所以,除非你明确知道这个应该拒绝,否则你应该做的是加强安全实施,例如:更好的密码策略和限制用户的工作站。
So, unless you know exactly what you need to deny, you should tighten the security by implementing e.g. better password policies and restrict users' workstations.
所以,除非你明确知道这个应该拒绝,否则你应该做的是加强安全实施,例如:更好的密码策略和限制用户的工作站。
So, unless you know exactly what you need to deny, you should tighten the security by implementing e.g. better password policies and restrict users workstations.
第二个请求将根据客户端的信任策略集和绑定中的配置实施安全保护。
The second request will be secured as configured in the client's trust policy set and bindings.
这个策略的范围包括了隐私策略和规则,安全性策略和规则、交易和实施规则。
The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules.
Linux和UNIX环境在用户级上强制实施高安全策略,与一个用户帐户关联的文件和进程不能被其他用户直接访问。
Linux and UNIX environments enforce strong security at the user level; the files and processes associated with one user account are not directly accessible by other users.
xml文件中定义的SCA策略集可以被附加到这个实现以实施授权和安全身份策略。
SCA policy sets, defined in the definitions.xml file, can be attached to the implementation to enforce authorization and security identity policies.
该模型以动态策略管理为基础,形成一个集防护、检测和响应为一体的完整安全体系,从而对主机系统实施综合安全保护。
With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.
从文化安全角度,考察中外传媒管理策略的得失,对于当下传媒管理政策的制定和实施具有重要的借鉴意义。
It is of great importance for reference in making and implementing policies of media management to sur-vey the gains and losses of domestic and foreign strategies in media management.
SNMP监控与分析企业的网络情况,实施安全策略,实时监控网络设备、服务器等,保证网络的运行状态和性能。
SNMP network monitoring analysis of business conditions, the implementation of security policy, real-time monitoring network devices, servers, etc., to ensure network operations performance.
SNMP监控与分析企业的网络情况,实施安全策略,实时监控网络设备、服务器等,保证网络的运行状态和性能。
SNMP network monitoring analysis of business conditions, the implementation of security policy, real-time monitoring network devices, servers, etc., to ensure network operations performance.
应用推荐