单词 | Security architecture. | ||||||||||||||
释义 | Security architecture.
更多释义 收起释义 例句释义: 安全架构,安全体系结构,安全结构 1. With so many elements to coordinate, this sort of security architecture can be difficult to implement. 由于需要在如此众多的环节上开展多方合作,这个安全框架的实现应该是有相当难度的。 dream4ever.org 2. Accordingly, the security content management plays a more important role in the general security architecture. 安全内容管理在信息安全体系中所占的比重越来越大。 search.gucas.ac.cn 3. Which brings up the third thing: no security architecture for Web services should require you to alter your existing security architecture. 带出了第三件事的是:任何一种Web服务的安全性架构都不应要求您改变现有的安全性架构。 www-128.ibm.com 4. Develop and document a robust information security architecture as part of a process to establish an effective protection strategy. 制定和文件作为一个进程的一部分,健全信息安全架构,以建立一个有效的保护战略。 blog.sina.com.cn 5. Clear and this book gives a comprehensive description of the Java platform security, Java security architecture explores the insider. 本书明确而详尽地阐述了Java平台安全性,探究了Java安全结构的内幕。 lwtbb.com 6. He also called for a new European security architecture that would give Russia greater influence, particularly in the former Soviet space. 他同时呼吁建立新的欧洲安全机制,使俄罗斯能够发挥更大的影响力,特别是在前苏联地域范围内。 www.ecocn.org 7. Yi Shen Eagle is hope this meeting will be a link to a new, comprehensive Europe-Atlantic security architecture milestone in the road. 伊申格尔则希望,本次会议将成为通往一个新的、全面的欧洲、大西洋安全架构之路的里程碑。 www.englishtang.com 8. Find out if the security architecture has been implemented with a protocol firewall, domain firewall and enterprise firewall positioning. 查明安全架构是否通过一个协议防火墙、域防火墙和企业防火墙配置实现。 www.ibm.com 9. For more information about communication between the Team Foundation tiers, see Team Foundation Server Security Architecture. 有关TeamFoundation各层之间的通信的更多信息,请参见TeamFoundationServer安全结构。 msdn2.microsoft.com 10. In the months ahead, a realistic blueprint needs to be drafted that provides an open security architecture for the region. 未来几个月,我们必须草拟出一份切实可行的蓝图,为该地区提供一种开放的安全架构。 www.ftchinese.com 1. The guide contains also the protocols to be used in a claims-based security architecture. 该指南还包括使用于基于声明的安全架构的协议。 www.infoq.com 2. The first step should be to build on some of President Dmitry Medvedev's proposals for a new European security architecture. 第一步在俄罗斯总统德米特里?梅德韦杰夫(DmitryMedvedev)就新的欧洲安全体系提出的一些建议基础上进行探讨。 www.ftchinese.com 3. McCain also believes the United States needs a new national security architecture to meet the challenges of the 21st century. 麦凯恩还认为美国需要一个新的国家安全架构以应对21世纪的挑战。 www.america.gov 4. CDSA Common Data Security Architecture. A security framework for developing security and authentication application programs. 通用数据安全体系。开发安全和鉴权应用程序使用的一种安全框架。 swtrunk.bokee.com 5. InfoQ: How can the model you describe in the book be used to manage a Security Architecture program in an organization? InfoQ:书中描述的模型如何用于管理企业内的安全体系架构(SecurityArchitecture)的程序。 www.infoq.com 6. The response of related security incident is an essential part of network security architecture. 安全事件相关的应急响应在网络安全体系结构中是不可缺少的重要环节。 www.zidir.com 7. Since last summer, President Dmitry Medvedev has been calling for a "new Euro-Atlantic security architecture" . 自去年夏天以来,德米特里-梅德韦杰夫(DmitryMedvedev)总统一再呼吁建设一个“全新的欧洲-大西洋安全架构”。 