您要查找的是不是:
- Security such as for example, the use of symmetric and asymmetric encryption, secure hashing, digital certificates and signatures, firewalls, transport and application level security. 安全性如同步或异步加密的使用、安全散列法、数字认证和签名、防火墙、应用层安全传输等。
- Application level security 应用层安全
- Cannot open an anonymous level security token. 无法打开匿名级安全令牌。
- 2.security such as for example, the use of symmetric and asymmetric encryption, secure hashing, digital certificates and signatures, firewalls, transport and application level security. 安全性如同步或异步加密的使用、安全散列法、数字认证和签名、防火墙、应用层安全传输等。
- Shows how to set a theme at the application level and page level. 演示如何在应用程序级别和页级别设置主题。
- Directives to thread scheduling at the application level. 应用程序级别的线程调度指令。
- Be active in the test preparation and raise the computer application level. 积极准备,提高计算机应用水平。
- Security service: the server offers transport and message level security functions. 安全服务:服务器提供网络传输层和消息层等多种安全管理机制。
- Clients connect to a system running CIFS Server configured in user level security and encrypted passwords. 客户机连接到了一个系统,该系统正在运行使用用户级别安全性和加密密码配置的 CIFS 服务器。
- This paper proposes an application level multicast system(ALMS) on top of P2P network,Pastry. 提出了一个在Pastry上实现的应用层组播系统。
- Today, the focus of grid computing development has moved up a step, to the application level. 今天,网格计算开发的中心已经迈上了一个新的台阶,来到了应用程序的层次上。
- For trace data to be visible in a rendered page, you must enable tracing at the page or application level. 若要使跟踪数据在呈现的页中可见,必须在页或应用程序级别启用跟踪。
- This method intercepts queued (also known as posted) Windows messages at the application level. 此方法在应用程序级截获排队的(也称为已发送的)Windows消息。
- When all the permissions are known, you should make a declarative request for permission at the application level. 在了解所有权限后,您应该发出一个应用程序级别的权限的声明性请求。
- The application level recognition technology, the similar category level gauge class, will carry on the level analysis. 应用层次识别技术,将相似的类别层次规类,进行层次分析。
- The P2P service level can afford distributed deployment for P2P application level. P2P服务层为P2P应用提供高度分布的部署能力。
- After summarizing the related research work, we present a multi level transaction model to solve the convert channel and starvation problems in concurrent control under BLP multi level security model. 在总结了已有的研究基础上,针对BLP多级安全模型下并发控制产生隐通道和饥饿问题,本文提出了一种多级事务模型---NHSTM模型。
- Computing virtualization include:OS level virtualization, application level virtualization, hyper visor. 虚拟机管理器分为宿主虚拟机和客户虚拟机。
- The Recycle Bin is enabled in a site collection by default, and is configured in Central Administration at the site collection Web application level. 默认情况下,该回收站在网站集合中启用,并在管理中心中在网站集合Web应用程序级别进行配置。
- You can create new settings or override inherited settings by making configuration settings at the Web application level. 通过在Web应用程序级别上进行配置设置,可以创建新设置或者重写继承的设置。