| 1. | Uses http session to store the protected information 用http会话存储受保护的信息。 |
| 2. | Do not protect information in the cookie 不保护cookie中的信息。 |
| 3. | The key exchange algorithm protects information used to generate shared keys 密钥交换算法保护用于生成共享密钥的信息。 |
| 4. | Customers are responsible for protecting information and systems on their premises 客户须负责保护位于其地点的资料及系统 |
| 5. | Describes techniques to help protect information used to connect to a data source 介绍了有助于保护用于连接到数据源的信息的技术。 |
| 6. | Demonstrates techniques for protecting information used to connect to a data source 描述提高. net应用程序中的数据安全性和完整性的方法。 |
| 7. | A complete set of intenal policy and technical methods to protect information confidentiality . 教育”模式,通过了iso认证,公司进入全新发展时期。 |
| 8. | The nurse safeguards the client ' s right to privacy by judiciously protecting information of a confidential nature 护士要捍卫患者的隐私权,明智地保障情报的机密性。 |
| 9. | Any person who makes a damaging disclosure of protected information obtained from mainland public servants commits an offence 任何人从内地公务人员取得受保护资料作损害性的非法披露,即属犯罪。 |
| 10. | Recently , the loss that every country in the world has been sustained is tremendous because of the lack of the measure of protecting information 当前由于信息的保护不利和失误,世界各国遭受的损失是巨大的。 |