我们将创建的接口会用于安全应用程序。
完整的安全应用程序超出了本示例的范围。
A complete security application is beyond the scope of this example.
安全应用程序块。
概括起来,USB端口锁定是有点远不是同类专业的安全应用程序。
To sum it up, USB Port Locked is a bit far from being a professional security application of its kind.
这个错误通常由基本连接失败引起,例如试图对安全应用程序服务器进行不安全的连接。
This error is usually caused by a basic connection failure, such as attempting to make a non-secured connection with a secure application server.
但在第三方库和供应商支持的帮助下,我们发现可以用MIDP 1.0来实现安全应用程序。
But with the help of third-party libraries and vendor support, we have found that we can use MIDP 1.0 to implement secure applications.
在结束部分,我们将总结使用J2ME技术开发用于最小型无线设备的高级安全应用程序的可行性。
In closing, we'll summarize the feasibility of developing advanced secure applications for the smallest wireless devices using J2ME technologies.
GSSAPI提供了一个标准的通用接口,通过该接口安全应用程序可以使用多种底层的安全机制。
GSSAPI offers a standard generic interface through which a secure application can use multiple underlying security mechanisms.
最后,在实现安全解决方案时,应该考虑安全工程——用于构建安全应用程序的工程方法。
Lastly, when implementing any secure solutions, one should consider security engineering — an engineering methodology to build secure applications.
通过使用这些GSS - API接口,可以实现使用Kerberos机制的安全应用程序和系统。
Using these GSS-API interfaces, you can implement secure Keberized applications and systems.
术语“WS - Security”通常指处理加密和数字签名的一组规范,支持您创建安全应用程序。
The term "WS-Security" is usually used to refer to a group of specifications that handle encryption and digital signatures, enabling you to create a secure application.
因此,用GSS - API开发的安全应用程序可以在不同的安全机制上运行,不用改变应用程序。
Thus, a secure application developed using GSS-API can work over different security mechanisms without changes to the application.
GSSAPI的主要的优点是:一个使用GSSAPI开发的安全应用程序无需修改就可以在不同的安全机制上工作。
The main benefit of GSSAPI is that a secure application developed using GSSAPI can work over different security mechanisms without modification.
令人惊讶的是,直到最近安全和IT专业人员才开始认识到,安全应用程序对于提高企业抵抗攻击的能力是必不可少的。
Surprisingly, only recently have security and it professionals begun to realize that secure applications are mandatory when hardening a company's resistance to attacks.
另外,在企业上下文中,您可以围绕实现外部安全应用程序(如TivoliAccess Manager)设计体系结构。
Also, in an enterprise context, you might design the architecture around implementing an external security application, such as Tivoli Access Manager.
在开发安全应用程序时遇到的最大问题之一是安全通常是事后的补救办法,即在项目的代码完成后才想起需要实现某些内容。
One of the biggest problems in developing secure applications is that security is often an afterthought, something to implement after a project is code-complete.
我发现,如果把追踪应用程序作为家庭公认的提高安全性的工具,而不是作为一个用于监视的秘密工具,那么青少年会更容易接受它。
I've found teens are more acceptable to tracking app when it is included as part of a family agreement to improve safety than when it is placed as a secret tool to watch them.
这款小应用程序阅览器提供可配置的安全保障。
本专栏将帮助您了解如何编写安全的应用程序。
This column will help you learn how to write secure applications.
例如,考虑一个包含许多聊天室的安全聊天应用程序,其中每个聊天室都有几个人。
For example, think of a secure chat application containing a number of chat rooms with several people in each room.
建立安全连接的应用程序称为上下文发起者。
The application that establishes the secure connection is called the context initiator.
与SQL注入攻击类似,如果使用最佳实践开发安全的应用程序,通常可以轻松地处理该威胁。
Like the SQL injection attack, you can often easily deal with the threat if you follow best practices to develop secure applications.
在本文中,您了解了如何配置环境,以便使用DES身份验证运行安全RPC应用程序。
In this article, you learned how to configure the environment for running Secure RPC applications using DES authentication.
还有部署模式、安全模式、应用程序模式以及处理操作和运行时问题的模式。
There are deployment patterns, security patterns, application patterns, and patterns that deal with operational and runtime aspects.
仔细考虑用户输入的位置及正确值将使您可以构建一个健壮、安全的应用程序。
Carefully considering where your user input is going and what it should be will allow you to build a robust, secure application.
该配置仍然安全,因为应用程序CMPEJB只提供了本地接口,因此只能从同一ejb容器中访问。
This configuration is still secure, because application CMP EJBs provide only local interfaces and, therefore, can only be accessed from the same EJB container.
能够快速和安全的修改应用程序来满足紧急的业务需求。
You must be able to change the application quickly and safely to meet emergent business requirements.
遗憾的是,大多数软件开发人员从未知晓如何编写安全的应用程序。
Unfortunately, most software developers have never been told how to write secure applications.
创建安全的应用程序连接性体系结构。
图8显示了使用业务流程和策略管理组件为企业的业务应用程序提供业务安全服务的业务应用程序服务。
Figure 8 shows the business application services that use the business process and policy management component to provide business security services to the business applications of the enterprise.
应用推荐