英语人>网络例句>authentication 相关的网络例句
authentication相关的网络例句

查询词典 authentication

与 authentication 相关的网络例句 [注:此内容来源于网络,仅供参考]

This is the local security authentication server, and it generates the process responsible for authenticating users for the Winlogon service.

这是一个本地的安全授权服务,并且它会为使用winlogon服务的授权用户生成一个进程。

This chapter contains technical supplements for the Kerberos protocol and X.509 brokered authentication patterns.

本章包含了Kerberos 协议和 X.509 经纪人鉴定模式的技术补遗。

It supports the characteristics of the latest version of HTTP/1.1 such as persistent connections, access authentication model, content negotiation, caching control mechanics, virtual host, chunked encoding and so on.

采用并发多线程结构,并实现了持续连接、访问授权模型、内容协商、缓冲控制、虚拟主机、传输编码等HTTP/1.1的新特性。

As applied to the computer security topics the activity analysis and authentication is performed when it is impossible to get document copies, which user worked on, for example, stored either on ciphered or dismounted disk containers.

至於应用到计算机安全的主题活动,分析和认证,是演出时,是不可能得到的文件副本,而用户的工作,例如储存或是加密或徒步磁盘箱。

As applied to the computer security topics the activity analysis and authentication is performed when it is impossible to get document copies, which user worked on, for example, stored either on ciphered or dismounted disk containers.

作为应用到计算机安全的主题活动,分析和验证,是演出时,是不可能获得文件副本,其中用户的工作,例如储存或是对加密或卸载磁盘容器。

The products mainly include equipments for drying,pelletizing,mixing and comminuting etc.,which are comprehensively applied in the areas of chemical engineering, foods,feeds and medicine etc. The products have passed GMP authentication.

公司产品主要包括用于干燥、制粒、混合与粉碎等设备,广泛应用于化工、食品、饲料、医药等领域,已整体通过GMP认证。

At present, a good part of application program base on account and passwords for authentication. Each entering a system needs to import a pair of account and password. Now there are more and more inner enterprise application systems, if employees want to visit resources in these application systems, they have to be logged and certificated repeatedly, and it will greatly reduce the efficiency; In addition, each application system requires users to use strong countersign, and it will be a heavy burden on users to change and memory their countersigns, so it will cause certain information security risks to enterprises and employees.

当前,大部分应用程序基于账号和密码进行认证,每进入一个系统输入一次账号和密码,企业内部应用系统越来越多,员工要访问这些应用系统中的资源,必须经过多次登录与认证,大大降低了工作效率;另外,各应用系统要求用户使用强度较大的口令,更改和记忆口令成了用户的极大负担,为使用方便,很多用户将密码书写在电脑旁,这对企业和用户形成一定的信息安全风险。

As people cozied up to digital communications, and e-commerce became a force in the economy, the need for crypto's near-magical power of encryption and authentication became red hot.

当人们尽力迎合数字交流,电子商务成为经济中的一支力量时,对于密码近乎魔术的译码和确认功能的需求日益迫切。

As people cozied up to digital communications, and e-commerce became a force in the economy, the need for crypto's near-magical power of encryption and authentication became red hot.

当人们享受数字通讯,而且电子商贸在经济中变得很重要,对编码和认证近乎神奇的加密作用会很火热。

As people cozied up to digital communications, and e-commerce became a force in the economy, the need for crypto's near-magical power of encryption and authentication became red hot.

谁能够抵制像移动电话和联网计算机这样的革新?它们使任何人在任何地方都能被听到。

第41/54页 首页 < ... 37 38 39 40 41 42 43 44 45 ... > 尾页
推荐网络例句

And Pharaoh spoke to Joseph, saying, Your father and your brothers have come to you.

47:5 法老对约瑟说,你父亲和你弟兄们到你这里来了。

Additionally, the approximate flattening of surface strip using lines linking midpoints on perpendicular lines between geodesic curves and the unconditional extreme value method are discussed.

提出了用测地线方程、曲面上两点间短程线来计算膜结构曲面测地线的方法,同时,采用测地线间垂线的中点连线和用无约束极值法进行空间条状曲面近似展开的分析。

Hey Big Raven, The individual lies dont matter anymore - its ALL a tissue of lies in support of...

嘿大乌鸦,个别谎言的事不要再-其所有的组织的谎言,在支持。