这场过热但经常中肯的论战的读者们会下结论,最安全的策略是有机食品和一个苍蝇拍。
Readers of this overheated but often on-the-mark polemic will conclude that the safest tactic is organic food and a fly swatter.
下面这些简单的策略能帮助你在中断之后安全地恢复锻炼。
The following simple strategies will help you return to exercise safely after a break.
如果安全策略要求,则对请求进行解密。
如果安全策略要求,则对请求进行加密。
此外,功能声明说明了安全策略,以便多种服务可以参与安全事务通信。
Moreover, the capability declaration notes security policy so that multiple services can participate in a secure transaction communication.
通过在安全策略的周围“划出”边界来定义范围。
Define the scope by "drawing" a boundary around the security policy.
从安全角度出发,拒绝所有策略是最安全的。
From a security standpoint, the deny all policy is the most secure one.
使用这些组定义来定于安全策略。
Use these group definitions for defining the security policy.
需要有威胁检测规则并执行安全策略。
Threat detection rules and security policy enforcement are needed.
这些规则通常编码在安全策略中。
选择安全策略。
这是避免拟人化的安全策略。
好的安全策略是什么样子的呢?
就其本身而论,气候政策也是安全策略。
再说一遍,那是安全的策略。
在创建项目时,安全策略是必填选项。
创建安全策略。
STS安全配置嵌在安全对话令牌的策略定义中。
The STS security configuration is nested inside the policy definition of the secure conversation token.
应用程序安全策略。
尽管某些安全细节可以作为策略的一部分,但并非所有安全需求都必须成为策略的一部分。
Though some specifics of security can be part of the policy, not all the security requirements need to be part of the policy.
如果用户拥有安全策略使用的每个规则的豁免权,那么该用户将拥有受那个安全策略保护的所有数据的完全访问权。
If the user holds an exemption to every rule used by a security policy, then the user will have complete access to all data protected by that security policy.
一个安全标签归属于一个安全策略,并且为安全策略中的每个安全组件包含一个值。
A security label belongs to a security policy and contains a value for each security component in that security policy.
这个策略的范围包括了隐私策略和规则,安全性策略和规则、交易和实施规则。
The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules.
所有SOA安全的核心都是基于策略的基础设施和策略的管理。
At the core of all SOA security is a policy-based infrastructure and management of the policies.
SECLABEL_BY_NAME:该函数通过指定一个安全策略和这个安全策略中一个安全标签的名称,构建一个安全标签(内部编码表示)。
SECLABEL_BY_NAME: This function builds a security label (internal encoded representation) by specifying a security policy and the name of a security label that is part of that security policy.
一个安全策略中最多可以有16个不同的安全组件。
There can be a maximum of 16 unique security components in a security policy.
管理员能够定于安全策略,并授权项目经理选择对于他们的项目最好的安全策略。
Administrators can define security policies upfront, and empower project managers to choose the policy that best applies to their project.
安全扫描是公司网络安全策略重要的一部分。
Security scans are an important part of the network security strategy for a company.
以后可以根据安全策略的要求逐渐放松此用户的安全限制。
Then one can gradually lift the security of that user as your security policy demands.
在安全策略边界内,指定由提供商托管并由使用者租用和预订的云服务类型、应用的阈值策略以及应用安全策略的方式。
Within its boundaries, specify which cloud service type the provider hosts and the consumers rents and subscribe, what threshold policies are applied, and how the security policy is applied.
应用推荐