您要查找的是不是:
- Consider the security requirements of the functional application. 考虑功能性应用程序的安全需求。
- Determine the security requirements that are unique to your environment. 确定具体环境特有的安全要求。
- This chapter describes deployment representations for security requirements. 本章描述安全需求的典型布署。
- Most packet-filtering technologies have not addressed all security requirements. 多数包过滤技术没有满足所有的安全要求。
- Depending on your application,Oracle9iAS Wireless supports techniques to satisfy your end-to-end security requirements. 根据应用程序的不同,Oracle9iAS Wireless 支持不同的技术来满足端对端的安全需要。
- The right choice depends on the level of security required. 正确的选择依赖于对安全要求程度的高低。
- First, you must strive to build as simple a system as possible, while still meeting your security requirements. 首先,您必须努力构建尽可能简单的系统,同时仍然要满足安全性需求。
- Passengers cooperation in complying with all security requirements will ensure safe air travel for all. 旅客遵照所有保安规定,有助保障航空旅行的安全。
- Another security requirement is a digital certificate. 另一个安全要求是数字证书。
- Establishing security requirements Introduction evaluation and review of security policy. 建立安全政策的介绍评价和回顾。
- For more information about ASP.NET security requirements, see ASP.NET Debugging: System Requirements. 有关ASP.;NET安全要求的更多信息;请参见ASP
- The basic security requirements on information systems also apply to Web Services messaging. 资讯系统的基本保安要求亦适用于网络服务信息传递。
- More security requirements are needed for IDC compared with any websites, ISP and ICP. 因此,与任何网站、ISP、ICP 相比,IDC 对网络安全的要求更高。
- MWP also provides an interactive interface that enables fine-tuning of the system to meet your security requirements. MWP 也提供使得系统的调整满足你的安全要求的一个交互的界面。
- Firstly, logic SVO is applied to formally describe the security requirements of protocol SE-AKA. 首先用SVO逻辑对协议的安全需求进行了形式化描述。
- Depending on your application, Oracle9iAS Wireless supports techniques to satisfy your end-to-end security requirements. 根据应用程序的不同,Oracle9iAS wireless 支持不同的技术来满足端对端的安全需要。
- Of course, security is a relative term; you will have to make some decisions as to the security requirements of your users. 当然,安全性是一个相对的术语;您必须作出一些关于用户安全性需求的决定。
- I wont directly address security requirements here; however, they are likely to be important to the choice of ESB technology. 我不想在这里直接提出安全需求,不过它们对选择ESB的实现技术非常重要。
- Proceeding past the security control point without complying fully with all security requirements is liable to police arrest and criminal prosecution. 旅客如没有完全遵照所有保安规定便通过保安检查站,会被警方拘捕及遭刑事检控。
- Adopting practical approaches to interpreting and implementing measures will help ensure compliance with maritime security requirements. 培训师将通过实用而且效的方法来解释各项安全措施,保证其符合各项海事安全要求。