www.ftchinese.com 8. For more information, see Configuring Web Synchronization and Security Architecture for Web Synchronization. 有关详细信息,请参阅配置Web同步和Web同步的安全体系结构。 msdn2.microsoft.com 9. For more information about Team Foundation Server architecture, see Team Foundation Server Security Architecture. 有关TeamFoundationServer体系结构的更多信息,请参见TeamFoundationServer安全结构。 msdn2.microsoft.com 10. For more information about Web synchronization security, see Security Architecture for Web Synchronization. 有关Web同步安全性的详细信息,请参阅Web同步的安全体系结构。 msdn2.microsoft.com 1. Particularly evident is the failure of the security architecture in the Euro-Atlantic region, represented mainly by NATO and the OSCE. 特定的事例以北约和欧安会为代表的欧洲与大西洋地区的安全架构的失败。 word.hcbus.com 2. "Most of the current European security architecture, " he adds, is built "on Russian weakness, " and Moscow has had enough. “大多数欧洲当前的安全架构”他还补充说,“都是趁着俄罗斯虚弱的时候”才建起来的,莫斯科早就受够了。 www.bing.com 3. INFORMATION PROCESSING SYSTEMS. OPEN SYSTEMS INTERCONNECTION. BASIC REFERENCE MODEL. PART 2 : SECURITY ARCHITECTURE. 信息处理系统.开放系统互连.基本解释的模型.第2部分:安全的结构 www.mapeng.net 4. It has become an important component of the global security architecture. 这一体系已成为全球安全环境的重要组成部分。 www.fmprc.gov.cn 5. This can have serious implications to your security architecture. 这可能对您的安全体系结构有极大的影响。 www.ibm.com 6. It is worth spending time to plan ahead for the Workplace Services Express security architecture design before implementing the security. 进行安全设计之前,值得花费时间提前规划WorkplaceServicesExpress安全性架构设计。 www-128.ibm.com 7. Next month, we'll continue our exploration of J2EE technology with a foray into J2EE's Web application security architecture. 下个月,我们将继续探索J2EE技术,对Web应用程序安全体系结构进行分析。 www.ibm.com 8. They are also a message control point in an application's security architecture. 它们还是应用程序安全体系结构中的消息控制点。 www.ibm.com 9. Identification card systems - Inter-sector electronic purse - Part 2 : security architecture. 识别卡系统.内扇区电子钱包.第2部分:安全性的建立 www.mapeng.net 10. "It's appropriate for us to make sure that . . . the security architecture of the region is updated for the 21st century, " said Mr Obama. 奥巴马表示:“确保这一地区的安全架构根据二十一世纪的情况进行了更新,对于我们而言是一种恰当的做法。” www.ftchinese.com 1. The open security architecture enables ObjectGrid to integrate with external security products (see Resources). 开放安全性体系结构允许ObjectGrid与外部安全性产品实现集成(请参见参考资料)。 www.ibm.com 2. With this security architecture, you can impose security at the document level. 使用这个安全性体系结构,您可以将安全性强制在文档级别。 www.ibm.com 3. All new programs utilizing GPS technology will be required to use the NAVSTAR security architecture. 所有采用GPS技术的新项目都将被要求使用NAVSTAR安全架构。(工业和信息化部电子科学技术情报研究所陈皓) www.etiri.com.cn 4. The example above is an entry-level WS-Security architecture. 上面例子是入门级的WS-Security体系结构。 www.ibm.com 5. The following diagram shows the IBM Cognos 8 security architecture when a trusted signon provider is implemented. 下图显示在实现可信登录提供者的情况下IBMCognos8的安全架构。 www.ibm.com 6. Together, the Java 2 platform security architecture and JAAS comprise the current Java authorization model. Java2平台安全体系结构和JAAS共同构成了当前的Java授权模型。 www.ibm.com 7. Using the Certicom Security Architecture provides a comprehensive solution to secure the entire DRM chain. 使用CerticomSecurityArchitecture可以提供用于保障整个DRM链安全的综合解决方案。 www.certicom.com 8. For the past year, Russia has talked vaguely but forcefully of creating a new "European security architecture" . 