展开安全性部分。
Security section became aware of the breach and performed their function.
安全部门注意到信息的外泄并履行了他们的职责。
The following operation can be performed under the Security section.
可以在Security区域下执行下列操作。
For more information about running WMB with security on see the security section.
有关启用安全性运行WMB的更多信息,请参见安全性一节。
Allowing secure access to a VM is covered in the Security section later in this article.
本文后面的安全性一节将介绍对虚拟机的安全访问。
See the security section in the GRUB manual (see Resources) for more information on GRUB security and other aspects of GRUB.
请参阅GRUB手册的安全性部分(参见参考资料),了解关于 GRUB 安全性和其他方面的更多信息。
The administrator would need to have rights to sign agents on behalf of other users in the Security section of the Server document.
管理员将需要具有代表服务器文档的Security区域中的其他用户为代理签名的权限。
To restrict everything under the editor controller (that is, under the relative URL editor/*), add the security section below to web.xml.erb.
为了对编辑器控制下(即位于相对URLeditor/* 下)的所有内容进行限制,请将下面的security section 部分添加到 web.xml.erb 中。
For more detailed information on creating a form-login page, see WebSphere Application Server v5 information center and look for the form login sub-section under the Security section.
有关创建表单登录页面的详细信息,请参阅WebSphereApplicationServerv 5informationcenter中安全部分下面的表单登录那一段。
In this section we see how to define security roles and configure method permissions.
在此部分,我们将了解如何定义安全角色和配置方法权限。
See the Security Model section for more information.
更多的信息请查看安全模块部分。
The examples in this section will focus on an environment without administrative or application security enabled.
本节中的示例将关注一个没有启用管理或应用程序安全性的环境。
More information about high availability and security issues is available in the resources section.
有关高可用性和安全问题的更多信息,请参阅“参考资料”部分。
In the next section we set up user security over IP connectivity with SSL.
下一节我们将使用经ssl加密的IP连接建立用户安全性。
In the next section we set up link security with SSL over IP connectivity.
下一节我们将使用经ssl加密的IP连接建立链接安全性。
You use these secure transports the same way as the ones mentioned in this section, you just have to supply some additional security properties such as certificates.
使用这些安全传输的方式和本节中所讲的方式是一样的,你仅仅需要提供额外的安全属性,如证书。
We'll discuss domain-based mobile code security in more detail in a later section.
在后面的一节中,我们将更详细地讨论基于域的移动代码安全性。
This section describes potential security attack methods from an attacker or hacker.
本节描述了攻击者或者黑客可以使用的潜在的安全攻击方法。
The authentication described in the previous section is user-level security.
前一节介绍的身份验证方法是用户级安全措施。
We will discuss the details of J2EE security later in the Authorization technologies section.
我们稍后将在授权技术部分中详细讨论J2EE安全性。
To find out more about IBM DB2 UDB Security, see the Resources section.
要查找更多关于IBMDB2UDB安全的信息,请参见参考资料部分。
The section Configure TLS security addresses this.
配置TLS安全性将解决这个问题。
For some of the extra steps to enable security in WSRR, see the section titled 'Configure security'.
有关启用WSRR安全性的步骤,请参见“配置安全性”一节。
For some of the extra steps to enable security in WESB, see the section titled 'Configure security'.
有关启用wesb安全性的步骤,请参见“配置安全性”一节。
For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
This section provides tips on debugging problems with security plug-ins.
本节提供关于调试与安全性插件相关问题的提示。
Another great feature, especially for testing the security of an application, is in the Forms section of the toolbar.
另一个重要特性,尤其是测试应用程序安全性所需的,是工具栏的Forms部分。
Another great feature, especially for testing the security of an application, is in the Forms section of the toolbar.
另一个重要特性,尤其是测试应用程序安全性所需的,是工具栏的Forms部分。
应用推荐