login security 中文意思是什麼

login security 解釋
登錄安全性
  • login : 登入(大陸的說法叫登錄,個別網站誤寫為「登陸」)
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. Finally, it analyzes the current security malpractices and universal security protection measures that ec faced. it put forward a security e - mail way that based on smart card, especially in improving on set protocol. and it also discusses the security capability of desktop operation system, gives the security user login management of windows 98 that based on smart card

    本文的最後部分分析了當前電子商務領域所面臨的安全隱患和通用的安全防護措施,提出了基於智能卡的安全電子郵件的解決方案,並重點改進了set協議,分析了安全桌面操作系統的安全性,實現了基於智能卡的windows98的安全用戶登錄管理。
  2. Note : the number of password retries applies system - wide - processes like user and group security, login, and keyboard timeout will also use it

    注意:密碼重試的次數限制廣泛應用於系統范圍類似於用戶和組安全、登錄和鍵盤超時的處理當中都會用到它。
  3. A " cookie " is a temporary security id number assigned by boom to your browser each time you login like a visitor s id badge that lets you move from page to page within password - protected areas of our site, and even leave the site and return, without having to login each time you click to view a new page

    Cookie是一組臨時安全識別號碼,在您每次登入時由boom分配到您的瀏覽器,它就像是訪客識別證一樣,讓您能夠在密碼保護的網頁間隨意瀏覽,即使您離開后重返時,無須重新登入便可以瀏覽新選的網頁。
  4. Login security mode

    登錄安全模式
  5. An introduction to adding login security to a web site

    關于向網站添加登錄安全性的介紹。
  6. Built - in application services that enable you to add membership for login security to your site, profile properties that enable you to maintain user - specific information, and other features, most without requiring any code

    提供內置的應用程序服務,使您可以向站點中添加用於確保登錄安全性的成員資格;提供配置文件屬性,使您可以維護用戶特定的信息;另外還提供其他功能,其中的大部分功能都不要求編寫任何代碼。
  7. It is a login that bypasses all security protection on your system

    。系統中的所有安全防護措施對以超級使用者身份登陸者都是無效的。
  8. Application of encryption technique in security login of mis system

    系統安全登錄中加密技術的應用研究
  9. As well as preserving the current advantages of otp, otpap also patches up some faults successfully : it can be used not only for the identification of users, but also for preventing effectively the fake login. besides, it can construct a reliable security information channel between the users and login nodes, and otpap also supports the remote modification of secret pass - phrases and iterative values even if the user ' s secret pass - phrase has been leaked or the iterative value has been zero

    Otpap除了保持otp現有的優點外,還成功地彌補了otp的這些缺陷: otpap不但可用於鑒別用戶,也可以有效地防範假冒的登錄節點,並能在用戶和登錄節點之間建立可靠的保密通道; otpap還支持遠程修改秘密通行短語和迭代值,即使用戶的秘密通行短語已經泄密了或者用戶的迭代值已經為0 。
  10. This allows a security administrator to review any of the auditing events, including the success and failure of a login attempt and the success and failure of permissions in accessing statements and objects

    這使得安全管理員可以檢查任何審核事件,包括登錄嘗試的成功與失敗,以及訪問語句和對象的權限的成功與失敗。
  11. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系統的網路安全性能。
  12. Some examples include security services, such as login authentication, server - side dependencies management, activation services for message - driven beans, and web services lookup

    一些例子包括安全性服務,比如登錄/驗證、服務器端依賴關系管理、消息驅動bean的激活服務和web服務查詢。
  13. Yes, this means it can do all the important stuff, like become a primary domain controller in a windows nt domain, authenticate windows 95 98 nt 2000 users against its security database, and support roaming profiles, login scripts, and system policies

    是的,這意味著它可以執行所有重要的操作,例如,成為windows nt域中的「主域控制器」 、根據其安全性數據庫認證windows 95 / 98 / nt / 2000用戶,以及支持瀏覽概要、登錄腳本和系統策略。
  14. Is the login security identification number

    登錄安全標識號。
  15. Membership can be integrated with login controls or other asp. net authentication features to provide login security for your site

    成員資格可以與登錄控制項或其他asp . net身份驗證功能集成,以便為網站提供登錄安全。
  16. The system designs login security and insert, alter, seek and delete function. the paper uses java, xml technology and multy _ layer archtecture to realizes pms, and explains the pms development process from the system requiement analysis, function design, realization idea of key function and the pragram flow chart

    本文在應用java相關技術和xml ,採用多層體系結構,從系統需求分析到具體功能設計,以及系統關鍵部分的具體實現思路和流程框圖,闡述了一個人事管理軟體的設計和開發過程。
  17. Based on the analysis of the challenge problems, such as login security, data access, the interruption of exam, in current remote exam system which is an important part of distance education, this article designs an asp. net - based remote exam system to solve these problems and discusses the key technologies

    遠程考試系統是遠程教育的重要組成部分,本文對目前已存在的遠程考試系統的安全登錄、數據存儲和考試中斷加以分析,提出相應的解決辦法,同時對部分關鍵技術進行了研究。
  18. Login controls store information in the page s view state, so it is a best security practice to secure view state

    登錄控制項可以將信息存儲在頁的視圖狀態中,因此保證視圖狀態的安全是一種最佳安全實踐。
  19. For example, in a use case i would likely not use the name " ui23 security login screen, " because it implies i intend to use graphical user interface technology to implement this major ui item

    例如,在用例中,我不願意使用「 ui23 security loginscreen 」這樣的名稱,因為它暗示我想用圖形用戶界面( gui )技術來實現這個主要的ui項。
  20. Audit codes identify events that contain auditable information such as login attempts, access security violations, and authorization violations

    審核代碼標識包含可審核信息的事件,這些信息包括登錄嘗試、違反訪問安全性和違反授權等等。
分享友人