This view is useful for debugging purposes but should not be enabled in production, as it might compromise security by revealing implementation details.
该视图对于调试过程非常有用,但是不应在生产中启用,因为它披露了实现细节,可能会影响安全性。
Cloud service security can be threatened by poor credentials, protocol exposure, and implementation flaws in remote management.
远程管理中的劣质凭证、协议暴露和实现缺陷都可能会威胁云服务安全性。
Roles assigned to users can be used in the design and implementation of custom security policies, as well as custom workflow and event escalation flows.
分配给用户的角色可以用在定制安全策略的设计和实现中,以及定制的工作流和事件升级流中。
Stay tuned for the upcoming articles in this series, which will continue to explore warehouse ETL process design and implementation, warehouse performance, security, and more.
继续本系列中的下一篇文章,其中将继续探索仓库ETL过程的设计和实现、仓库性能、安全性等。
In the implementation process of SOA, security related problems occur every minute, every place on everybody.
在SOA的实现过程中,几乎每时每刻以及每一个位置都会发生与安全性有关的问题。
The HLD must serve to communicate clearly what they have in mind in terms of providing overall security for the SOA implementation.
HLD必须清楚地从SOA实现的总体安全性的角度说明其设想。
LBAC is an implementation of Mandatory Access Control (MAC), which provides a reasonable level of security assurance for sensitive data stored in database.
LBAC是MandatoryAccessControl (MAC)的一个实现,它为存储在数据库中的敏感数据提供了较高级别的安全保障。
SCA policy sets, defined in the definitions.xml file, can be attached to the implementation to enforce authorization and security identity policies.
xml文件中定义的SCA策略集可以被附加到这个实现以实施授权和安全身份策略。
In the current JCA 1.5 specification, and in the Geronimo implementation, inbound connections do not interact with the container's security subsystem.
在目前的JCA 1.5规范以及Geronimo实现中,入站连接不与容器的安全子系统交互。
The service implementation can verify that WS-Security has been properly applied to incoming messages, but clients need to know in advance what they must implement in order to use the service.
服务实现可以检验WS - Security是否恰当应用于传入的消息,但是客户机需要提前知道它们必须实现什么才能使用服务。
JBoss used to have a concept of SecurityProxy for EJBs, where you could provide an implementation of the EJB business interface that could execute these security checks in code.
JBoss曾经有一个概念是EJB的SecurityProxy,您可以在其中提供EJB业务接口的实现,该实现可以在代码中执行这些安全检查。
You are discussing some of the aspects of security in the Synapse description, including WS-Security implementation.
您在书中描述Synapse时,讨论了安全的某些方面,包括WS - Security的实现。
Security is not directly addressed in the Atom API specification, but one would expect an implementation to support HTTP-based authentication for the various Atom API operations.
AtomAPI规范中没有直接处理安全问题,但预计会出现用于各种Atom API操作的支持基于HTTP验证的实现。
Active involvement in selecting technology standards, evaluating and selecting tools, macro and micro design, development, testing, implementation, reuse, and security aspects.
积极参与选择技术标准、评估和挑选工具、宏观和微观设计、开发、测试、实现、重用以及安全方面等等。
The COE has built-in competency in developing SOA security reference architectures, security standards, scenario-based security implementation strategies, and best practices.
COE具备开发soa安全参考体系架构、安全标准、基于场景的安全实现策略和最佳实践的内在能力。
The implementation of a customized security plug-in is left to your discretion.
定制的安全性插件的实现则有待您来决定。
The security is defined differently than in previous versions of the product due to the implementation of the JEE 5 specifications.
由于JEE5规范的实施,使得安全性的定义不同于早期版本。
Bring your organization into the future with RFID in the Supply Chain, which explains business processes, operational and implementation problems, risks, vulnerabilities, and security and privacy.
使用RFID intheSupplyChain引领您的组织走向未来,其中解释了业务流程、操作和实现问题、风险、漏洞,以及安全性和隐私。
In addition, some related network security technologies are adopted so as to ensure the security of information exchanges during the implementation procedure.
同时该系统采用相关网络安全技术,保证了执行任务过程中信息交互的安全性。
Security vulnerabilities are on security agreement in the concrete implementation errors, is the accident appear abnormal conditions.
安全漏洞是在对安全协议的具体实现中发生的错误,是意外出现的非正常情况。
As a major agricultural province, Hebei province medical security coverage is very low, and there are a lot of problems in the process of the implementation of cooperative medical system.
河北省作为一个农业大省,包括合作医疗形式在内的农村医疗保障的覆盖率很低,且在实施合作医疗的过程中出现了很多问题。
The paper mainly studied the establishment and the technical implementation of information security strategy in CIMS.
本论文主要研究了CIMS系统中信息安全策略的建立及其技术实现问题。
In the detail implementation, several techniques are adopted to insure the system security, including TLS protocol and a Local Application Service Token creation method.
在具体实现上,采用多种技术保证系统的安全性,包括TLS协议,本地应用服务令牌生成方法等。
The key of the electronic commerce implementation is that it must guarantee the system security in the entire commercial process.
电子商务的实施,其关键是要保证整个商务过程中系统的安全性。
Finally, the design and implementation of security Ethernet chip based on SOPC are described in detail, which ensures the higher security and better control of networks.
最后本文基于SOPC技术设计并实现了一块安全以太网芯片,从根本上保证了网络的高安全性和强可控性。
This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.
本文介绍了多用户信息系统中数据库的安全性控制的基本概念及控制模型,以及在多用户信息系统中安全性控制的实现方法。
Finally, based on J2EE security framework, the design and implementation of the security management subsystem are given in detail.
最后,设计并实现了基于J2EE分布式安全框架的该网管系统的安全管理解决方案。
Design and implementation approaches for IKE protocols in the security VPN server are studied in this paper.
研究了安全VPN服务器中ike协议的设计与实现方法。
In this paper, based on provable security theory, a provable security cipher DFC is improved on speed without lost of security by means of fast implementation of square hash function.
介绍基于对称密码系统的可证明安全理论,利用平方哈希函数实现技术,对一种可证明安全算法DFC实施改进后,安全性没有损失,但是速度得到了提高。
Gallagher Security Management Systems is committed to applying these standards in all product development and implementation.
加拉格尔安全管理系统致力于应用在所有的产品开发和执行这些标准。
应用推荐