As such, it is an excellent place to implement security features.
这样的话,它是一个实现安全特性的绝佳地点。
This file is created when you implement security using any of the AIXPert interfaces.
当使用任何 AIXPert 界面实现安全性时,会创建这个文件。
There's no need for you to implement security features because they're already integrated.
我们不必实现安全特性,因为这都早已集成了。
To implement security, profiles can be defined in the MXTOPIC class to match the TOPIC objects.
要实现安全性,可以在 MXTOPIC类中定义配置文件来匹配 TOPIC 对象。
It is much easier to implement security as you start an application then to try to add it in later on.
这比您先开始开发应用,然后来考虑安全问题容易得多。
The efficient authentication of principals or entities of AN is the foundation to implement security for AN.
对AN主体或实体的有效认证是AN安全实施的前提保障。
Channel auto-definition exits are required to implement security exits on cluster channels in a mixed-platform cluster.
在混合平台的集群中,需要通道自动定义出口在集群通道上实现安全出口。
Describes how to implement security checks declaratively, imperatively, or by directly accessing a principal object.
描述如何宣告式地、命令式地或直接地存取主体物件来实作安全性检查。
In most Web application development scenarios, convenience often leads developers to implement security in their application logic.
在大多数Web应用程序开发场景中,开发人员通常都会出于便利性的考虑而在他们的应用程序逻辑中实现安全性。
The way to design and implement security pattern library is given and it compares the method with other software design methods.
对安全模式库的构建方法进行分析,并与其他软件设计方法进行了比较。
If you define Web services as "something described by WSDL", then more work needs to be done to describe and implement security for you in a consistent fashion across non-SOAP services.
如果您把Web服务定义为“用WSDL描述的某种东西”,那么用一致的方式跨非soap服务为您描述和实现安全性就需要做更多的工作。
WCF Data Servicess do not implement security policies but instead provide the infrastructure required for service developers to write their own security rules and business validation.
WCF数据服务未实现安全策略,而是提供了必需的基础结构,以便服务开发人员编写自己的安全规则和业务验证。
Until we develop and implement usable logging and monitoring standards and facilities, it's difficult - if not impossible - to implement security controls that require logging and monitoring.
直到我们制定出可用的关于记录和监测的标准并实施成为工具之前,是很难——甚至说是不可能——实现需要记录和监测的安全控制的。
In foundation of above design, the core structure of two popular SOAP engine and open source are also studied. XML-RPC engine is extended to implement security mechanism designed above.
在设计了一个完整的安全机制的基础上,文章继续研究两个流行的SOAP引擎的内部结构和开源代码,并扩展XML -RPC的引擎,提出在其上实现了所设计的安全机制的实现方案。
This paper proposes a new scheme for security E-mail based on authentication management which gives fine-grained approaches to E-mails limit control to implement security management of E-mail.
本文提出了结合密码技术,基于授权管理的安全电子邮件方案,对电子邮件进行细粒度权限控制,实现电子邮件的安全管理。
Functional requirements are functions that the program performs to implement the security objectives.
功能性需求是程序为实现安全性目标所执行的功能。
You can implement high security with a single command.
只需一个命令就能实现很高的安全性。
The example in this article has shown you how to implement the security configuration.
本文的示例为您展示了如何实现安全性配置。
This article is not a guide on AIX hardening or how to implement a security policy, but rather attributes relating to password policies that should be considered.
本文并不讨论如何保护 AIX或如何实现安全策略,而是讨论与密码策略相关的应该注意的属性。
Governance and risk management provide the mechanism to implement and enforce security policies within the larger SOA environment.
治理和风险管理提供了在更大的SOA环境中实现和强制执行安全策略的机制。
Application developers should keep whatever code they need to write to implement the required security functionality in some separate module that will be replaced by bought infrastructure over time.
应用程序开发者应该把他们要实现所需的安全性功能而需要编写的所有代码都保留在某个单独的模块中,将来这个模块会被买来的基础架构代替。
Another alternative might be to use generic connections for resources and implement certain application-level security.
另一种替代方法可能是对资源使用通用连接,并实现某种应用层安全性。
To secure your AIX system, you may need to implement hundreds of security Settings.
为了保护AIX系统,您可能需要实现数百个安全设置。
To further increase security, you can implement logging of failed login attempts.
为进一步增强安全性,您还可实现登录尝试失败的日志记录。
Only six months after Suqian began to implement the policy, security volunteers have increased to 38, 000 people, with 1, 521 being rewarded with 206, 400 yuan.
宿迁市开始实行这项政策后,六个月里,保安志愿者的人数增加到38,000,其中有1,521人受到奖励,总金额达到206,400元。
When securing digital information, it is important to implement end-to-end security.
在保护数字信息时,实现全程安全性是很重要的。
Using the JAAS interface for application security can dramatically reduce the effort required to implement an effective security layer and simultaneously increase the safety of the system.
对应用程序安全使用JAAS接口能显著减小实现有效安全层所需的努力,并同时增加系统的安全性。
Using the JAAS interface for application security can dramatically reduce the effort required to implement an effective security layer and simultaneously increase the safety of the system.
对应用程序安全使用JAAS接口能显著减小实现有效安全层所需的努力,并同时增加系统的安全性。
应用推荐