请向此方法中添加对文档重新应用保护的代码。
Add code to this method that reapplies protection to the document.
有些人担心这些应用软件开发得太快了,可能无法保护人们的私人信息。
Some people worry the apps are being made too quickly and may not protect people's private information.
保护您的应用程序这一任务永无终结。
现在我会考虑恶意接收方的攻击,并详细描述如何保护应用免受这样的攻击。
I'll consider now attacks by malicious recipients and describe how to protect applications from such attacks.
安全标签被应用到数据上,以保护该数据。
Security labels are applied to data in order to protect the data.
而ssl能保护应用免遭再现攻击。
它们负责缓存内容、保护应用服务器不受到太多工作负载平衡的影响。
They are responsible for caching content, protecting the application servers from too much workload balancing.
在尝试保护你的应用时,你是否有过挫败感?
Are you frustrated when you try to secure your applications?
在基于硅分子水平的电子学中,就涉及到重复应用阻材料来保护被侵蚀的层中需要保护的那部分。
In standard silicon-based electronics, this involves the repeated application of resistive materials to protect those parts of the layer being etched that need to be preserved.
增强型保护,标示为“受控增强”,应用更为严格的措施保护信息,因为该信息无意的泄露将造成严重损害。
Enhanced safeguarding, labeled 'controlled enhanced. 'applies more stringent measures to protect the information because inadvertent disclosure would create substantial harm.
通过清理数据并忽略被错误提交的数据,已经为保护应用程序奠定了良好的基础。
By cleaning up your data and ignoring data submitted improperly, you have made excellent first steps in securing your application.
策略允许访问的任何应用程序都可以访问保护点下的文件,前提是该应用程序使用系统库来访问文件。
Any application that the policy allows access to can access the files that are under guard points as long as the application USES system libraries to access the files.
策略允许访问的任何应用程序都可以访问保护点下的文件,前提是该应用程序使用系统库来访问文件。
Any application that is allowed access by the policy can access the files that are under guard points as long as the application USES system libraries to access the files.
您的应用程序是否将未经保护的机密数据缓存放到本地机器上?
Do your applications leave unsecured caches of confidential data on a local machine?
这不影响应用程序访问保护点。
This does not affect the application's ability to access the guard points.
这个模式要求你对需要保护的WEB应用要非常的了解。
This model requires knownledge of the web applications you are protecting.
正如您已经了解到的一样,Acegi的组件彼此依赖,从而对您的应用程序进行保护。
As you have learned already, Acegi's components are dependent on each other to secure your applications.
这种级别的保护让应用程序允许或限制其他应用程序访问系统资源。
This level of protection lets the application allow or restrict other applications to access the system resource.
完成这些配置步骤之后,可以配置J2EE安全设施来保护应用程序组件。
After these configuration steps are completed, you can configure J2EE security facilities to protect application components.
理论上,也可以用相同的方法保护MIDP应用程序。
In theory, MIDP applications could be secured by the same methods.
在本文描述的示例应用程序中,保护业务逻辑ejb,以使只有通过认证的用户可以调用特定的EJB方法。
In the sample application described in this article, the business logic EJB is secured so that only authenticated users can invoke specific EJB methods.
应用程序文件默认是受保护的。
毫无疑问,由于是公共的JVM,所以应用程序间的故障保护是有限的。
Of course, failure protection between applications is limited, due to the common JVM.
现在再次访问受保护的应用程序。
DAO模式可以保护应用程序,使之不必与特定持久性方法捆绑在一起。
The DAO pattern protects your application from being tied to a particular persistence approach.
或许您习惯于依赖传统应用程序来保护数据。
Perhaps you're used to relying on the traditional application to protect your data.
约束和角色在部署受安全保护的应用程序时确定。
Constraints and roles are fixed when a secured application is deployed.
参议员即将通过的立法草案将增加那些允许用户应用有版权保护的视频游戏,电视节目和音乐的公共网站的罚金。
Draft legislation that would increase penalties for public websites which allowed users to stream copyrighted video-games, television shows and music is being fast-tracked through the Senate.
公共目录是用于保护应用程序的。
即使不考虑通过由模型驱动的开发和基于SOA的服务管理所提高的效率,业务应用程序仍须保护信息。
Irrespective of the efficiencies brought by model-driven development and SOA-based service management, business applications must continue to secure information.
应用推荐