| 1. | Setting up an encrypted mirror database 数据库镜像传输安全性 |
| 2. | Setting up database mirroring 数据库镜像传输安全性 |
| 3. | When generating keys for use with transport security , two issues arise 当生成使用传输安全性的密钥时,会出现两个问题。 |
| 4. | Each of the three clients in the sample scenario will use ssl transport security 示例场景中的三个客户机都使用ssl传输安全性。 |
| 5. | When websphere application server servers and clients communicate using csiv2 iiop , they negotiate the transport security 当websphere application server服务器和客户端使用csiv2 iiop进行通信时,它们之间协商传输安全性。 |
| 6. | The software infrastructure and information security technology have been summarized to indicate the feasibility of this software system 同时对软件构架,以及对信息传输安全性等关键技术作了总结,以表明系统实现的可行性。 |
| 7. | Once access is configured in each instance , then communications between the two instances use service broker transport security when the endpoints for both instances are configured to allow transport security 每个实例中都配置了访问权限后,当两个实例的端点都被配置为允许传输安全性时,这两个端点间的通信将使用service broker传输安全模式。 |
| 8. | Under the control and guide of integrative security policy , pd2r uses detection tool to understand and evaluate the system ' s security status , and uses proper response to make system most safe and in low risk while using protection tool 本文的内容主要包括策略思想的阐述、策略传输协议、策略在安全方面的应用、策略在网络管理方面的应用以及策略传输安全性研究。 |
| 9. | On the basis of it , i design and implement ipsec in the network protocol stack of linux kernel , which can verify the encryption , integrity and authenticity of data at the ip level . it solves the problem of identification deceit , malicious modification and interception when datum is transmitted on the network , and the security of network transmission is improved greatly 在此基础上,在linux内核ip协议栈中设计并实现了ipsec ,在ip层提供数据传输的机密性、完整性和真实性,解决ip数据报在网络中传输时的身份伪造、被人篡改以及被窃听的问题,使网络传输安全性得到很大提高。 |