J2C身份验证数据提供了所需的安全信息。
The J2C authentication data provides the required security information.
的人员随后请冒名顶替者提供所需的安全码。
The representative of register.com then sent the imposter a security code that he had to provide.
运行所需的安全权限。
打开现有的已命名互斥体,并指定所需的安全访问权。
Open an existing named mutex, specifying the desired security access.
当String类型的键-值对不足以传播所需的安全属性时。
When String type key-value pairs are simply not sufficient to propagate the necessary security attributes.
打开现有的已命名信号量,并指定所需的安全访问权限。
Opens an existing named semaphore, specifying the desired security access rights.
根据所需的安全,你可以试着用你的本地文件的某种形式的加密。
Depending on the desired level of security you could try using some form of encryption for your local files.
SOAP运行时可以访问keystore以检索所需的安全性密钥和证书。
The SOAP runtime may access a keystore to retrieve security keys and certificates as needed.
转子泵驱动系统的选择受到安装空间大小和所需的安全防护等级的影响。
Rotor pump driven by the choice of system size and the required installation space of the impact of security level.
将创建请求和响应处理规则来按照要求操作SOAP消息,以遵循所需的安全策略。
Request and response processing rules are created to manipulate the SOAP message as required to conform to the desired security policy.
回填体不仅提高了边坡的稳定性,还为转入地下开采提供了所需的安全覆盖层厚度。
The back filling at the slope bottom not only enhances slope stability, but also provides the safe overlay which is needed in underground mining.
您将分析安全电子邮件服务存根类中的每个类,并了解如何对其进行增强,以提供所需的安全功能。
You will take each individual class among the stub classes of the secure email service and learn how to enhance it to provide required security features.
我们的努力必须集中于以下方面:帮助这些国家获得其所需的安全、人力和其它资源、制度和政策。
Efforts must be concentrated on helping these countries acquire the security, human and other resources, institutions and policies they need.
MDM客户机应用程序负责组合MDM Server所需的安全信息并把信息添加到相应的事务中。
The MDM Client application is responsible for assembling the security information needed by MDM Server and adding it to the corresponding transaction.
WS -SecurityPolicy安全配置指定在客户机和服务之间交换的消息所需的安全处理。
WS-SecurityPolicy security configurations detail the security processing needed for messages being exchanged between a client and service.
在安装插件之前,需要考虑数据库所需的安全级别,或者考虑是否应该只采用这种方式从其他数据库软件临时迁移到 DB2。
Before installing the plug-in, consider the degree of security your database needs or consider whether you should only use this as a temporary migration step from other database software.
在此模式中,网关和esb的其他部分之间几乎总是存在受信任链路,因此esb的这些其他部分所需的安全模型可以得到简化。
In this mode there is almost always a trusted link between the gateway and other parts of the ESB so that the security model required for those other parts of the ESB can be simplified.
Rampart发行版包括一个单独的rahas模块,它支持发起WS - SecureConversation所需的安全令牌。
The Rampart distribution includes a separate module called rahas, which enables issuing security tokens required by WS-SecureConversation.
应用程序开发者应该把他们要实现所需的安全性功能而需要编写的所有代码都保留在某个单独的模块中,将来这个模块会被买来的基础架构代替。
Application developers should keep whatever code they need to write to implement the required security functionality in some separate module that will be replaced by bought infrastructure over time.
IBMLotusSametimeStandard提供了集成的企业即时消息传递、VoIP、视频聊天和Web会议功能,而且还具备商业用途所需的安全特性。
IBM Lotus Sametime Standard offers integrated, enterprise instant messaging, VoIP, video chats, and Web conferencing capabilities with the security features required for business use.
随着确保罗马边境安全所需资源的增加,罗马领导人之间就如何最好地保护罗马领土不受入侵部落的侵扰这一问题产生了严重的冲突。
As the resources needed to secure Rome's borders increased, serious conflicts developed among Roman leaders over how best to protect Roman territory against invading tribes.
它证明了该部门不再处在对做出药品和器械安全决定所需要的信息的垄断地位。
It demonstrated that the agency no longer had a monopoly on the information needed to make drug and device safety decisions.
在服务请求者和每个所需的业务服务之间安全通信的能力。
The ability to securely communicate between the service requestor and each required business service.
仔细计划有助于组织提供所需安全性的配置文件,还有助于使配置文件足够简单,以便它们的目标易于理解。
Careful planning will help you organize profiles that provide the security you need, yet are simple enough so their purpose is easy to understand.
CWE还为程序员提供了编写更安全的代码所需要的更详细的内容。
CWE also provides more details needed for programmers to write more secure code.
这基本上是建立安全性所需的所有内容。
This is basically all that is needed to be done in order to set up the security.
所需的全部安全执行策略
本文将向您展示在创建CommunityEdition提供的安全领域时所需的内容,以及如何使用它们来配置Web应用程序安全性。
This article will show you what is required to create the security realms provided by Community Edition and how to use them to configure Web application security.
本文将向您展示在创建CommunityEdition提供的安全领域时所需的内容,以及如何使用它们来配置Web应用程序安全性。
This article will show you what is required to create the security realms provided by Community Edition and how to use them to configure Web application security.
应用推荐