这里是一个弱安全性系统的例子。
安全性中性的程序码与安全性系统并无明显关联。
Security-neutral code does nothing explicit with the security system.
破坏,避开或操纵高安全性系统的独创性或纯粹的蛮力。
Destroy, bypass or manipulate the high security systems with ingenuity or sheer brute force.
本课程包括了设计和操作临界安全性系统时重要的理论和技术。
Covers important concepts and techniques in designing and operating safety-critical systems.
NET使用安全性系统来限制对特定使用者帐户或使用者帐户所属之角色的存取。
NET USES a security system to restrict access to specific user accounts or the roles to which the user accounts belong.
不过,即使是具有严密安全性系统的资料来源,如果设定不正确,也可能在攻击中受损。
However, even a data source with a robust security system can be victimized in an attack if it is not configured appropriately.
安全性系统使用XML档来储存和重新建立各个原则层级的程式码群组阶层架构。
The security system uses XML files to store and recreate the code group hierarchy for each policy level.
介绍农村运输安全性系统的组成要素、特性及以系统主要素为参数的一定运输系统事故的数学模型。
This paper introduces component parts, characteristics of countryside transport safety system, and a mathematical model of transport accident based on parameters from the main system components.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
SEA还将负责与编写安全性服务代码的程序员及在部署系统前对其进行测试的安全性系统测试人员合作。
The SEA will also be responsible for working with programmers who have to code security services and security system testers who can put the system through a testing phase before it is deployed.
使用GSS - API的主要优点是,通过使用这种通用API编写代码,您的实现可以与不同的安全性系统互操作。
The main advantage of using the GSS-API is that by writing to this generic API, your implementation can interoperate with various security systems.
在8.2版之前,这些操作是由DB 2udb之外的设施管理的,例如操作系统、域管理器或Kerberos安全性系统。
Prior to Version 8.2, these operations were managed by a facility external to DB2, such as the operating system, a domain controller, or a Kerberos security system.
链式决策中最薄弱的环节决定了系统的安全性。
The weakest link in the chain determines the security of the system.
首先,许多人会担心这个系统的安全性。
First, many voiced their concern about the safety of this system.
为了增强系统安全性它还支持影子口令。
It also provides shadow password support to enhance system security.
其结果之一,就是使他们系统的安全性受损。
One consequence, among others, is to damage the security of their systems.
随着对操作系统安全性的深入研究,将会引入新的访问控制方法。
New access-control methods will also be introduced as research into operating system security continues.
它可以对一些数据库事件,例如授权检查、数据库对象维护、安全性维护、系统管理和用户验证等做日志记录。
It is capable of logging database events such as authorization checking, database object maintenance, security maintenance, system administration, and user validation.
网关、安全性方法、屏幕、操作系统和浏览器的标准经常改变。
There are constantly changing standards for APIs, gateways, security methods, screens, operating systems, and browsers.
与自定义不同,我们将立即讨论安全性。安全性是由系统管理员创建的,用于执行企业或部门定义的访问控制。
Unlike customization, which we will discuss in a minute, security is based on policies created by system administrators to enforce corporate and departmental defined access controls.
令人欣慰的是,大多数读者都能够认识到安全性是企业系统的一个关键方面。
Hopefully, most readers realize that security is a key aspect of enterprise systems.
令人欣慰的是,大多数读者都能够认识到安全性是企业系统的一个关键方面。
Hopefully, you already realize that security is a key aspect of enterprise systems.
如果不是这样,那么这种方案的安全性就要下降,整个系统可能都需要置于dmz之内。
If this is not the case, then this option is less warranted, and the entire system can be placed either entirely behind the DMZ, or inside the DMZ.
位于WebSphereIntegrationReferenceArchitecture的所有功能之下的是安全性、目录、系统管理和资源虚拟化的管理服务。
Beneath all the capabilities of the WebSphere Integration Reference Architecture are the management services for security, directory, system management, and resource virtualization.
这可以包括各种操作系统的使用、WebSphereApplicationServer安全性、备份系统以及其他方面。
This may include such things as use of various operating system services, WebSphere Application Server security, backend systems, and others.
不幸的是,我并不能保证我客户信息的安全性和通过我们自己系统通信的安全性。
Unfortunately, I cannot guarantee the "safety" of my clients' information and communications that pass through my systems.
系统管理:数据管理、数据仓库安全性、系统和数据库的备份和恢复,等等。
System management: data management, data warehouse security, system and database backup and recovery, and so on.
在估计安全性被破坏而造成的损失时,不要忘记安全性被破坏会导致系统用户对系统失去信心。
When estimating the damage of a security breach, never forget that security breaches can cause users to lose faith in the system.
使用操作系统安全性时,需要确保两个系统会将相同的名称转换为相同的ID。
When you use OS security, you need to ensure that both systems convert the same names to the same IDs.
由于使用操作系统级别的安全性,因此将需要确保系统间的用户和组保持一致。
Because of OS level security you will need to make sure that the users and groups for the systems are consistent.
应用推荐