英语人>网络例句>encrypted 相关的网络例句
encrypted相关的网络例句

查询词典 encrypted

与 encrypted 相关的网络例句 [注:此内容来源于网络,仅供参考]

NET, it does demonstrate the reading and writing of a serialized object graph to an encrypted file.

NET中,它表现出的阅读和序列化对象图写入加密的文件。

Applying the principles and methods of high-resolution sequence stratigraphy, and combining with the data of exploration wells and development wells in encrypted network of wells, the authors identified 41 short-term base-level cycles of 7 types, which were formed under the conditions of deeping upward, shallowing upward, symmetrical in different accommodation space in Fuyu oil layer of Chao 1-Chao gas 3 blocks, and makes detailed analysis on the genesis and characteristics based on the sedimentary dynamics.

运用高分辨率层序地层学原理和方法,结合探井及密井网开发井资料,在朝阳沟油田朝1-朝气3区块扶余油层识别出向上&变深&、向上&变浅&、对称型及其不同可容纳空间条件下的7类共41个短期基准面旋回,并以沉积动力学观点详细剖析了其成因及特征。

Using ssh or other encrypted password methods thwarts this attack.

使用 ssh 或其它加密密码的方法可以对抗这种攻击。

D5 is a one-way hashing procedure, meaning that it verges on the impossible to restore an encrypted password to its original form.

d5是单行的hashing过程,意思是几乎不能以最初的格式重新储存已加密的密码。

In key management, an attack in which a complex communication session, between a host and a terminal, including the transmission of the session key, encrypted under the terminal key, is wiretapped and recorded.

在密钥管理中,一种搭线窃密并记录主机和终端之间复杂通信话路的窃密方法。

All of your sensitive information is encrypted for security and kept right at your fingertips.

您所有的敏感资料加密的安全和保持正确的在您的指尖。

The modular design of printNet system is divided into several application part, such as data processing tools, design tools, products, Business card printing tools, and solutions to technical tools, of which the highest is a design tool over the actions that it printLayout from page formatting and setting variables, but also can be used by an operator in a transform tool programming, so that the contents of the variables in a database in output for operations, now produetion of mostly to one-dimensional bar codes and encrypted bit or anti-false, the party is a method in the bar code by addition, subtraction, multiplication, Division, opinins Mo, and so after the results or the results of data, or the result is converted to the data that corresponds to a location in one of the ntehs detection accuracy is valid, just make a bit of the inverse operation, the operation that results in comparison with the original data, such as the same as the data is valid, such as different then the data is not valid, this scenario is the most simple and most primitive anti-counterfeit. PrintNet software to complex product environment " interpuntion and output the integration of integrated management " solution possible.

printNet系统的模块式设计分为几个应用部分,如数据处理工具、设计工具、产品制卡工具以及方案解决工具,其中技术含量最高的是对设计工具printLayout的操作,它除了设计页面格式和设置变量外,还可由操作员在转换工具中编程,以便对数据库中的变量内容在输出时进行运算操作,现在生产中应用的大多是给一维条码加校验位或是防伪加密,其方一法是将条码中的数据经过加、减、乘、除、取莫等运算后,将结果或将结果中的几位至于数据后,或将结果转换成对应符号放在数据中的某个位置,如须检测某一数据是否准确有效,只要把校验位上的数进行逆运算,把运算结果与原数据比较,如相同则数据有效,如不同则数据无效,这种方案是最简单最原始的防伪加密的方法。printNet软件系统使得在复杂产品环境下的&排版与输出一体管理&的集成解决方案成为可能。

The last bread crumb in this long trail was an encrypted folder in Ackerson's secret files, the one labeled "S-III."

在一长串线索里,最后的证据是埃克森的高度机密文件中的一个加密文件,标志为&S-III。&

In addition, all the information on a cash card's magnetic strip is also encrypted so that someone finding a card cannot learn the cardholder's personal ID number or bank account number.

此外,储蓄卡磁条上的所有信息都加了密,这样,即使有人得到卡,也不知道持卡人的密码和帐户号码。

This paper briefly introduced the development phases of software dog, expatiated on the software dog's software and hardware principles, and analyzed the sameness and difference between software dog and encrypted information. Based on the particular introduction of the inner architecture of CY7C68013 chip which belongs to Cypress corporations EZ-USB FX2 series, the paper gave the hardware implementation of software dog, presented the program flow chart of software dog, and introduced the making process of both driving program and super application program.

简单介绍了软件加密狗的几个发展阶段,具体说明了加密狗的软、硬件原理,并分析了软件加密狗与信息加密的异同,详细介绍了Cypress公司EZ-USB FX2系列CY7C68013芯片的内部结构,并给出了基于此芯片的加密狗的硬件实现,给出加密狗内软件程序流程图,并简要介绍了驱动程序和高级应用程序的制作。

第20/24页 首页 < ... 16 17 18 19 20 21 22 23 24 > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。