ObjectGrid does not provide any out-of-the-box security implementation of its own, but it does provide security plug-ins so you can implement the security mechanism of your choice.
ObjectGrid自己并不提供任何现成的安全性实现,但提供了安全性插件,以便实现您所选择的安全性机制。
Security is easier to implement in all these scenarios with tools added to the mix that operate at the level of individual messages rather than per-connection or per-queue.
在所有这些场景中,借助在各个消息级别上、而不是在每个连接或每个队列上操作的产品组合中添加的工具,安全性更容易实现。
As such, it is an excellent place to implement security features.
这样的话,它是一个实现安全特性的绝佳地点。
The common thread is that the security models we implement for messaging need to keep pace with the ways in which we use messaging.
共同的思路是我们为消息传递实现的安全模型需要与我们使用消息传递的方式保持同步。
You can implement high security with a single command.
只需一个命令就能实现很高的安全性。
Channel auto-definition exits are required to implement security exits on cluster channels in a mixed-platform cluster.
在混合平台的集群中,需要通道自动定义出口在集群通道上实现安全出口。
It also includes sample security plug-in programs, and shows you how to implement them step by step.
本文还提供了一些安全性插件程序示例,并展示如何逐步实现它们。
Governance and risk management provide the mechanism to implement and enforce security policies within the larger SOA environment.
治理和风险管理提供了在更大的SOA环境中实现和强制执行安全策略的机制。
Functional requirements are functions that the program performs to implement the security objectives.
功能性需求是程序为实现安全性目标所执行的功能。
Application developers should keep whatever code they need to write to implement the required security functionality in some separate module that will be replaced by bought infrastructure over time.
应用程序开发者应该把他们要实现所需的安全性功能而需要编写的所有代码都保留在某个单独的模块中,将来这个模块会被买来的基础架构代替。
Another alternative might be to use generic connections for resources and implement certain application-level security.
另一种替代方法可能是对资源使用通用连接,并实现某种应用层安全性。
To secure your AIX system, you may need to implement hundreds of security Settings.
为了保护AIX系统,您可能需要实现数百个安全设置。
Until we develop and implement usable logging and monitoring standards and facilities, it's difficult - if not impossible - to implement security controls that require logging and monitoring.
直到我们制定出可用的关于记录和监测的标准并实施成为工具之前,是很难——甚至说是不可能——实现需要记录和监测的安全控制的。
The example in this article has shown you how to implement the security configuration.
本文的示例为您展示了如何实现安全性配置。
To further increase security, you can implement logging of failed login attempts.
为进一步增强安全性,您还可实现登录尝试失败的日志记录。
This article is not a guide on AIX hardening or how to implement a security policy, but rather attributes relating to password policies that should be considered.
本文并不讨论如何保护 AIX或如何实现安全策略,而是讨论与密码策略相关的应该注意的属性。
For a scenario like this one, you would need to implement more fine-grained security applying different access rights to different portions of the document.
对于此类场景,需要实现更加细粒度的安全性,对文档的不同部分应用不同的访问权限。
To implement security, profiles can be defined in the MXTOPIC class to match the TOPIC objects.
要实现安全性,可以在 MXTOPIC类中定义配置文件来匹配 TOPIC 对象。
Only six months after Suqian began to implement the policy, security volunteers have increased to 38, 000 people, with 1, 521 being rewarded with 206, 400 yuan.
宿迁市开始实行这项政策后,六个月里,保安志愿者的人数增加到38,000,其中有1,521人受到奖励,总金额达到206,400元。
When securing digital information, it is important to implement end-to-end security.
在保护数字信息时,实现全程安全性是很重要的。
Using the JAAS interface for application security can dramatically reduce the effort required to implement an effective security layer and simultaneously increase the safety of the system.
对应用程序安全使用JAAS接口能显著减小实现有效安全层所需的努力,并同时增加系统的安全性。
Essentially, security administrators can code to the GSS-API and implement virtually any supported security mechanism that supports this interface.
本质上是,安全管理员可以对于GSS -API进行编码,并真正实现支持该接口的、受支持的安全机制。
Configure the environment for SOAP security: SOAP security protocols require access to the libraries that implement SOAP security algorithms.
为SOAP安全配置环境:SOAP安全协议需要访问实现SOAP安全算法的库。
After coming to TSA with 26 years of law enforcement experience at the FBI, I understand the serious threats our nation faces and the security measures we must implement to thwart potential attacks.
我在联邦调查局工作了26年,带着这26年的执法经验来到运输安全管理局,我了解我们国家面对的严重威胁,深知我们采取安全措施阻止潜在袭击的必要性。
When you develop a security plug-in, you will need to implement the standard authentication functions that DB2 UDB invokes.
在开发安全插件时,需要实现DB 2udb调用的标准身份验证函数。
There's no need for you to implement security features because they're already integrated.
我们不必实现安全特性,因为这都早已集成了。
As more companies implement data security measures, audits will likely bring to light older, overlooked breaches from the past.
随着越来越多公司部署数据安全措施,审计报告将有可能揪出很多被忽视的旧账。
It is much easier to implement security as you start an application then to try to add it in later on.
这比您先开始开发应用,然后来考虑安全问题容易得多。
If you define Web services as "something described by WSDL", then more work needs to be done to describe and implement security for you in a consistent fashion across non-SOAP services.
如果您把Web服务定义为“用WSDL描述的某种东西”,那么用一致的方式跨非soap服务为您描述和实现安全性就需要做更多的工作。
If you define Web services as "something described by WSDL", then more work needs to be done to describe and implement security for you in a consistent fashion across non-SOAP services.
如果您把Web服务定义为“用WSDL描述的某种东西”,那么用一致的方式跨非soap服务为您描述和实现安全性就需要做更多的工作。
应用推荐