您要查找的是不是:
- The security model of IIS is at fault here. IIS的安全模型这里有毛病。
- In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again. 计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。
- Does your application support a particular security model? 您的应用程序是否支持特殊的安全模型?
- Then we give a systemic description of the BLP Security Model. 第五章详细讨论了BLP安全模型,在理论上对Linux系统安全作了抽象提高与总结;
- The NT security model is MOSTLY able to reproduce the POSIX model. NT安全模组大多数能再生产POSIX模组。
- Radiation can be defined as the emission and propagation of energy through space or through a material medium in the form of particles or waves. 由太空而来,或透过粒子或电波物料为媒介而放射及传播出的能量,就是辐射。
- You need more sophisticated programmability or a different security model. 您需要更成熟的可编程性或不同的安全性模型。
- Since 1994,the medium security Chi Ma Wan Correctional Institution has held adult and young female prisoners to cope with an increasing population of female offenders. 为应付女犯数目不断增加,当局于一九九四年开设一间属于中度设防的芝湾惩教所,收容成年及年轻女犯。
- Since 1994, the medium security Chi Ma Wan Correctional Institution has held adult and young female prisoners to cope with an increasing population of female offenders. 为应付女犯数目不断增加,当局于一九九四年开设一间属于中度设防的芝湾惩教所,收容成年及年轻女犯。
- Bell-LaPadula model(BLP) model is the most classical multilevel computer security model. BLP模型是最为经典的计算机多级安全模型。
- A secure model of SSL/TLS is provided to solve these problems. 提出了一个安全的SSL/TLS协议通信模型。
- Finally by using MVC structure the secure model was reali... 最后,利用MVC架构实现安全模型。
- A uniformly congruent security model is presented based on observational congruence. 基于观察同余等价;构造了一类一致同余安全模型.
- In the Policy column, find Network access: sharing and security model for local accounts and double-click on it. 在“策略”列中,找到“网络访问:本地帐户的共享和安全模式”并双击它。
- If your application implements a security model on the local machine, you'd also need administrator privileges. 如果应用程序在本地计算机中实施安全模型,也会需要管理员权限。
- Dialog security must be configured manually according to the full security model. 必须根据完全安全模式手动配置对话安全模式。
- The kernel usually has some sort of security model that manages access to devices, files, processes, and objects. 内核通常具有某种类型的安全模式来管理对设备、文件、进程和对象的访问。
- Is there a need to integrate the service security model with application or legacy security systems? 是否需要使用应用程序或遗留安全系统来集成服务安全模型?
- The material is flawed throughout. 这种材料到处是裂缝。