集成安全 的英文怎麼說

中文拼音 [chéngānquán]
集成安全 英文
integrated security
  • : gatherassemblecollect
  • : Ⅰ動詞1 (完成; 成功) accomplish; succeed 2 (成為; 變為) become; turn into 3 (成全) help comp...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • 集成 : integration集成晶體管 integrated transistor; 集成元件 integrated component
  1. In - stat recent report shows the integrated security equipment market is on the point of fast development and will reach 3. 3 billion us dollars. the integrated security equipment is a small box with several secure function including firewall, vpn, defense to inbreak and kill computer virus

    In - stat近期報告,集成安全設備市場即將出來大幅增長,到2009年將達到33億美元,集成安全設備是一種具有各種功能的小盒。這些功能包括防火墻與vpn 、入侵防護以及殺毒抗毒功能,一些產品可能還帶有內容過濾、反垃圾郵件以及防木馬功能。
  2. In this essay, eisenhower ' s economic conservatism and interationalism were reflected through the " new look " strategy and " collective security " rule of u. s foreign policy. eisenhower controlled u. s principal diplomatic establishments in order to embody his thought in the foreigh policy

    長期的軍旅生涯與政治信仰使艾森豪威爾形了對待世界的國際主義思想與經濟上的保守主義,他在任時美國主要的外交政策「」原則與「新面貌」國家基本戰略就是他外交思想的具體體現。
  3. The second part induces the chief characters of international interference after the cold war : international organizations have become the important carrier of implementing international interference ; the interference actions under the collective security system have become the significant form of international interference after the cold war ; economic sanction has become the important means of the international interference after cold war instead of military sanction ; universalized range of international interference after the cold war ; moralization of subterfuge of post cold - war international interference

    第二部分,該部分歸納了冷戰后國際干預的主要特徵:國際組織為冷戰后實施國際干預的重要載體;體制下的干預行為為冷戰后國際干預的重要形式;經濟制裁取代軍事手段為冷戰后國際干預的重要手段;冷戰后國際干預范圍的廣泛化;冷戰后國際干預借口的道德化。
  4. For example to connect to an instance,

    例如,若要使用集成安全性連接到sql server
  5. Integrated security support for accessing report data sources can be disabled

    用於訪問報告數據源的集成安全支持可以禁用。
  6. The sql server clr integration security model is intended to govern code executing inside of sql server, and is intended to prevent elevation of privilege attacks against protected system resources from managed code

    Sql server clr集成安全模型旨在控制在sql server內部執行的代碼,並避免通過託管代碼對受保護的系統資源進行特權升級攻擊。
  7. The report points out that the increase of integrated security equipment market is mainly because the clients especially the small and mid - sized enterprises need the convenient and easy software for various defense software. in addition, owing to their strong management ability and some extra functions, these equipments attract lots of isp and mssrs

    報告指出,集成安全設備市場之所以會出現增長,主要是因為面對各種防護軟體,客戶們需要復雜性程度低,使用方便的套件,對於一些中小型公司更是如此。
  8. The security request of the mobile - agent system is to protect the agent from the attack of the malicious machine and agent as well as to protect the machine from the attack of the hostile agent. hierarchical integratedsecure model in jade provides effective, extensible security framework for mobile agent by integrating bi - direction authentication, authorization, java security policy, environment based key generation, and audit log

    Made移動代理系統的層次化的集成安全模型在現有的技術基礎上,將雙向身份驗證、資源存取授權及控制、 java語言設施以及基於環境的密鑰產生法和核查日誌等方法有機地結合起來,為移動代理和運行環境提供了一個實用的可擴展環境。
  9. Connecting to sql server using integrated security

    使用集成安全性連接sql server
  10. Clr integration security and application domains

    Clr集成安全性和應用程序域
  11. To configure sql server for integrated security

    集成安全性配置sql server
  12. Pool fragmentation due to integrated security

    因為集成安全性產生的池碎片
  13. Using service accounts and integrated security

    使用服務帳戶和集成安全
  14. Integrated security and elevated permissions

    >集成安全性和提升權限
  15. To use windows integrated security in a connection string

    在連接字元串中使用windows集成安全
  16. Clr integration security and impersonation

    Clr集成安全性和模擬
  17. Integrated security for sql authorization

    Sql授權的集成安全
  18. Explains security threats and mitigation strategies when using integrated security

    介紹使用集成安全性時的威脅和應對策略。
  19. Objects. the topic also discusses how to obtain schema information from a database

    在使用集成安全性時, asp . net開發人員必須考慮asp . net進程模型設置的配置問題。
  20. The use of integrated security to access external data sources poses a special concern for report users who may not know that their security token is being passed to an external data source users are not warned in advance of running a report that the report is configured to use integrated security

    對于那些可能不知道其令牌將傳遞到外部數據源的用戶,使用集成安全性訪問外部數據源會為其帶來一個特殊問題(在運行報表之前不會事先通知用戶報表配置為使用集成安全性) 。
分享友人