这场过热但经常中肯的论战的读者们会下结论,最安全的策略是有机食品和一个苍蝇拍。
Readers of this overheated but often on-the-mark polemic will conclude that the safest tactic is organic food and a fly swatter.
最安全的策略是购买一篮子外汇。
尽管某些安全细节可以作为策略的一部分,但并非所有安全需求都必须成为策略的一部分。
Though some specifics of security can be part of the policy, not all the security requirements need to be part of the policy.
一个安全策略能够被一个或者多个项目使用。
一个表只能与一个安全策略相关联。
这个安全策略授权每一个人都可以访问项目。
This security policy grants access to every user for every project.
同样,这是将安全策略嵌入物理网络设计中的一种实践。
Once again, this is the practice of embedding security policy into the physical network design.
如果你有很好的密码策略的话,你还能看到用户锁定策略,因此这不是一个很大的安全问题。
If you have good password policies, which also include lockout policies, then it is not that big a security issue.
如果用户拥有一个特定安全策略的特定规则的豁免权,那么当该用户试图访问受该安全策略保护的数据时,该规则将不起作用。
If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.
您的组织有一个安全策略要求有这种特性。
Your organization has a security policy that requires this feature.
一个安全标签归属于一个安全策略,并且为安全策略中的每个安全组件包含一个值。
A security label belongs to a security policy and contains a value for each security component in that security policy.
如果英国真的想改善其能源安全和环境,解决气候变化问题,那比起低排放交通策略,我们更需要一个低汽车交通策略。
More than a low-carbon vehicle strategy, if the UK is to improve its own energy security and environment, and tackle climate change, we need a low-car vehicle strategy.
一个内容审计选项,用来决定安全性策略计算是否在FM内完成。
A Content Audit option that determines whether security policy calculation should be done in FM.
确保系统安全的一个好的策略是拒绝任何操作,而不是允许任何操作。
A good policy for securing your systems is to start by denying everything instead of allowing everything.
豁免权为用户绕过一个安全策略中的一个或多个访问规则提供了一种方式。
Exemptions provide a way to allow users to bypass one or more access rules for a security policy.
一个安全策略中最多可以有16个不同的安全组件。
There can be a maximum of 16 unique security components in a security policy.
作为分配风险等级的一部分,必须考虑分配给数据的安全性策略。
As part of assigning a risk level, you have to consider the security policies assigned to the data.
SECLABEL_BY_NAME:该函数通过指定一个安全策略和这个安全策略中一个安全标签的名称,构建一个安全标签(内部编码表示)。
SECLABEL_BY_NAME: This function builds a security label (internal encoded representation) by specifying a security policy and the name of a security label that is part of that security policy.
企业安全策略可能作为一致性维度的一部分,但安全性常常是一个复杂的文化问题。
Enterprise security policies might be considered part of the conformance dimension, but security is often a complex cultural issue.
毕竟,在你开始一个可靠的策略之前,你不想放弃一份稳定薪水所带来的安全感。
After all, you don't want to give up the security of a steady paycheck before you have a solid game plan.
对于一个模型,您可能会希望以技术为基础构建安全策略和控制。
For one model, you may wish to have security policies and controls built upon the foundation of technologies.
安全扫描是公司网络安全策略重要的一部分。
Security scans are an important part of the network security strategy for a company.
当您创建一个项目时,安全策略是从下来列表中选择的。
When creating a project the security policy is selected from a drop-down list.
创建好安全策略后,安全管理员创建安全标签,安全标签也是安全策略的一部分。
After creating a security policy, the security administrator creates objects, called security labels that are also part of that policy.
业务策略在同一个时间跨越所有作用范围,如安全性、业务过程、总体架构和操作策略。
Where the business policy spans subject areas like security, business process, overall architecture and operational policies all at the same time.
生成用户安全属性报告有助于判断和识别密码或安全策略中是否有不一致的地方。
Producing reports on security attributes of users is one method of determining and identifying if there are any inconsistencies in your password or security policy.
这一层可以看作业务安全服务与IT 安全服务之间的链接,它包括策略管理和分发等领域。
This tier can be thought of as the link between business security services and IT security services and includes areas such as policy administration and distribution.
安全血液促进母亲安全全球行动旨在改善获得安全血液,以处理与妊娠有关的并发症,作为孕产妇保健综合策略的一部分。
The Global Initiative on Safe Blood for Safe Motherhood aims to improve access to safe blood to manage pregnancy-related complications as part of a comprehensive approach to maternal care.
一个安全策略由一些安全标签组件组成。
本文介绍了一些可以帮您维持系统遵守安全性策略的工具和技术。
This article introduced some tools and techniques that can help you maintain your system's adherence to its security policy.
应用推荐