去年,俄曾表示要建立新的“欧洲安全框架”,措辞模糊但其意坚决。 www.ecocn.org 9. We will briefly discuss why security is important and then detail the WebSphere Application Server security architecture. 我们将首先简单讨论一下安全性为什么重要,然后详细介绍WebSphereApplicationServer安全性体系结构。 www-128.ibm.com 10. The Gateway is a key element of the security architecture. 网关是Flume安全架构的关键元素。 www.infoq.com 1. How easily can the security architecture be changed and upgraded? 更改和更新安全架构的难度如何? www.ibm.com 2. If the security architecture in which the MDM Client resides uses SAML 1. 1 tokens, then this feature is a major benefit. 如果MDM客户机所处的安全体系结构使用SAML1.1令牌,那么这个特性非常有帮助。 www.ibm.com 3. The second thing that we must do is identify the core components of what the security architecture for Web services need to include. 我们所要做的第二件事是识别Web服务的安全性架构所需要包含的核心组件。 www-128.ibm.com 4. This article has presented an in-depth look at Java authorization under both the Java 2 platform security architecture and JAAS. 本文深入分析了Java2平台安全体系结构和JAAS的Java授权。 www.ibm.com 5. In addition, we propose the security architecture for IEEE 802. 16 mesh mode to improve the security based on cryptosystems. 除此之外,我们提出一种在IEEE802.16网状模式下基于密码系统的安全架构来加强安全性。 140.118.33.11:8080 6. Application and study of network security architecture for networked manufacturing resource management 面向网络化制造的信息安全体系的研究与应用 ilib.cn 7. The early study of information security architecture of electric power industry 电力行业信息安全体系结构初探 ilib.cn 8. Financial transaction cards - Security architecture of financial transaction systems using integrated circuit cards - Key management 金融交易卡.使用集成电路卡的金融交易系统的安全结构.键管理 www.mapeng.net 9. The combination of these two characteristics is codified in the Java 2 platform security architecture as the 这两种特性的组合在Java2平台安全体系结构中编写为给定运行代码的 www-128.ibm.com 10. Research of Electric Power Information Security Architecture and Its Security Strategy 电力信息安全体系结构研究及安全策略 www.ilib.cn 1. Security architecture for a service-oriented learning assessment grid 面向服务的学习评价网格安全体系 service.ilib.cn 2. Research on security architecture and security technologies for collaborative commerce and design environment 协同商务与设计环境中的安全体系与技术研究 www.ilib.cn 3. Identification card systems - Inter-sector electronic purse - Security architecture 识别卡系统.部门间电子钱包.安全结构 www.mapeng.net 4. Bluetooth technology Security Architecture and Security Measures Analysis 蓝牙技术安全体系及其安全措施分析 www.wanfangdata.com.cn 5. Construct Overall security Architecture for Financial Information Systems 构建财务公司全方位信息系统安全体系 www.ilib.cn 6. In the Java 2 platform security architecture, all access permissions are typed and arranged in a hierarchy rooted at the abstract class 在Java2平台安全体系结构中,所有访问权限都是类型化的并且有层次结构,其根是抽象类 www-128.ibm.com 7. Information processing systems; Open Systems Interconnection; basis reference model; Part 2: Security architecture 信息处理系统.开放系统互连.基本参考模型.第2部分:安全结构 www.mapeng.net 8. Embedded information system security architecture: Design and Application 嵌入式信息系统安全体系构建与应用 www.ilib.cn 9. Modular Design rebuilding network security architecture for large enterprises 模块化设计构筑大型企业网络的安全体系 www.ilib.cn 10. Security Architecture and Intrusion Detection Techniques of Wireless Networks 无线网络的安全架构与入侵检测的研究 www.ilib.cn 1. Study of the Security Architecture for IPTV Content 对IPTV内容安全架构的研究 www.ilib.cn 2. Security architecture and key generation algorithm for distributed routing systems 分布式路由系统中的安全机制及其密钥生成技术 www.ilib.cn 3. Financial transaction cards - Security architecture of financial transaction systems using integrated circuit cards - Use of algorithms 金融交易卡.