
这两者合起来可以以机器可读的方式描述WS-Security需求。
www.ibm.com
8.
For more information about ASP. NET security requirements, see ASP. NET Debugging: System Requirements.
有关ASP.NET安全要求的更多信息,请参见ASP.NET调试:系统要求。
msdn2.microsoft.com
9.
Design choices and implementations that address security requirements often have an adverse impact on a solution's performance.
满足安全性需求的设计选择和实现通常会对解决方案的性能有不利的影响。
www.ibm.com
10.
Security requirements are highly specific to individual applications and vary in complexity.
安全需求与单个应用程序关系很大,并且复杂性各有不同。
www.ibm.com
1.
Here, the "SOA security cloud" represents all security services meeting all SOA security requirements.
这里的“SOA安全集合”代表满足所有SOA安全需求的所有安全服务。
www.ibm.com
2.
Most packet-filtering technologies have not addressed all security requirements.
多数包过滤技术没有满足所有的安全要求。
www.bing.com
3.
Transatlantic air travellers faced delays yesterday after the US stepped up security requirements for all in-bound aircraft.
由于美国对所有入境航班加强安检,昨日美欧之间的航班延误。
www.veryen.org
4.
The scheme can achieve security requirements and has less computation and communications load.
方案在满足安全性要求的前提下,具有较小的计算和通信开销。
www.joca.cn
5.
The security requirements mentioned in the previous scenario can be realized using the Security Policy Editor as follows.
可以按照下面的说明使用SecurityPolicyEditor实现前面场景中的安全需求。
www.ibm.com
6.
The basic security requirements on information systems also apply to Web Services messaging.
资讯系统的基本保安要求亦适用于网络服务信息传递。
www.info.gov.hk
7.
Classes of Web services would share performance, state, and security requirements.
Web服务的类可以共享性能、状态和安全性的要求。
www.ibm.com
8.
Let us now consider the range of security requirements that JACC might fulfill.
下面让我们看看JACC可能能够满足的一系列安全需求。
www.ibm.com
9.
We almost always run SQL Relay on dedicated virtual machines, to match our security requirements.
我们几乎总是在专门的虚拟机上运行SQLRelay,以满足安全需求。
www.ibm.com
10.
In the following sections, I'll summarize the security technologies that realize the above two security requirements.
在下一部分中,我将概述一下实现以上两项安全性要求的安全性技术。
www.ibm.com
1.
What are your performance, scaling, and security requirements?
性能、可伸缩性和安全要求是什么?
www.ibm.com
2.
Each application has unique security requirements.
每个应用程序都有独特的安全要求。
msdn2.microsoft.com
3.
Key length in certificate is too small for configured security requirements.
对于配置的安全要求来说,证书里的密钥长度太小。
angel.w15.5tom.cn
4.
Just have one list, either an allow list or deny list depending on what your security requirements are.
应该根据自己的安全需求,只使用允许列表或拒绝列表之一。
www.ibm.com
5.
NIS is, however, significantly more difficult and complex to set up and keep running because of the security requirements.
不过,由于安全方面的要求,NIS 的设置和正常运行较为困难,更为复杂。
www.ibm.com
6.
In the end, you should choose to use the form of encryption that meets your security requirements.
最后,您应该选择使用符合自身安全需求的加密方式。
www-128.ibm.com
7.
To enforce the specified security requirements.
强制指定的安全要求。
msdn2.microsoft.com
8.
Factory employee security requirements are met.
是否达到工厂雇员相关安全需求?
www.e2shop.cn
9.
Every-Sprint: These are the high priority and critical security requirements that can be identified using techniques like Threat Modeling.
每次Sprint(Every-Sprint):这些是高优先级和重要的安全性需求,我们可以使用像威胁建模之类的技术来识别它们。
www.infoq.com
10.
Before you can determine if a program is secure, you need to determine exactly what its security requirements are.
在您可以确定程序是否安全之前,需要先确切地确定其安全性需求是什么。
www.ibm.com
1.
It ignored foreseeable major factors such as contingency provision, tax obligations, and policing and wider security requirements.
它忽略了可预见的重大因素,如应急经费、税收,以及维持治安和更广泛的安全要求。
cn.reuters.com
2.
When deploying an Office solution, check to make sure you have fulfilled all necessary security requirements.
部署Office解决方案时要进行检查,以确保所有必需的安全要求均已满足。
msdn2.microsoft.com
3.
Table 1 summarizes which security requirements can be satisfied by SOAP-DSIG and SSL.
表1总结了哪些安全性要求能通过SOAP-DSIG和SSL来满足。
www.ibm.com
4.
A comprehensive research has made in the theoretical model and the security requirements for security group signature scheme.
对安全群签名体制的理论模型,安全性需求进行了深入的研究。
soso.361xs.com
5.
First, you must strive to build as simple a system as possible, while still meeting your security requirements.
