英語 での Security architecture の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Individual attributes Once you decide upon your web application security architecture, there remain several attributes that still need to be considered.
Much of the substance comes from the participants in the LAB Security Architecture Workshop.
So it's no wonder XP's security architecture is not up to date.
KEY MANAGEMENT Key management is an important part of the IP security architecture.
In the previous part of this blog series, we covered an overview of zero trust security architecture concepts.
An expert review can also help you understand where improvements to security architecture will have the most impact.
Security architecture should be designed to provide continuous security, before, during, and after an attack.
The Law on National Security provides a legislative framework for aligning Ukraine's national security architecture with Euro-Atlantic principles.
Keeper uses a proprietary zero-knowledge security architecture and is the most audited and certified product on the market.
MobileIron secures the modern enterprise with a multi-cloud, multi-OS security architecture that puts the human experience first.
Acrosec also provides IT Security Consulting Services in the area of Enterprise Security Architecture, IT Security and IT Risk.
The use of application self-protection and analytics of the user and entity behaviour will help with adaptive security architecture.
We therefore support the ongoing reforms of the UN's peace and security architecture.
Hamachi is stated to use strong, industry-standard algorithms to secure and authenticate the data and its security architecture is open.
We will continue to prioritize the security of nuclear and other radioactive materials and will work to further strengthen the global nuclear security architecture.
LogmeOnce security Cloud is about virtualization and optimization, by simplifying security architecture for both consumers and corporate end users.
It provides a secure and customisable security architecture, full event handling, flexible and secure storage with transparent data encryption, simple and consolidated enterprise encryption, and key management.
Reinforcing the African Peace and Security Architecture, including the African Standby Force are crucial to success in meeting the challenges ahead.
The exact steps for constructing the outer IP header depend on the mode(transport or tunnel) and are described in the Security Architecture document.
Efforts to deepen its engagement in the Indian Ocean Region must not merely be intended to draft India into the existing Asia-Pacific security architecture, but also to recognize the growing strategic salience of the Indian Ocean itself.