使用集成电路卡的金融交易系统的安全结构.算法的使用 www.mapeng.net 4. OSISA Open System Interconnection Security Architecture 开放系统互连安全性体系结构 www.bing.com 5. The Information Security Architecture and Policies of Electric Power Corporation 电力系统的信息安全体系和策略 www.ilib.cn 6. Research Of Security Architecture And Application Of Trusted Computing Platform 可信计算平台安全体系及应用研究 www.ilib.cn 7. Constructing security architecture under the environment of distributed database systems 分布式数据库系统安全体系模型的研究与构造 service.ilib.cn 8. Research of pervasive computing security architecture 普适计算安全体系结构研究 www.ilib.cn 9. Research on e- Government Information Security Architecture 电子政务信息安全体系结构研究 scholar.ilib.cn 10. The Analysis and Designing on Security Architecture in Economy Information Systems 信息系统的安全体系结构分析与设计 service.ilib.cn 1. A Quantitative Security Architecture Design Method for Power Information System 一种定量化的电力信息系统安全体系设计方法 scholar.ilib.cn 2. Research and implementation of security architecture for Web service runtime Web服务运行管理平台安全结构的研究与实现 www.ilib.cn 3. Construction of Security Architecture in Railway Information System 铁路信息系统安全体系的构建 service.ilib.cn 4. Information processing system--Open ystems Interconnection--Basic Reference Model--Part2: Security architecture 信息处理系统开放系统互连基本参考模型第2部分:安全体系结构 www.zftrans.com 5. Security Policy Model Implemented on Security Architecture 安全体系结构中的安全策略模型 service.ilib.cn 6. Research on the Network Security Architecture for Distributed Early Warning 网络安全分布式预警体系结构研究 www.ilib.cn 7. Security Architecture for Electronic Commerce 电子商务安全体系结构 ilib.cn 8. Design and realization of security architecture of hospital information system 医院信息系统安全防范体系的设计与实现 www.ilib.cn 9. Design of security architecture in Quality Management System for locomotive 机车质量管理系统的安全性设计 service.ilib.cn 10. Security architecture of Bluetooth wireless network 蓝牙无线网络的安全机制 ilib.cn 1. Design of Security Architecture of MIS for Aeronautical Servicing Material 航空修理物资管理信息系统安全体系结构设计 www.ilib.cn 2. Security Architecture and Policy of Electronic Government 浅谈电子政务安全体系及其安全策略 www.ilib.cn 3. Study of grid security architecture 信息网格安全体系结构的研究 www.ilib.cn 4. Design and Research of Application Layer Security Architecture 系统应用层安全架构的设计研究 ilib.cn 5. Security architecture model for broadband wireless IP networks 宽带无线IP网络安全体系结构模型 www.ilib.cn 6. The Design and Implementation of Network Security Architecture 网络安全体系结构的设计与实现 www.ilib.cn 7. Mac Dev Center: Security Overview: Security Architecture 参见Mac开发者中心:安全概述:安全体系结构 blog.sina.com.cn 8. A Security Architecture Protecting General Electronics Files in EPR 企业内通用电子文档安全保护架构 www.sipai.com 9. A Security Architecture for Wireless Computing Via Trust Management 一种利用信任管理的关于无线计算的安全框架 www.ilib.cn 10. Current Enterprise Security Architecture Securit 中国工商银行企业架构咨询服务项目企业安全架构现状 wenku.baidu.com 1. Research on the Security Architecture for the Self-immune Network 自免疫网络安全防御体系研究 www.ilib.cn 2. Design and research of security architecture