Use command resource security to ensure that only the queue manager's administrators can modify SYSTEM resources of any kind, such as queues and channels.
使用命令资源安全性确保只有队列管理器的管理员能够修改任何种类的SYSTEM资源,如队列和通道。
It has several easy interfaces that allow you to apply a security level to your AIX system with a single command.
它提供几个简便的界面,让您能够用单一命令对aix系统应用安全级别。
You can do so by limiting access to the commands that can affect them, and also through command resource security. Here are some considerations for SYSTEM resources.
为此,可以限制对可能会影响它们的命令的访问,或者,也可以通过命令资源安全性提供保护。
If in addition to the backstop profile, you define SYSTEM and application profiles, then only resources (such as queues) that match those command resource security profiles can be defined.
如果除backstop配置文件外,还定义了SYSTEM和应用程序配置文件,那么只能定义匹配那些命令资源安全性配置文件的资源(比如队列)。
These permissions are changeable by using the chmod command and are generally good enough for most of the file security on the system.
可以使用chmod命令修改这些权限,一般来说它们足以保证系统上大多数文件的安全性。
In order to manage the security system efficiently, we furthermore present a command line interface based on command tree technique.
此外,为了高效管理安全系统,我们还为安全系统提供基于命令树技术的命令行界面。
In the campaign command control system, security is obviously important.
在作战指挥控制系统中,安全问题显得尤为重要。
Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.
指挥自动化网络安全系统,基于信息存储、通信信道、计算机病毒及电磁辐射等安全性分析。
For constructing network security systems, other measures preventing from being threaten and enhancing operators' quality are needed for the whole security plan in command automation system.
同时需在指挥自动化网络整体安全计划中加入其它防止威胁的措施,并加强人的素质教育。
Requests for E-mail system in Chengdu-Deyang-Mianyang region's networked manufacturing system are analyzed according to its practical command. Especially, its security is discussed deeply.
根据成、德、绵区域网络化制造系统的实际需要,分析了网络化制造系统中邮件系统的各种要求,尤其对其安全性进行了深入的探讨。
Requests for E-mail system in Chengdu-Deyang-Mianyang region's networked manufacturing system are analyzed according to its practical command. Especially, its security is discussed deeply.
根据成、德、绵区域网络化制造系统的实际需要,分析了网络化制造系统中邮件系统的各种要求,尤其对其安全性进行了深入的探讨。
应用推荐