| 1. | Research of cross - layer security architecture in wireless mesh networks 无线网格网的跨层安全架构研究 |
| 2. | Wireless networks do not have physical boundaries , which gives security architects different challenges to overcome 无线网络没有物理边界,这就给安全架构设计师带来了要克服的各种难题。 |
| 3. | At the core of what needs to happen to define a heterogeneous , incrementally implemented security architecture for web services will be standards 为web服务定义一个异质的、渐增式实现安全架构所需的核心是标准。 |
| 4. | An industry colleague that frequently worked with us in support of our projects ( and vice versa ) on network and security architecture referenced them to us 一位在网络和安全架构项目支持上经常与我们合作的同行向他们推荐了我们。 |
| 5. | This paper examines spki / sdsi , a security infrastructure based on public - keys , is designed to facilitate the development of scalable , secure , distributed computing systems 本文接着介绍和分析了spki / sdsi技术,它是一种基于公钥的安全架构。 |
| 6. | As a security architect , to even identify this attack , you have to understand deeply how the c c runtime manages memory and executes running programs )作为安全架构师,要识别这种攻击,就必须深入理解c / c + +运行时如何管理内存和执行在运行的程序。 |
| 7. | None of the vendors at the security seminars i have attended stress that data encryption is by no means a substitute for a comprehensive corporate security architecture 在我所参加的安全研讨会中,没有一个供应商强调数据加密决不是代替综合企业安全架构。 |
| 8. | Secondly , the paper analyzes the security frame based on oracle as10g after introducing the network information system security and the web system 其次,本文在介绍网络信息安全基础和面向服务的web体系的基础上,分析了基于oracleas10g的完整的安全架构。 |
| 9. | This security structure will provide all members with a safety net and will permit all members to work with one another with peace of mind and complete financial security 此项安全架构给所有的成员提供了一个保险的网络,使所有的成员都能够心定神宁,并且保证财务安全方面万无一失的进行相互合作。 |
| 10. | The typical method is to use a unified modeling language tool to outline all the components within the security architecture , and hold a round table with the other components specialists 典型的方法是使用统一建模语言( unified modeling language )工具来勾画安全架构中的所有元件,并与其他元件专家密切合作。 |