of network control system 网络控制系统的安全体系设计研究 ilib.cn 3. Study about web services security architecture and firewall 安全架构及其防火墙技术的研究 service.ilib.cn 4. The Analysis on Security Architecture for Computer Networks 网络安全体系分析 www.ilib.cn 5. Security Architecture for the Internet Protocol IP 协议安全体系结构 wenku.baidu.com 6. Research on Security Architecture Model of Grid Computing System 网格计算系统的安全体系结构模型研究 www.ilib.cn 7. Security Architecture Research Based on Authentication Technology 基于身份认证技术安全体系的研究 www.ilib.cn 8. Research on the Information System Security Architecture Based on the Intelligent Collaboration Technology 基于智能协作技术的信息系统安全体系结构研究 www.wanfangdata.com.cn 9. An Entity Security Architecture for Computer Networks 计算机网络的一种实体安全体系结构 www.ilib.cn 10. A Security Architecture Scheme for Wireless Sensor Network 一种安全的无线传感器网络结构设计方案 www.ilib.cn 1. To configure for the security architecture in Figure 1, you need to perform these basic steps, which we'll cover in detail in this article 要为图1中的安全架构进行配置,需要完成以下基本步骤,这在本文将详细进行介绍 www.ibm.com 2. On the Security Architecture of Active Network and the Security Mechanism of Active Node 主动网络安全体系结构与主动节点安全机制研究 service.ilib.cn 3. Design and Analyses of Agent- based Grid Security Architecture 基于代理的网格安全体系结构设计与分析 www.ilib.cn 4. Research on Grid Security Architecture and GSI Security Policy 网格安全体系结构及GSI安全策略研究 www.ilib.cn 5. Integrated database security architecture based on intrusion-tolerance 基于入侵容忍的集成数据库安全结构 www.ilib.cn 6. Research on the Issues Related to Information Systems Security Architecture 信息系统安全体系结构的有关问题研究 www.ilib.cn 7. Design and Implementation of Security Architecture Based on Enterprise Computer Network 基于企业的计算机网络安全方案的设计与实现 service.ilib.cn 8. Scalable Security Architecture for Grid 一种可扩展的网格安全体系结构 service.ilib.cn 9. Database Security Architecture Based on Adaptive Intrusion-Tolerance 基于自适应入侵容忍的数据库安全体系结构 www.ilib.cn 10. Research on Security Architecture in E-Commerce System 电子商务安全体系研究 ilib.cn 1. Security architecture to support multiple security policies based on access control space 基于访问控制空间的多策略安全体系结构 www.ilib.cn 2. Research of the Multi-Policy Security Architecture Based on Information Flow 基于信息流的多安全策略操作系统架构研究 ilib.cn 3. A Security Architecture for Wireless Ad hoc Networks 网络的安全体系 service.ilib.cn 4. Study on Security Architecture of Wireless LAN 无线局域网环境下的安全体系结构研究 www.ilib.cn 5. Security Architecture Based on Electronic Commerce System 基于电子商务系统的安全体系 ilib.cn 6. Research and Application of Network Security Architecture Based on Firewall and VPN 基于防火墙和VPN技术的网络安全架构研究与应用 ilib.cn 7. Research on One Integrated Management Platform for Open Network Security Architecture 一种开放式网络安全集成管理平台的研究 www.ilib.cn 8. Supporting material for the usage of ADM in specific scenarios such as iteration, SOA and security architecture 在特定情况下(比如迭代、SOA和安全架构)使用ADM的支持材料; www.infoq.com 9. Design of Security Architecture of District Intelligent System Based on NAT 用NAT技术构造小区智能化系统安全体系 www.ilib.cn 10. The OSI Security Architecture OSI 安全体系结构 www.phei.com.cn 1. Digital Library's Security Architecture Based on Grid 基于网格的数字图书馆的安全体系结构 ilib.com.cn 2. A research on SMS and it's security architecture in the UMTS UMTS中的短消息业务及其安全机制研究 www.ilib.cn |
||||||||||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。