• 对于两个服务应用程序安全考虑

    Security considerations for the two service applications.

    youdao

  • SaaS应用程序安全需求

    Security requirements for SaaS applications.

    youdao

  • 下面定义特定应用程序安全

    Next, you define security specific to your application.

    youdao

  • xml保护应用程序安全配置

    Security configuration protecting the application in web.xml.

    youdao

  • 需要定义Web应用程序安全约束

    You will need to define a security constraint for the Web application.

    youdao

  • 测试Web应用程序安全配置

    Testing the security configuration for the Web application.

    youdao

  • 启用EJB应用程序安全

    Enabling security for the EJB application.

    youdao

  • 下面定义应用程序安全

    Next you define the application's security.

    youdao

  • 配置示例应用程序安全

    Configuring security for the example application.

    youdao

  • JVM可以提供用于应用程序安全管理器沙箱

    The JVM can provide a security manager or sandbox for applications.

    youdao

  • 这种做法通常导致应用程序的安全可伸缩性降低

    Doing so typically causes an application to become either less secure or less scalable.

    youdao

  • 必须了解安全功能本身不能保证数据库应用程序安全

    It is important to understand that security features alone cannot guarantee a secure database application.

    youdao

  • 安全警告错误使用对象可能危及应用程序安全

    Security Alert Using this object incorrectly can compromise the security of your application.

    youdao

  • 一段目的描述如何应用AOP 技术实现应用程序安全

    An Experience Report The goal of this section is to describe how AOP can be used to implement application security.

    youdao

  • 数据库级安全措施包括身份验证授权可以用于加强应用程序安全

    Database-level security measures including authentication and authorization might also be used to enhance application security.

    youdao

  • 应用开发人员需要布署人员沟通,怎么样保证应用程序的安全

    Application Developers need to communicate to Deployers how the security is to be set up for the deployed application.

    youdao

  • 状态所有者负责发起转换从而驱动应用程序安全模型(请参见5)。

    The owner of the state is responsible for initiating the transitions, so drives the security model of the application (also see Figure 5).

    youdao

  • 系列后续文章谈到定制配置应用程序安全有很多不同方式

    The many different ways you can customize and configure the security aspects of the application will be covered in subsequent parts of this series.

    youdao

  • 如果前面没有首先部署应用程序安全部署计划应用程序在这里部署失败

    If you did not first deploy your application's security deployment plan previously, your application will fail to deploy here.

    youdao

  • 业务流程策略管理组件使用下面安全组件实现业务应用程序的安全职责

    The business process and policy management component USES the following security components to fulfill its security obligations to the business applications.

    youdao

  • 我们希望确保选择生成JSP示例代理应用程序自动生成示例JSP应用程序的安全

    We want to secure the sample JSP application that is automatically generated when selecting the generation of the JSP sample proxy application. To do this.

    youdao

  • 验证业务应用程序安全功能一样重要核心应用程序逻辑通常和验证程序混杂在一起。

    As important as it is to the safety and functionality of your business applications, core application logic is often cluttered with validation routines.

    youdao

  • 作为一个展示两者不同注意事项示例外部应用程序的安全考虑内部应用程序的严格得多。

    As an example to show how each deserves different considerations, security concerns of external applications are much more stringent then internal applications.

    youdao

  • LotusNotes提供应用程序开发环境,其中已经建立了一个设计企业部署应用程序的安全模型

    Lotus Notes also provides an application development environment with an established security model to design and deploy the application across the enterprise.

    youdao

  • 当然不是所有应用程序都会访问关键数据这些程序开发人员确实能够通过加入访问控制增强应用程序的安全

    Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.

    youdao

  • 可以 war_realm/dist目录中找到这个Web应用程序安全版本,名称为petsecure.war。

    You can find this secured version of the Web application in the war_realm/dist directory, called petsecure.war. Deploy this to Tomcat using

    youdao

  • 对于其他Web应用程序,请部署描述符里面使用security - constraint元素来规定应用程序的安全约束。

    For other web applications, use a security-constraint element in the deployment descriptor.

    youdao

  • InfoQ中发布过owaspTop10列表,它所关注web应用程序安全风险,而CWE的Top25覆盖范围广,包括著名缓冲区溢出缺陷

    While the OWASP Top Ten list, presented by InfoQ, focuses on web application security risks, the CWE Top 25 covers a broader range of issues including the famous buffer overrun vulnerability.

    youdao

  • InfoQ中发布过owaspTop10列表,它所关注web应用程序安全风险,而CWE的Top25覆盖范围广,包括著名缓冲区溢出缺陷

    While the OWASP Top Ten list, presented by InfoQ, focuses on web application security risks, the CWE Top 25 covers a broader range of issues including the famous buffer overrun vulnerability.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定