例如,您需要使用网络安全加密令牌控制对ejb的访问。
For example, you need to control access to EJBs using a network-safe encrypted token.
例如,它难以正确使用,root用户还是可以从中脱离,而且它根本不去控制网络访问。
For example, it's hard to use correctly, root users can still escape from it, and it doesn't control network access at all.
应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
Information gathered by social network applications needs to be protected by policies which control access to information.
使用云中的一个BuildForge控制台来运行您自己的网络中的代理系统上的作业,以便代理系统能够访问您的ClearCase或ClearQuest系统。
Using a Build Forge console in the cloud to run jobs on agent systems in your own network so that the agent systems can access your ClearCase or ClearQuest systems.
例如,如果您最信任的系统在一个专用的隔离的网络上运行,那么使用telnet在这个网络区中进行远程访问(或从控制台工作)是非常合适的。
For example, if your most trusted systems run on a dedicated and segregated network, it makes perfect sense to use Telnet for remote access within that very network zone (or working from the console).
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
入网访问控制是保证网络资源不被非法使用, 是网络安全防范和保护的主要策略。
Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.
本文通过对SSL及其关键技术的研究,提出了在网络数据库系统的用户访问控制中使用基于SSL和证书的双向身份认证。
Through study on SSL and its key technology, it is recommended that the SSL-based certificate authentication can be used as client access control method in database systems.
访问控制:启用对核心业务使用简单的网络发布和交易系统的单点解决方案。
Access: Enable transactions against core business systems using simple Web publishing and point solutions.
在规划网络时,有必要实施严格的身份认证、访问控制、数据加密、数字签名等服务,逐步普及使用数字证书。
In planning network, it is necessary to implement strict identity approval, visit-controlling, data-encrypting, figurative signature, etc, popularize and use the digital certificates progressively.
访问控制作为网络安全防范和保护的主要技术,主要任务是保证网络资源不被非法访问和使用。
The main purpose of Access Control, a major technique of network security prevention and protection, is to safeguard network resources from being illegally visited and used.
在无线传感器网络中,介质访问控制MAC协议决定无线信道的使用方式,在节点之间分配有限的无线通信资源。
In wireless sensor networks, MAC layer Protocols are capable of determining the wireless channel utilization and allocate the limited wireless communication resources between the nodes.
在无线传感器网络中,介质访问控制MAC协议决定无线信道的使用方式,在节点之间分配有限的无线通信资源。
In wireless sensor networks, MAC layer Protocols are capable of determining the wireless channel utilization and allocate the limited wireless communication resources between the nodes.
应用推荐