在 英语 中使用 Security protocol 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
TLS or“Transport Layer Security” is a widely deployed network security protocol.
The DNS Security Extensions(DNSSEC) is a security protocol created to mitigate this problem.
OpenSSL is a security protocol used by open source web servers such as Apache and Nginx- which host around 66% of all the world's sites.
DNS over TLS(DoT) is a security protocol for encrypting and wrapping Domain Name System(DNS) queries and answers via the Transport Layer Security(TLS) protocol. .
Juniper Networks SSL VPNs are based on the Instant Virtual Extranet(IVE) platform, which uses SSL, the security protocol found in all standard Web browsers.
Synopsys' highly configurable security IP solutions include Root of Trust, content protection, cryptography, and security protocol accelerators for integration into SoCs.
Info: Provides text-based details about the Wi-Fi network you're currently connected to, including transmit rate, security protocol in use, channel, and band.
These apps have high security protocols that require a high level of security. .
Do not invent your own security protocols.
New exchanges in recent times have fought with the security protocols on their platform, but ZeroBank has not had any security concerns.
These security protocols encapsulate a normal bidirectional stream socket, and the JSSE API adds transparent support for authentication, encryption, and integrity protection.
With up to 2GBpS fast connections, and a range of security protocols, SwissVPN is fast and reliable, and has no restrictions on use.
The wireless security protocols are WEP, WPA, and WPA2, serving the same purpose but being different at the same time.
At the moment, most messaging apps lack a standard set of security protocols and a unified API framework for enabling“cross-messenger” communications.
Newer applications of transport layer security protocols protect both HTTP and non-HTTP application communications, including client/server applications and other network traffic.
Students who pursue a concentration in this focus stand to gain knowledge in cloud computing, infrastructure, and security protocols.
The vast majority(77%) also believe that their Chief Executive Officer has probably broken internal security protocols at some point- either intentionally or unintentionally.
A network camera provides web server, FTP(File Transfer Protocol), and e-mail features, and includes many other IP system and security protocols.
It's a two-step process: First, the RealVNC server sends the client a shorthand list of the security protocols the server is configured to support.
The hosting provider is responsible for providing customer support, maintaining server hardware and software, including security protocols and updates, and safeguarding against crashes and downtime.