security management中文,security management的意思,security management翻译及用法

2026-03-22 08:21 浏览次数 18

security management

英[siˈkjuəriti ˈmænidʒmənt]美[sɪˈkjʊrɪti/sə'kjurətɪ ˈmænɪdʒmənt]

[计] 安全管理

security management 片语

片语

Physical Security Information Management物理安全信息管理

security domain management安全域管理

Security Guard management保安管理

Information security incident management信息安全事件管理

security engineering management安全工程管理

Security and Management安全和管理

Security Infrastructure Management Year安全基础管理年

Security Accounts Management即安全账户管理

safety management安全管理

security culture management安全文化管理

security management 例句

英汉例句

  • The new DB2 9.7 release also offers organizations more options in security management and high availability.

    新的DB 2 9.7版本还在安全管理和高可用性方面提供了更多选择。

  • Informational management goes through the whole managing process, and can be used in every link of security management of construction industry.

    信息化管理贯穿于整个管理过程之中,可以应用到建设安全管理的每一个环节。

  • This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.

    它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。

  • Third -- and where the JDBC specification does not have any corresponding focus -- is security management for enabling secure access to back-end systems.

    第三个是支持后端系统的安全访问的安全性管理,在这点上,JDBC规范并没有任何对应点。

  • Delegation component, to provide the ability to delegate the it security management functions to another individual.

    委托组件,以提供将IT安全管理功能委派给其他人的能力。

  • This scenario is frequently used when all components are internal, under the same security management and part of the trusted computer base.

    此场景经常用于所有组件都是内部组件、使用相同的安全性管理且属于受信任计算机群的情况。

  • For portlet and page specific access control management, WebSphere Portal provides a comprehensive security management that lets you control user actions.

    在Portlet和页面特定访问控制管理方面,WebSpherePortal提供全面的安全性管理,允许您控制用户操作。

  • C. information security management organization should consider hiring outside experts.

    信息安全管理组织应考虑聘请外部专家。

  • A typical process of policy based service security management can be divided into five steps and described as follows.

    如下面所述,一个基于策略的服务安全管理的典型流程可以分为五大步骤。

  • All personnel of the B. information security management organization shall be.

    信息安全管理组织的所有人员应该为专职人员。

  • A. information security management personnel should come from different departments.

    信息安全管理组织人员应来自不同的部门。

  • Import an LTPA exported key (you can export the LTPA key using a WebSphere Application Server security management panel).

    导入一个LTPA导出的密钥(可以使用WebSphereApplicationServer安全管理面板导出ltpa密钥)。

  • Individualized security management to ensure that no single authorization id is a security bottleneck that can compromise the enterprise resources.

    个人化安全管理,确保没有任何一个授权ID会成为企业资源泄漏的安全瓶颈。

  • Effective security management protects all it assets to minimize the business impact of security, vulnerabilities and incidents. Some examples of detailed control objectives are.

    有效的安全性管理保护所有的IT资产,以减小安全性、弱点及事件的业务影响。

  • For companies deploying service Oriented Architecture (SOA) and Web services, TFIM provides policy-based integrated security management for federated Web services.

    对于部署面向服务体系结构和Web服务的公司,TFIM为联合Web服务提供基于策略的集成的安全管理。

相关热词