您要查找的是不是:
- Represents the work item ID as the work item is known in the operational system. 当工作项在操作系统中已知时表示其工作项ID。
- The employee table in the sample database uses an employee ID as the primary key. 示例数据库中的employee表使用雇员ID作为主键。
- This function will execute a get statement that will read the data base using ID as the key. 该函数将执行一个get语句,使用ID作为密钥来读取数据库。
- Set ID as the primary key: click Primary Key and add ID to the index, marking it as ascending. 将ID设置为主键:单击[主键]并将ID添加到索引中,然后将其标记为升序。
- Tips: To prevent account theft, please use the game players who have no contact ID as a user name. 提示:为了防止帐号被盗,请使用与游戏中角色名没有任何联系的ID作为用户名。
- In Kabul, Afghanistan's capital, Afghans marked the third day of Id as a balloon vendor plied his wares. 阿富汗;喀布尔:一名阿富汗人在宰牲节第三天贩卖气球.
- To solve the problems of information security and copyright protection, the technologies such as cryptography and digital signature, have been presented. 基于私有或公共密钥的加密技术可以用来控制数据访问,它将明文消息变换成旁人无法理解的密文消息。
- The above lines define the menu IDs used by the menu script. You can assign any value to the ID as long as the value is unique in the menu. 上面这些行用来声明在菜单资源脚本中使用的ID值。你能给菜单项的ID分配任何值只要这些值在菜单中是唯一的。
- You can also pass a cache id as an an optional second parameter in case you want multiple caches for the given template. 如果模板有多个缓存的话,可以通过第二个可选参数指定缓存号。
- Vanstone has published more than 250 research papers and a number of books on topics such as cryptography, coding theory, finite fields, finite geometry, and combinatorial designs. Vanstone已发表超过250篇研究论文及多部著作,主题包括加密技术、编码原理、有限域、有限几何和组合设计等。
- It is easy to forget or vulnerable to dictionary attacks to take PINs and password as cryptographic keys. 摘要PIN和密码作为加密密钥要么容易遗忘,要么容易遭到字典攻击。
- This thesis can be divided into two parts.The first part begins with some basic concepts of SSL related technologies such as cryptography, public key infrastructure (PKI) and so on. 本论文主要分成两部分,第一 部分介绍SSL相关支撑技术,如密码学技术、公钥基础设施PKI等,并 对SSL 协议规范和SSL的安全性进行了分析。
- To achieve these goals, you can use a combination of algorithms and practices known as cryptographic primitives to create a cryptographic scheme. 为了达到这些目的,您可以使用算法和惯例的组合(称作加密基元)来创建加密方案。
- They denounced him to the police as a criminal. 他们向警方告发他是罪犯。
- When the reset invocation ID is outbound-replicated, remote domain controllers in the forest record the reset invocation ID as a new database instance on the restored domain controller. 在以出站方式复制了重置的调用ID后,林中的远程域控制器会将重置的调用ID记录为已还原域控制器上的一个新数据库实例。
- You can keep my book as long as you like. 我的书你要借多久都随你的便。
- I gave him money as an inducement to leave. 我给他钱,诱使他离去。
- As a matter of fact, I've never been there before. 事实上我从未到过那儿。
- She felt just the same as he did. 她和他的感受相同。
- The streets were as noisy as ever. 街上和往常一样喧闹。