您要查找的是不是:
- Physical Security Strategies 物理安全策略
- Physical security of the workstation and the user. 工作站和用户的物理安全性。
- Level 2: Tamper evident physical security or pick resistant locks. 级别2:防窃启物理安全性或防撬锁。
- AOP makes security strategies implementation more flexible and easy. AOP编程技术使安全策略设计更灵活,更容易实施。
- Does the company regularly review the physical security of the store? 公司是否定期检讨货仓的保安?
- The National Security Strategy of the US. 美国国家安全报告。
- For example,different security strategies have to be pursued when storage devices are more widely available. 例如,当能更广泛地利用存储装置时,必须采用不同的安全策略。
- CICS medium software technology to ensure the integrality of the transactions and a series of security strategies to ensure the security of the system. 采用了CICS中间件技术,保证了交易的完整性; 采用了一系列的安全策略,保证了系统的安全性。
- Examining the insides of new voting machines still reveals many physical security faults. 检视新投票机的内部,还是会发现许多实体上的安全缺陷。
- With the rapid development of web spatial information service,more attentions are paid to security,but most web GIS security strategies do not fill the requirements. 随着Web空间信息服务的迅速发展,其安全性越来越受到重视,但现在大多数Web GIS安全策略存在不足。
- The factory has adequate physical security and barriers to guard against unauthorized access. 工厂是否有足够的实体安全及屏障来阻止未经授权的进出?
- Constraints on resources, such as: hardware, personnel, space for storing backup media, the physical security of the stored media, and so on. 对资源的约束,例如硬件、人员、存储备份媒体的空间以及存储媒体的物理安全性等。
- Level 1: No physical security mechanisms are required in the module beyond the requirement for production-grade equipment. 级别1:除生产级别设备的要求外,模块中不需要其他物理安全机制。
- However, the characteristic of mobile ad hoc networks are more prone to physical security threats than the wired network environments. 然而,因为随意网路的特性,相较于有线网路,无线网路更容易遭受到安全性的威胁。
- This kind of scenario is invoked by doom-mongers who insist that stepping up physical security since the September 11th attacks is not enough. 这种情景是那些散布恐怖威胁论的人描绘的场景。他们坚持认为911袭击之后仅采取实体安全措施是不够的。
- Obvious physical security methods such as locks on doors, cables, locked cabinets, and video surveillance are all good ideas, but beyond the scope of this document. 很显然,物理保护方法,例如给门,电缆上锁,将设备锁在柜子里,视频监控都是不错的办法,但是这些超出了本文的范围。
- "Security," however, is often used as a catch-all phrase that includes several individual components: physical security, authentication, and authorization. 然而,“安全性”通常在所有的阶段都需要使用,它包括几个单独的组件:物理安全性、身份验证和授权。
- Level 4: Physical security provides an envelope of protection around the cryptographic module and protects against fluctuations in the production environment. 级别4:物理安全性在加密模块周围提供一层额外安全保护,并可根据生产环境中的波动提供安全保护。
- Back up data often and keep your backups physically secure. 经常备份数据,并将备份存放在安全的场所。
- However, combined with other defensive techniques and security strategies, the built-in ASP.NET features form a powerful toolkit to help ensure that applications operate in a secure environment. 但是;如果与其他防御技巧和安全策略相结合;内置的ASP.;NET功能将可以构成一个强大的工具包;有助于确保应用程序在安全的环境中运行。
