您要查找的是不是:
- Electronic Security Profile 电子警戒分布图
- If a user uses a SQL Server login, the security profile of the SQL Server process account is used. 如果用户使用的是SQL Server登录名,则系统将使用SQL Server进程帐户的安全配置文件。
- Formerly, after a user was authenticated, access to external files was based on the security profile of the SQL Server process. 以前,用户经过身份验证后,对外部文件的访问权限是基于SQL Server进程的安全配置文件的。
- Formerly, once a user was authenticated, access to external files was based on the security profile of the SQL Server process. 以前,一旦用户经过身份验证,对外部文件的访问权限就是基于SQL Server进程的安全配置文件的。
- Message security controlled by the System.ServiceModel.BasicHttpBinding.Security value provides WS-Security support compliant with WS-I Basic Security Profile 1.0. 由System.;ServiceModel
- Security Ministry set upthe companyin2005, operating control system and the most advanced electronic security systems. 公司2005年成立安防部,经营监控系统和最先进电子防盗系统。
- Although WS-I is still working on finalizing the Basic Security Profile, there is one aspect of the BSP that needed to be further constrained - the choice of encryption algorithm. 尽管WS-I仍然在从事于确定基础安全概要的最终形式,基本安全概要的其中一个方面需要进一步受到约束密码运算法则的选择。
- Does the facility have an electronic security system?(automatic alarms.security meras. etc)厂内有没有装置电子保安系统,自动警钟、保安?
- The fundamental tools of electronic security are keys: complex algorithms that unlock access to system resources and content. 电子安全基础工具是密钥,这是一种用于解除对系统资源和内容的访问限定的复杂算法。
- They need to be configured on each desktop,which includes issuing a digital certificate to each user (for encryption and digital signature),and ensuring that a proper security profile is configured within the e-mail client. 它们需要配置到每个桌面系统,包括向每个用户发数字证书(用于加密和数字签名)并确保在每个电子邮件客户端都配置了合适的安全配置文件。
- No two design or service applications are alike and the identification, understanding and response to the variables is the key to an effective electronic security solution. 没有两项设计或服务应用是相同的,而识别、理解和响应其间的变量是提供有效电子保安解决方案的关键。
- Integrating sliding gate and fencing products with electronic security products , Nantian produces more comprehensive, more scientific, more altitudinal designs. 直线门和栅栏产品与电子安防产品结合运用,意味着南天人将安全保护方案设计的更周全、更科学、更智能。
- They need to be configured on each desktop, which includes issuing a digital certificate to each user (for encryption and digital signature), and ensuring that a proper security profile is configured within the e-mail client. 它们需要配置到每个桌面系统,包括向每个用户发数字证书(用于加密和数字签名)并确保在每个电子邮件客户端都配置了合适的安全配置文件。
- Versioning and security profiles ensure lifecycle document integrity. 版本和安全性也确保了生命周期文档的完整性。
- Lu: su doors and windows, steel doors and windows manufacturing, processing, the installation of steel tubes; PVC sales; Electronic security doors processing; Indoor and outdoor decoration. 铝塑门窗,不锈钢门窗制造,加工,安装;pvc型管材销售;电子防盗门加工;室内外装璜。
- The electronic securities listed in TSEC have had strong impact in 1996 and 1997. 3、对各项未入帐人事支出调整所产生的冲击,由调整所造成的变动百分比来看可以82年为一重要水岭。
- In the area of electronic security detectors, passive infrared detector is widely used because of their low cost, technical performance and stability of by users and professionals welcome. 在电子防盗探测器领域,被动红外探测器的应用非常广泛,因其价格低廉、技术性能稳定而受到广大用户和专业人士的欢迎。
- My thesis is aimed directly at operating performance of high-tech industry in domestic.I focus my targets on the electronic securities which are listed on the TSEC. 本研究是针对我国高科技产业的经营绩效进行研究,我们以上市电子业为研究对象。
- Helen became an electronic engineer. 海伦成了一名电子工程师。
- An unwanted false electronic pulse. 一种不希望有的假电子脉冲。