SSL安全可用于建立来自端点的入站通信和指向端点的出站通信。
SSL security can be used for establishing communications inbound from (and outbound to) an endpoint.
我们何时才能知道自己已足够安全,可以降低安全标准,以便增加可用性呢?
When do we know if we're safe enough to lower security standards for increased usability?
安全——干净的镜像可用来重建受损的系统。
Security - Clean images can be used to restore compromised systems.
就上述疾病中的某些而言,我们已具备强效和安全的药物,可用于开展大规模预防运动。
For some of these diseases, we have powerful and safe medicines for use in mass prevention campaigns.
系统会提醒你可用升级、可能的安全风险和当前系统状态。
The system itself notifies you about available upgrades, possible security risks, and the current state of your system.
准备安全的候补热源和候补可用燃料。
Have a safe alternate heating source and alternate fuels available.
当重要的人员离开公司,或者硬件失败时,可能不存在安全网可用。
When key personnel leave the company or there are hardware failures, there may not be a safety net in place.
安全令牌通过发布一系列安全令牌(可用于在不同的信任域之间代理信任关系)来形成信任的基础。
Security token services form the basis of trust by issuing a range of security tokens that can be used to broker trust relationships between different trust domains.
在过去几年,“可用性安全”这个新兴领域的研究者深入研究许多信息安全实践并且发现很多其中很多有缺陷。
Over the past few years, researchers in the emerging field of "usable security" have taken a hard look at many information security practices and found many of them lacking.
参数值包括用于COM和DCOM安全级别的认证;可用命名管道数量和IIS进程ID。
Among the values passed are the required authentication level for COM and DCOM security, the number of named pipes available for use, and the IIS process ID.
在这种模式下,4758Coprocessor的完整安全特性是可用的。
In this mode, the full security features of the 4758 Coprocessor are available.
Geronimo返回的principal类不包含web容器中可用的所有安全信息。
The principal class returned by Geronimo does not contain all security information that is available in the Web container.
转到Security标签,使得该服务器的安全性可用。
你可能知道一些实时反病毒软件并且已经在使用着它们。不过,对于Windows系统,还另外有一些高级的安全工具可用。
You probably know and use various real-time antivirus tools, but there are also advanced security tools that work under the operating system.
图4显示了安全域Portlet,它显示所有可用的安全域。
Figure 4 shows the security realm portlet, which displays all the available security realms.
在安全与可用性之间摇摆的情形下,有时候安全性应该胜出。
In cases where there's a tension between security and usability, sometimes security should win.
有关高可用性和安全问题的更多信息,请参阅“参考资料”部分。
More information about high availability and security issues is available in the resources section.
运行时视图允许你来推算运行时特性,如性能、安全及可用性等难以看着程序包和类图就能估计出的部分。
This runtime view allows you to reason about runtime properties such as performance, security, availability, which are hard to assess looking at package and class diagrams.
通过创建您自己的需求,您可以添加性能、安全性、可用性,及经常被忽略的其他领域的需求。
By creating your own requirements, you can add requirements for performance, security, usability, and other areas that are often overlooked.
文档体现了服务注册的交互吗?这肯定会影响可用性,性能和安全。
Does the documentation show the interaction with the service registry, which certainly affects availability, performance and security?
该决定对于服务可用性、分发、安全性、事务范围、和耦合具有重要的含义。
That decision has important implications in service availability, distribution, security, transaction scopes, and coupling.
测试用例的安全性、性能、可用性、转化,等等都是由这些类型的文档所驱动的。
Test cases for security, performance, usability, translation, and such are driven by these types of documents.
对于可用性与安全性的另一项冲突,你又是怎么看的呢?
What's your take on yet another usability versus security conflict?
新的DB 2 9.7版本还在安全管理和高可用性方面提供了更多选择。
The new DB2 9.7 release also offers organizations more options in security management and high availability.
这种及时的消息满足了严格的安全性和可用性要求,并且顾客和代理都可以容易使用。
This instant messaging fulfills stringent security and availability requirements, and is easy for both customers and agents to use.
数据治理有多个方面:可用性、安全、隐私性、质量、审计和保留等。
Data governance has many facets: availability, security, privacy, quality, audit, and retention to name a few.
我们看到了越来越多的外包通信服务需求,包括安全的高可用性网络,跨越不同市场创建增长机会等。
We see increasing demand for outsourced managed communications services that include secure high-availability networks, creating growth opportunities across a variety of markets.
这种类型的攻击甚至可用于绕过显式安全检查。
This kind of attack can even be used to bypass explicit security checks.
可用性:配置安全性代码有多容易?
可用性:配置安全性代码有多容易?
应用推荐