您要查找的是不是:
- Key exchange requires at least one security method. 密钥交换要求至少一种安全措施。
- A security check that occurs when a security method is called within the code. 在代码中调用安全性方法时进行的安全检查。
- This filter action requires at least one security method for IP traffic. 此筛选器操作至少需要一个IP通信的安全措施。
- Thinking on Using Internationalized Asset-Based Security Method of Finance Infrastructure Project in China. 我国基础设施项目资产证券化国际融资方式的思考。
- This key exchange security method duplicates an existing one. Either modify it, or cancel this dialog. 此密钥交换安全措施与现有的重复。请更改它,或取消此对话框。
- A filter action requires at least one security method for negotiation. This filter action has none. Select a different one, or add a security method. 筛选器操作要求至少一协商的安全措施,这个筛选器操作一个也没有。另选一个或添加一个安全措施。
- In recent years, many of us have had to learn about chip and pin as a security method when we pay for things using a credit card. 近几年,我们用信用卡买东西的时候还得学会用芯片和密码等安全保密工具。感应刷卡是这方面的一个新生力量,
- The most secure method to control access between the internal and external network is to disconnect the two. 控制内外网络之间访问的最安全方法是将两者断开。
- Cannot add more security methods. The number of security methods reaches the upper limit. 不能添加更多的安全措施。安全措施的数目达到了上限。
- Do you want to manage the full list of security methods for this filter action now? 您想现在管理此筛选器操作的完整的安全措施列表吗?
- This is the most secure method, but it can impact performance when there are many users. 这是最安全的方法,但是如果有多个用户,它可能会影响性能。
- It is provided with a compression or PEX end fitting to provide a secure method of connecting a discharge line. 配置一个压缩连接或倒钩连接端口,确保与排泄管道的连接牢靠安全。
- Obvious physical security methods such as locks on doors, cables, locked cabinets, and video surveillance are all good ideas, but beyond the scope of this document. 很显然,物理保护方法,例如给门,电缆上锁,将设备锁在柜子里,视频监控都是不错的办法,但是这些超出了本文的范围。
- The following table lists some possible threats to your Unified Messaging infrastructure and the security methods that can be implemented to help protect it. 下表列出了统一消息基础结构可能面临的某些威胁,以及可以实施以帮助保护统一消息基础结构的安全方法。
- Objective:To provide an optimal secure method for procedure of sympathectomy through observing microanatomy of the upper thoracic sympathetic trunk and its adjacent structures. 目的:探索胸交感干及其周围的显微解剖,为交感干切断术提供解剖学依据。
- This colorful way of devising and implementing security methods earned Godalhi an invitation to speak at a week-long workshop hosted by Coruscant's security agencies. 这种设计和实现安全方案的办法十分生动,引起了科洛桑安全部门的兴趣,他们邀请戈达尔伊参加为期一周的研讨会。
- The algorithm extracted watermark information from the image and embedded it into the host.So the receptor doesn’t need to know much information.Thus the SIA is a securer method. 该算法将从自身提取的水印信息嵌入于图像中来实现图像认证,对接收方要求知道的信息较少,因而具有较高的安全性。
- I'll undertake for your security. 我将保证你的安全。
- In the old society we never knew real security. 在旧社会我们的生活从来没有真正的保障。