SECURITY CONFIGURATION 中文是什么意思 - 中文翻译

[si'kjʊəriti kənˌfigə'reiʃn]
[si'kjʊəriti kənˌfigə'reiʃn]
安全性配置

在 英语 中使用 Security configuration 的示例及其翻译为 中文

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
Enhanced Security Configuration.
What is Internet Explorer Enhanced Security Configuration?
什么是InternetExplorer增强安全配置??
Pay attention to your server's security configuration in order to prevent resource depletion type of DDoS attack.
注意服务器的安全配置,避免资源耗尽型的DDOS攻击。
Items where people might notice a difference are security configuration and OAuth.
人们可能会注意到,具有差异的特性主要是安全配置和OAuth。
Internet Explorer Enhanced Security Configuration reduces this risk by modifying many security-related settings.
InternetExplorer增强安全配置通过修改许多与安全有关的设置降低此风险。
Internet Explorer Enhanced Security Configuration.
InternetExplorer增强安全配置.
Apache has some security configuration tips on their site and Microsoft has some tech center resources for IIS on theirs.
在Apache的网站上有一些安全配置技巧,微软也有一个IIS技术资源中心。
Turn off Enhanced Security Configuration.
关闭IE增强的安全设置
Protecting the monitored system from hackers gaining access to alter the eventlogs may require a new type of security configuration.
保护受监控系统免受黑客获取访问权限以更改事件日志可能需要新类型的安全配置
This mainly refers to the SSID and security configuration on the client.
这主要是指客户端上的SSID和安全配置
You can either add the website to the list of trusted sites orturn off Internet Explorer Enhanced Security Configuration.
可将网站添加到信任网站列表,或者禁用InternetExplorer增强安全配置
Missteps in cloud-based security configurations often lead to data breaches.
基于云端的安全配置误操作也常常导致数据的泄露。
This solution provides real-time email orSMS alerts for any critical security configuration changes, as well.
此解决方案还提供了实时电子邮件或短信告警,用于提醒任何关键安全配置更改情况。
Security configuration changes and guides have been around for about 10 years in the Windows world, longer in other areas.
Windows世界里的安全配置更改和安全指南的出现已经有大约10年的光景了,而对于其他领域,这个时间则更为漫长。
By default, Internet Explorer Enhanced Security Configuration is turned on.
默认情况下已启用InternetExplorer增强的安全性配置
Security Configuration and Analysis enables you to quickly review security analysis results and directly configure local system security..
安全配置和分析使您能够快速复查安全分析结果和直接配置本地系统安全性。
Amazon AWS provides online service, but the security configurations are determined by the user.
亚马逊云服务提供在线服务,但安全配置由用户决定.
WS-SecurityPolicy security configurations detail the security processing needed for messages being exchanged between a client and service.
WS-SecurityPolicy安全配置指定在客户机和服务之间交换的消息所需的安全处理。
EventLog Analyzer continuously monitors and tracks the changes in security configuration settings at the user group level.
EventLogAnalyzer会持续监控和跟踪用户组级别的安全配置设置更改情况。
Needed security configuration and other features are incorporated in IIoT gateway hardware and ais integrated with comprehensive IoT software solutions.
所需的安全配置和其它功能被整合到IIoT网关硬件中,并集成了全面的IIoT软件解决方案。
AIXPert is an all-purpose GUI andcommand-line security tool that incorporates over 300 security configuration settings.
AIXPert是一个通用的GUI和命令行安全工具,它包含了超过300个安全配置设置。
On systems running Windows Server 2003,Internet Explorer Enhanced Security Configuration is enabled by default, which helps to mitigate against this issue.
在运行WindowsServer2003的系统中,默认情况下启用InternetExplorer增强安全配置,以有助于减轻此问题的影响。
By default, Internet Explorer on Windows Server 2012 runs in arestricted mode that is known as Enhanced Security Configuration.
默认情况下,WindowsServer2012中的InternetExplorer运行在一个受限制的模式中,该模式称为增强的安全配置
When users run withstandard user rights instead of administrative rights, the security configuration of the system, including antivirus and firewall, is protected.
当用户使用标准用户权限(而不是管理权限)运行时,系统的安全配置(包括防病毒和防火墙配置)将得到保护。
Meanwhile, CERT Australia handled more than 8,100 incidents involving compromised websites,which are often breached due to poor maintenance or security configuration.
与此同时,报告称,CERT-AU处理了超过8100个网站破坏事故,这些事故的发生通常是源于维护较差或是安全配置
NET application security configuration and IIS security configuration are completely independent and can be used independently or in conjunction with each other.
NET应用程序的安全配置和IIS的安全配置是完全独立的,它们可以单独使用,也可以结合使用。
Thing descriptions expressed in JSON-LD cover the behavior, interaction affordances,data schema, security configuration and protocol bindings.
JSON-LD中表示的内容描述涵盖了行为、交互能力、数据模式、安全性配置和协议绑定。
These include the lack of the latest security updates, antivirus tools, network protection,proper security configuration, and informed security monitoring.”.
这些问题包括缺乏最新的安全更新、反病毒工具、网络保护、适当的安全配置和知情的安全监控,”它继续。
These include the lack of the latest security updates, anti-virus tools, network protection,proper security configuration and informed security monitoring,” it continued.
这些问题包括缺乏最新的安全更新、反病毒工具、网络保护、适当的安全配置和知情的安全监控,”它继续。
结果: 29, 时间: 0.0257

单词翻译

顶级字典查询

英语 - 中文