首页 / 词典 / good

iis

  • 网络web服务器;Web服务;组件;服务
iisiis

noun

1
the most notorious and possibly the most important arm of Iraq's security system
the Iraqi Mukhabarat has been involved in numerous terrorist activities
Synonym: Iraqi Intelligence Service Iraqi Mukhabarat

数据来源:WordNet

  1. How to Use Security Characteristics of IIS 5 in Web Application

    如何在Web应用中利用IIS5安全特性

  2. Implementation of Teaching System Assisted by Network Based on IIS and ASP Technology

    基于IIS与ASP技术的网络辅助教学系统

  3. Research and Management of the Virtual Hosts Based on IIS

    基于IIS的虚拟主机的研究与管理

  4. IIS is applied to create system running environment ;

    IIS应用服务器技术,构建系统的运行环境;

  5. Strategies of Improving the Operation System and IIS Safety

    提高操作系统和IIS安全性的策略探讨

  6. Guaranteeing the Security of Web Server through Strengthening IIS Security Control

    加强IIS的安全管理确保Web服务器安全

  7. The Composition of a Remote Question Answer System Using ASP and IIS Technology

    应用ASP+IIS技术实现远程答疑系统

  8. This system design has operated well through the IIS test after being completed .

    本系统设计完成之后,经过IIS测试,运行良好。

  9. Solution of Remote Data Access based on IIS

    基于IIS的远程数据访问解决方案

  10. The system designed in this paper is an attack testing system for IIS web server .

    本文所做的目标系统就是针对WEB服务器(IIS)设计的入侵检测系统。

  11. NET applications do not run in the IIS process .

    NET应用程序不在IIS进程中运行。

  12. No need to introduce IIS on your application 's middle tier

    无需在应用程序的中间层引入IIS

  13. Clear the allow IIS to control the password check box .

    清除“允许iis控制密码”复选框。

  14. IIS Virtual Host Environment Design Based on Windows NT

    基于WINDOWSnt的IIS虚拟主机环境设计

  15. The Enterprise Server runs on top of Internet Information Server ( IIS ) .

    企业网络服务器工作于互联网信息服务器(IIS)之上。

  16. The settings in IIS control what type of HTTP authentication is used .

    IIS中的设置控制所使用的HTTP身份验证类型。

  17. Management and Analysis of WWW Service on IIS

    IIS下WWW服务的管理与分析

  18. If you configure multiple authentication methods , IIS uses the most secure method first .

    如果配置多个身份验证方法,则iis首先使用最安全的方法。

  19. The Interface of Database / IIS and ASP Application

    数据库与IIS的连接原理及ASP在IIS上的应用

  20. The following security measures will be implemented to configure IIS on your computer .

    将实施以下安全措施以配置用户计算机上的iis。

  21. Complete list of the server variables could be found in the IIS documentation .

    完整的服务器变量列表可在IIS文档中找到。

  22. The IIS application pool user name is invalid .

    iis应用程序池用户名无效。

  23. The number of IIs arrested for crimes was also declining .

    因犯罪而被捕的非法入境者数目也持续下降。

  24. Theory and Essence of IIS Manipulating Colorful Image Information

    彩色图像信息处理的IIS理论及实质

  25. You will see later how to set up the appropriate secure Web site using IIS .

    在后面会看到如何使用IIS设置安全的Web站点。

  26. This paper discussed the inquiry method of active web site database using ASP design on IIS server .

    本文论述了在IIS服务器上,使用ASP设计一种网站数据库的查询方法。

  27. Note You must restart Internet Information Services ( IIS ) for your changes to take effect .

    注意:要使更改生效,必须重新启动Internet信息服务(IIS)。

  28. Complete the following steps to configure IIS and enable SSL security .

    完成以下步骤,以配置IIS和启用SSL安全性。

  29. By default , remote access is enabled for a local IIS Web site .

    默认情况下,为本地iis网站启用了远程访问。

  30. To enable IIS to serve the request , see the procedure below .

    若要启用iis以处理该请求,请参见下面的过程。