您要查找的是不是:
- security computing layer 安全计算层
- In addition,a P2P security computing platform is designed and implemented which used XML,SOAP in the Web Services and JXTA technology. 设计并实现了一种基于PKI技术的P2P安全计算平台。
- Secure computing paradigms impose new architectural challenges for general-purpose processors. 安全计算范式向通用处理器提出了新的体系结构上的挑战。
- The chief design idea is the whole MIS of container terminal production, which including control, communication and computing layers. 设计思想是由自动控制层、数据通信层和计算处理层构成一个完整的码头生产管理信息系统;
- The design of this hotel is very simpleand is in a gret consistence.All the doors of every guest room is openedmy a security computer key. 酒店简介:酒店共有263间客房,设计简单但非常统一,全部房间是采用电脑匙开启,房内的设备齐全。
- Our target is to build a secure computing distributed environment that has the feature of secrecy, integrity, availability, verifiability, controllability and ubiquity. 本文所探讨的目标是具有保密性、完整性、可用性、真实性、可控性和普适性的分布式安全环境。
- Which focuses on the division of the implementation plan and technical arrangements as well as the template support and scaffolding erection of secure computing. 其中重点是各项分部工程的施工方案和技术安排以及模板支撑和脚手架搭设的安全计算。
- Examples of other security precautions include disconnecting from public networks, physically securing computers, and so on. 其他的安全防范措施包括与公共网络断开连接、从物理上保证计算机的安全等等。
- OWNSAVAOG agrees that military networks should be held to higher standards of security, but perfectly secure computers are perfectly unusable. ownsavaog同意,军事网络应举行更高水准的安全,但绝对安全的计算机是完全无法使用。
- I'll undertake for your security. 我将保证你的安全。
- In the old society we never knew real security. 在旧社会我们的生活从来没有真正的保障。
- He get weekly social security payment. 他按周领取社会保险金。
- Israel, Palestinians restore security link. 以色列巴勒斯坦重回安全临界线。
- What I need now is the security of a happy home. 我现在需要的是一个幸福家庭所给予的安全感。
- What about the question of security? 安全的问题怎麽办?
- While many publications exist about software that can be used to secure computer environments, very few publications exist that explain how hacker attacks are actually performed. 尽管有许多出版物介绍可以用来确保计算机环境安全的软件,但很少有出版物说明黑客攻击实际上是如何执行的。
- Method starts transport layer security encryption. 方法启动传输层安全加密。
- He uses his house as security to borrow the money. 他用房子作借钱的抵押。
- She's a poor/good security risk. 她是个不太[十分]危险的人。
- The bank lend him$20,000 without security. 该银行贷给他20,000美元没有抵押。
- 今日热词
-
- 深远海浮式风电平台 - deep-sea floating wind power platform
-
- 京雄高速公路 - Beijing-Xiongan expressway
-
- 农业及相关产业增加值 - the added value of agriculture and related industries