有奖纠错
| 划词

Data confidence, integrity, nonrepudiation, identity and access control are the five key factors to protect online bank, stock, tax from attacks.

数据机密性、完整性、防抵赖、身份识别、五个关键题是保银行、券、报税等典型的交易系统全运行的基础。

评价该例句:好评差评指正

用户正在搜索


impudence, impudent, impudicity, impugn, impugnable, impugnation, impugnment, impuissance, impuissant, impulsator,

相似单词


3G, 401(K), a,

声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。

BBC随身英语(官网版)

Control of access to flight paths will also need to be worked out.

还需要飞行路径的访问控制

评价该例句:好评差评指正
科技 Crash Course

There are many other models for access control – like the Chinese Wall model and Biba model.

还有许多其他的访问控制模型——比如 Chinese Wall 模型和 Biba 模型。

评价该例句:好评差评指正
科技 Crash Course

To solve this problem, Ethernet requires that each computer has a unique Media Access Control address, or MAC address.

为了这个问题,以太网要求每台计算机都有一个唯一的媒体访问控制地址,即 MAC 地址。

评价该例句:好评差评指正
科技 Crash Course

This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.

这是权限或访问控制列表 (ACL) 完成的,它描述了每个用户计算机上的每个文件、文件夹和程序的访问权限。

评价该例句:好评差评指正
科技 Crash Course

For organizations with users at different levels of access privilege – like a spy agency – it's especially important for Access Control Lists to be configured correctly to ensure secrecy, integrity and availability.

于拥有不同级别访问权限的用户的组织(如间谍机构),正确配置访问控制列表以确保保密性、完整性和可用性尤为重要。

评价该例句:好评差评指正

用户正在搜索


impulsivesound, impulsor, impunctate, impunity, impure, impurely, impureness, impurity, imput, imputability,

相似单词


3G, 401(K), a,
  • 微信二维码

    关注我们的微信

  • 手机客户端二维码

    下载手机客户端

赞助商链接