Примеры использования System configurations на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
System Configurations.
Appendix B: System Configurations.
System Configurations.
Appendix B: System configurations 49.
System configurations as no. 2.2.
Multiple cooling system configurations available.
System configurations as no. 2.2.
System configurations as no 3.2.4.
Wherever key-encrypting keys are used,examine system configurations and key storage locations to verify.
System configurations as nos. 1.1- 1.3.
The last chapter explains how to set up system configurations so MxEasy works according to your requirements.
System configurations where appropriate.
Select a sample of system components and inspect the system configurations to verify that only one primary function is implemented per server.
System configurations where appropriate.
Observe an administrator log on to each system and examine system configurations to verify that a strong encryption method is invoked before the administrator's password is requested.
System configurations as nos. 1.1- 1.3.
If virtualization technologies are used, inspect the system configurations to verify that only one primary function is implemented per virtual system component or device.
System configurations e.g. 2S/1M, 2S/2M etc.
In addition to basic installation and operating instructions, it provides valuable information on various RC-1590 system configurations as well as general information that will help you get optimum performance from your system. .
Today we have system configurations for the following unmanned systems. .
In addition to installation and operating instructions, it provides valuable information on various system configurations as well as general information that will help you get optimum performance from your system. .
In certain system configurations, this allowed local users to escalate their privileges.
Section 4b: system configurations figures.
Examine system configurations for remote access servers and systems to verify multi-factor authentication is required for.
Interview system administrators and examine system configurations and permissions to verify that audit trails are secured so that they cannot be altered as follows.
Examine system configurations and supporting documentation to verify the service provider offers a secure protocol option for their service.
With the upgrade to PSIairport/BHS 3.0, the airport's individual system configurations remain intact while the new modules and functional scope provide the airport additional potential for optimisation.
Examine system configurations and key storage locations to verify that cryptographic keys used to encrypt/decrypt cardholder data exist in one(or more) of the following form at all times.
For TLS implementations, examine system configurations to verify that TLS is enabled whenever cardholder data is transmitted or received.