首先,您必须努力构建尽可能简单的系统,同时仍然要满足安全性需求。
www-128.ibm.com
6.
In order to implement end-to-end security, you must compartmentalize the security requirements and also evaluate the products available.
为了实现全程安全性,必须对安全需求进行分类并评估可用的产品。
www.ibm.com
7.
That is, you will need to plan for security requirements when you design the layout of your topic trees.
也就是说,设计主题树布局时需要计划安全性要求。
www.ibm.com
8.
Here, I'll consider authentication as involving two kinds of security requirements.
在这里,我将身份验证看作是两种安全性要求的结合。
www.ibm.com
9.
Business, administrative, user, and security requirements directly affect the design of your Exchange Server 2003 messaging system.
业务、管理、用户以及安全性等需求将直接影响ExchangeServer2003邮件系统的设计。
technet.microsoft.com
10.
Three security components came into play to meet our security requirements
为满足我们的安全需求,需要运行三个安全组件
www.ibm.com
1.
Security requirements for trustworthy systems managing certificates for electronic signatures - System security requirements
电子签名用可靠系统管理证书的安全要求.系统安全要求
www.mapeng.net
2.
Describe the typical security schemes used to meet the security requirements
满足安全要求的安全方案
wenku.baidu.com
3.
Marine transportation enterprise security requirements summon safe education
海运企业安全需求呼唤安全教育
service.ilib.cn
4.
Information technology--Security requirements for application level firewall
信息技术应用级防火墙安全技术要求
www.zftrans.com
5.
Assemble the appropriate processes, components and capabilities to address IT Security requirements for SOX and audit compliance;
综合适当的程序、组成和性能,以保证信息安全必要需求满足SOX和审计的要求;
www.51job.com
6.
Security Requirements on Authentication Protocols Using Challenge-Response
基于挑战-响应的认证协议安全的必要条件
www.ilib.cn
7.
Information technology--Security requirements for packet filter firewalls
信息技术包过滤防火墙安全技术要求
www.zftrans.com
8.
security requirements for signature creation applications
签名生成安全要求
www.ichacha.net
9.
Operation security requirements for military general-purpose computer system
军队通用计算机系统使用安全要求
www.8wen.com
10.
A multi-tenant, efficient SaaS application has several security requirements including
多承租者、高效的SaaS应用程序具有以下几点安全需求
www.ibm.com
1.
Approaches for Security Requirements Analysis of Information Systems
信息系统安全需求分析方法研究
www.ilib.cn
2.
Considerations of security requirements for Electronic Voting System
电子投票系统的安全考虑
view.cttl.cn
3.
On the Electronic Payment System and its Security Requirements
浅谈电子支付系统及其安全性要求
service.ilib.cn
4.
This topic describes the software and security requirements for the following debugging scenarios
本主题描述下列调试方案的软件和安全要求
msdn2.microsoft.com
5.
security requirements for end - equipment isolate components
端设备隔离部件安全技术要求
www.ichacha.net
6.
Security Requirements and Test Measures for Security Protection and Alarm Equipment
安全防范报警设备安全要求和试验方法
www.cnibt.com
7.
Security requirements for message transmission
消息传送的安全性要求
www-128.ibm.com
8.
The Research into Standard of Security Requirements for Cryptographic Modules
密码模块安全性要求标准研究
www.ilib.cn
9.
Have security requirements like access control and data privacy been met in both existing and legacy systems
访问控制和数据隐私等安全要求在现有和遗留系统中都得到满足了吗?
www.ibm.com
10.
Security requirements for signature creation applications; English version CWA 14170:
签名生成装置的安全要求.英文版本CWA14170:
www.mapeng.net
1.
Identify the security requirements for safe electronic payments
识别安全电子支付的安全要求
wenku.baidu.com
2.
E-government Security Requirements Analysis of Statistic Bureau
统计部门电子政务安全需求分析
scholar.ilib.cn
3.
Security: Heightened security requirements and need to take control of upstream supply chain
安全性:更严格的保安要求以及对上游供应链的控制
www.cciip.org.cn
4.
Security Requirements and Architecture of IPTV Service
IPTV业务安全需求与架构研究
www.ilib.cn
5.
Security requirements model for data warehouse
数据仓库安全需求模型研究
www.ilib.cn
6.
VoIP Security Requirements from the Industry
安全的要求
www.cwts.org
7.
Analyze the security requirements and set up role models (define user types)
分析安全需要并设置角色模型(定义用户类型)
www.ibm.com
8.
J2EE Security (17): Rules that validate code for compliance with the security requirements for J2EE technology
J2EE安全性(17):验证代码符合J2EE技术安全性需要的规则;
www.ibm.com
9.
Table 1: Security requirements satisfied by SOAP-DSIG and SSL 1
表1:用SOAP-DSIG和SSL1满足的安全性要求
www.ibm.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/1/29 11:12:07