英語 での Security mechanisms の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Comprehensive QoS policies and security mechanisms.
Kernel security mechanisms and their practical implementation.
Cryptography and Security Mechanisms.
Some security mechanisms can protect an entire network.
Cryptographic protocols and security mechanisms.
Some security mechanisms can protect an entire network.
Have developed a number of standard security mechanisms in the IETF.
Security mechanisms will also be developed to block system hijacking.
DHCP currently provides no authentication or security mechanisms.
Implement layered security mechanisms to detect this behavior.
DHCP per se currently provides no authentication or security mechanisms.
Application-specific security mechanisms are out of the scope of this document.
The WCF infrastructure is designed to use these Windows security mechanisms.
However, it's possible to build security mechanisms into an already functional system.
This allows different security mechanisms to be used via one standardized API.
The latter makes DNSSEC an essential component of some other security mechanisms, notably IPsec.
Use state-of-the-art security mechanisms- Use state-of-the-art security mechanisms.
Most of the time,the expectation is that applications use their own security mechanisms.
Apple introduced a number of important security mechanisms with the release of macOS Mojave.
Extensions live inside[their]own sandbox and reach out by way of Apple's security mechanisms.”.
Researching and assessing such updatable security mechanisms was the objective of the joint ALESSIO project.
This document also describeskey management requirements for systems implementing those security mechanisms.
Have developed a number of standard security mechanisms in the IETF.
Our research shows that medical devices taking care of criticaltasks like anesthesia devices lack basic security mechanisms.
Unlike FIPS 140-2 Level 2 validation,which requires physical security mechanisms, Level 1 validates the software only.
This form of authentication is based on the principle that if physical access to the file system is achieved,other security mechanisms are superfluous.
Although not flawless,Google Play does employ advanced security mechanisms to keep malware out.
Do you want to avoidfuture additional costs connected with the integration of security mechanisms in your company?
This adheres to the principle that if physical access to the filesystem is achieved,other security mechanisms are superfluous.