作为一个EJB,该单例可以访问标准的EJB中间件服务集——事务管理、安全、远程、依赖注入等等。
As an EJB, the Singleton has access to the standard set of EJB middleware services - transaction management, security, remoteing, dependency injection and so on.
假如你的工作是运送250磅,价值25,000美元的计算机服务器,你无疑只会使用最安全的材料作为包装盒进行包装。
If your job was to ship 250 pounds and $25, 000 dollars worth of computer servers, you'd no doubt pack them in a box using only the safest materials.
图5显示了通过将Web服务网关作为ssl端点实现传输安全的体系结构。
Figure 5 shows an architecture using transport security with Web Services Gateway acting as SSL endpoint.
指定在服务请求中使用的用户名和密码的缺省方法位于作为UsernameToken安全配置一部分的客户端部署描述符中。
The default way to specify the username and password to be used in the service request is in the client side deployment descriptor as part of the configuration of UsernameToken security.
使用sshfs将一个目录作为本地计算机上的文件系统安全地挂载到一个远程服务器。
Securely mounting a directory on a remote server as a file system on a local computer using SSHFS.
或者请人帮忙做一张很煽情的视频录像作为礼物邮寄给她。 贴士,很多网站都提供视频制作服务,并且以电脑加密形式保障视频的安全。
Many websites allow you to protect your personal videos with an encryption or a password.
这个基础设施同样也可以作为控制点,将服务管理、安全、监视和规范应用于面向服务的体系结构。
This infrastructure can also act as a point of control to apply service management, security, monitoring, and instrumentation to the Service-Oriented Architecture.
这个主体是作为J2EE上下文来建立的,所以我们可以确保在服务实现中定义的安全性约束在分派组件之前得到满足。
The principal is established as the J2EE context so that we can ensure that the security constraints that are defined on the service implementation are met before dispatching the component.
这种冗余是由于PAC是嵌入在服务令牌中并且作为一个安全实体在客户机与服务器之间进行流转而引起的。
This redundancy was induced because the PAC was embedded in service tickets and flowed as a single security entity from the client to the server.
另外,作为一个可重启和永久的服务,GVPE还容易设置和配置,同时仍然保持安全性。
In addition, GVPE is also easy to setup and configure as a restartable and permanent service, while still retaining security.
这些交互一般涉及与安全性、目录和IT操作系统管理相关的服务,作为支持操作环境的一部分。
These interactions typically involve services related to security, directory, and IT operational systems management, as part of the support operating environment.
所以用户需要把安全作为要求他们服务的一部分,远离那些不能遵守的网络服务商。
So customers need to demand security as part of their service, while ISPs need to shun ISPs that don't comply.
底层的基础设施也必须包括作为客户请求和服务器响应来回传递的有效负载的安全性和机密性。
The underlying infrastructure also includes the security and confidentiality that must cover the payloads that go back and forth as client requests and server responses.
正如我之前所说,还会生成一个安全的CMS及文档——他们在服务器上作为单独的站点运行。
As I mentioned earlier, a secure CMS and documentation are also generated - and those run as separate websites on the server.
SCT由客户端包含在所有对服务的请求中,作为安全对话的一部分,并被服务在所有响应中引用。
The SCT is included by the client in all requests to the service as part of the secure conversation, and referenced by the service in all responses.
作为管理员,您必须确保使用SLES系统的用户访问的所有文件安全地存储在远程AIX文件服务器上。
As an administrator, you are required to ensure that all the files being accessed by users using the SLES machine have their data securely stored over the remote AIX-based file server.
作为安全和管理服务以及注册中心的策略执行点,对服务交互进行管理和保护。
Managing and securing service interactions as a policy enforcement point for security and management services as well as the registry.
例如,如果您想使用一个运行的实例作为一个Web服务器,那么您应该在您的安全组中定义一个规则:任何机器对端口80的连接请求都应该被接受。
For example, if you wanted to use a running instance as a Web server, you would define a rule in your security group that connection requests on port 80 should be accepted from any machine.
为了满足这个需求,设置Web服务安全性(WS-Security)来提供消费应用程序(Consuming Application)的 X.509证书作为 Web 服务请求中的二进制安全性令牌。
To address this need, WS-Security was set up to provide the Consuming Application's X.509 certificate as a binary security token within web services requests.
换言之,IBM的Kerberos支持是作为一个GSS - API安全插件来提供的,您可将该插件用于服务器身份验证和用户身份验证。
In other words, IBM's Kerberos support is provided as a GSS-API security plug-in, which you can use for both server and client authentication.
这些筛选器可能作为策略强制层,消息首先在这里经过安全和服务质量(QoS)检查,然后排队等待处理。
Potentially, those filters serve as a policy enforcement layer where the message is first checked from the security and Quality of Service (QoS) standpoints, and then is queued for processing.
如果将Web服务器作为DMZ中的安全措施,则代理无法替代它——但可以在安全区内帮助进行路由和负载平衡。
If the Web server was used as a security measure in the DMZ, then the proxy cannot replace it — but it can sit in the secure zone to help with the routing and load balancing.
如果您决定采用作为主机的专用安全监视Web服务,务必记住这与集中的安全监视Web服务不是同一回事。
If you decide on a dedicated security monitoring Web service as the host, keep in mind that this is not the same thing as a centralized security monitoring Web service.
作为解决此难题的一个手段,我们引入了事务协调服务(Transaction Coordination Service,TCS)的概念,原则上,它可以用于管理安全的且一致的分布式事务。
As a means to address this challenge, I introduced the concept of a transaction coordination service (TCS) that can, in principle, be used to manage secure and consistent distributed transactions.
他选择使用Fedora作为操作系统,用于管理常用的安全更新、基于RPM的包管理系统,以及与服务器相关的软件包。
He chose Fedora as the operating system for its frequent security updates, its RPM-based package-management system, and its quantity of prepackaged software pertinent to servers.
使用EJB组件作为Web服务端点,把这种方法级别的安全性也带给了Web服务客户。
Using EJB components as web service endpoints brings this method-level security to web service clients.
作为NT产品线的一员,Windows 2000把Windows 98的Web集成界面添加到专为工作站和服务器环境而设计的、稳定的、相对安全的操作系统中。
As a member of the nt line, Windows 2000 added Windows 98's Web integration to a stable, relatively secure OS designed for workstation and server environments.
标准建议只有强认证能够作为提供安全服务的基础。
The standard recommends that only strong authentication should be used as the basis of providing secure services.
该机制可作为一种基于等级的安全服务提供给用户。
The mechanism can be offered to normal users as a security service based on levels.
该机制可作为一种基于等级的安全服务提供给用户。
The mechanism can be offered to normal users as a security service based on levels.
应用推荐