Let's imagine that you live in a small home with a wireless security setup that offers a functional anti-jamming system.
想象一下,你住在一间小房子里,里面安装了具有抗干扰功能的无线安全装置。
Your security setup is not correct.
安全设置不正确。
The security setup requires the Namespace ID.
安全设置需要名称空间id。
Allow adequate time for security setup and validation.
为设置和验证安全性保留足够时间。
The LDAP server is an important part of any security setup.
LDAP服务器是任何安全安装的一个重要部分。
To add Spring security, type the following command: security setup.
要添加springsecurity,输入以下命令:security setup。
Figure 3 shows the bind security setup between CICS and TXSeries regions.
图3显示了CICS与TXSeries区域之间的绑定安全性设置。
I must stress that data encryption is only one of the tools in a comprehensive Internet security setup.
我必须强调数据加密只是英特网综合安全设置中的一个工数据设置综合具。
For example, executing the security setup command before the user has a web application does not make any sense.
例如,在用户拥有Web应用程序之前执行security setup命令就没有任何意义。
The architecture in Figure 1 provides an example of the security setup for CICS TS and TXSeries integration using IPIC (IP Connectivity) with SSL.
图1中的架构提供了一个面向CICSTS与TXSeries集成的安全设置示例,使用了经ssl加密的IPIC (ip连接)。
For example, the security setup command, which installs Spring security into the project, is not visible until the project is a web application.
例如,security setup命令,它将Spring security安装到项目中,除非该项目是一个Web应用程序,否则它不可见。
This is both a good and a bad thing because it simplifies the security setup scenario but also leaves you unable to practice the Principle of Least Privilege.
这种方法简化了安全设置场景,但是这样一来就无法使用最小特权原则了,因此该方法既有优点也有缺点。
It could be that a security setup that was acceptable several years ago when the queue manager was first defined is no longer consistent with your site security policy.
可能出现下面的情况:一个安全性设置在几年前首次定义队列管理器时是合适的,但现在不再符合您站点的安全策略。
Before starting the file-based security setup process, you need to copy the user.props and groups.props text files to the Rational Asset Manager profile for your WebSphere Application Server.
在开始基于文件安全的配置过程之前,您需要将user . props和groups . props文本字段复制到您的WebSphereApplicationServer的RationalAssetManager配置档案中。
This setup has a number of advantages, such as detailed resource management and security.
该设置具有大量优势,比如详细的资源管理和安全性。
This article has also shown you configuration walk-through including environment setup and security enablement for process integration.
本文还向您介绍了配置的全过程,包括用于流程集成的环境设置和安全支持。
In addition, GVPE is also easy to setup and configure as a restartable and permanent service, while still retaining security.
另外,作为一个可重启和永久的服务,GVPE还容易设置和配置,同时仍然保持安全性。
Every organization requires a full-fledged mail client with rich features, security, and easy setup.
每个组织都需要一个成熟的电子邮件客户端,它提供了丰富的功能、安全且安装简单。
File-realm-demo: Demonstrates how to setup security restrictions using a flat file of users and groups.
file - realm - demo:展示如何使用用户和组的平面文件设置安全约束。
Depending on the setup of your MySQL server and its security Settings and passwords, your command might vary a bit.
根据MySQL服务器的设置及其安全设定和口令,命令可能略有不同。
We are going to enable the security, finish the DataSource setup and finally deploy the EAR that we created.
我们将启用安全性,完成DataSource设置并且最终部署我们所创建的EAR。
Database security administrator (DBSECADM) is a new built-in role introduced to perform all security-related administration, including setup of the LBAC security infrastructure.
数据库安全管理员(DBSECADM)是一个新的内置角色,用于执行所有与安全相关的管理,包括LBAC安全基础设施的设置。
Permissions could not be properly configured for the Fax Operators security group. Run Setup again and choose to reinstall the Administration component.
无法为传真操作员安全组正确配置权限。请再次运行安装程序并选择重新安装管理组件。
The password above will not be encrypted during Setup. For maximum security, you may leave the password blank, and Setup will prompt you later for the password.
以上密码在安装期间不会得到加密。为了安全,您可以不填密码,安装程序以后会提示您填入密码。
In the third one, the design model based on the sharing technology of the security resources is setup in order to improve the P2P security.
第三部分提出了一种基于P 2 P的安全资源共享以提高P 2 P安全性的设计模型。
For maximum security, you may leave the password blank, and Setup will prompt you later for the password.
为了安全,您可以不填密码,安装程序以后会提示您填入密码。
Most hosting providers does not support above setup. For security reason they stop networking as soon as they detect multiple MAC addresses.
大多数托管服务提供商不支持以上设置。出于安全原因,他们停止联网,尽快为他们检测多个MAC地址。
Allows you to easily protect your desktop from entering your system setup and protect your desktop security.
能够让你很容易的保护你的桌面,防止进入你的系统设置和保护你的桌面安全。
With professional communication user constantly requiring more quickly setup a call, more reliability and more security, Trunking system complexity and business functions constantly increase.
随着专业通信用户对通信网络的接续时间、可靠性以及安全性的要求不断提高,数字集群系统的系统复杂性也不断提高、业务功能不断增多。
This paper introduces the network construction, the software setup, user management and authorize, and information security measurement.
介绍了该系统的网络结构方案、软件调试与设置、对用户的管理与授权及信息安全措施。
应用推荐