青年中文青年中文

security state的意思

security state中文翻譯:

安全狀態

相似詞語短語

security───n.安全,安全性;保證;證券;抵押品;adj.安全的;保安的;保密的

security zone───安全地帶

security control───安全技術;保安措施;安全技術,安全控制,保安措施

security features───安全特征(securityfeature的復數)

state a state───州

state───adj.國家的;州的;正式的;n.(State)(羅、瑞典)斯塔特;(英)斯泰特(人名);vt.規定;聲明;陳述;n.國家;州;情形

security officers───安全官員;安全人員

distressed security───危難證券

cumic security───cumic安全

雙語使用場景

Determines whether the current thread requires a security context capture if its security state has to be re-created at a later point in time.───確定在必須在稍后的某個時間點重新創建當前線程的安全狀態的情況下,當前線程是否需要安全上下文捕獲。

Any event that attempts to change the security state of the system. Also any event that attempts to violate the security policy of the system.───任何試圖改變系統安全狀態的事件以及任何試圖違反系統安全政策的事件。

plant control system includes at least one control device and an engineering device for modifying the security state of the control device.───工廠控制系統包括至少一個控制裝置和一個工程裝置,該工程裝置用以改變該控制裝置的安全狀態。

Manipulating threads is dangerous because of the security state associated with threads.───由于安全狀態與線程關聯,對線程進行操作是危險的。

Some objects hold security state in themselves.───某些對象自己保存安全狀態。

Manipulation of threads is dangerous because of the security state associated with threads.───由于與線程關聯的安全狀態的原因,對線程進行操作是很危險的。

The server also handles tasks, such as "communicating transaction security state across calls, " David said.───服務器還處理任務,比如“通過調用通信事務處理安全狀態”,David說。

Research and Implementation of Synthesis Evaluation Technology for Network Security State───網絡安全狀態綜合評估技術研究與系統實現

Online Quantitative Evaluation Algorithm for the Network Security State───網絡安全狀態在線定量評價算法

英語使用場景

This would soon leave only the androids protecting the security state apparatus.

The algorithm handles uncertain information with Bayesian inference, giving a quantitative evaluation of the security state of a system and eliminating false alarms effectively.

For example, the x86 STR instruction retrieves the security state, but the value returned is based upon the particular requester's privilege level.

Initialization vectors and other security state information is often contained in the security mechanism itself.