一次又一次地我们看到安全方法被阻碍并被破坏掉。
Time and again we have seen security methods thwarted and broken.
我们考察了三种安全方法,以及如何在php中使用它们?
We'll look at three approaches to security, and how we can use them from PHP.
关于信息和相关风险分类的方案,以确保定义恰当的安全方法。
A scheme for classifying information and associated risks so that appropriate security measures can be defined.
目的明确糖尿病患者围手术期血糖控制的安全方法。
Objective To determine the safe method of preoperative glycemic control in diabetic patients during surgery.
深度防御背后的理念很简单:永远不要仅依赖于一种安全方法。
The idea behind defense in depth is simple: Never rely on just one security method.
小时候我的家人在一本杂志上读到了关于教孩子用枪的安全方法。
When I was little my folks read in a gun magazine about a way to teach children gun safety.
那样,管理员就可以给他们特别的系统安装任意他们想要的安全方法。
That way, administrators could install whichever security approach they wanted on their particular system.
最新支持可视化安全方法,并且支持SpringIDE的自动完成。
New support for visualizing secured methods, plus configuration auto-completion support in Spring ide.
透明和安全关键委托可能仅绑定到其他透明或关键安全方法。
Transparent and safe-critical delegates may only bind to other transparent or safe-critical methods.
我们还简要地研究了信号处理,至少充分了解了使用它们的一种安全方法。
We've even briefly looked at signal handling, at least enough to know a safe way to use them.
接受没有加密的通讯,但总是要求客户端建立信任和安全方法。
Accepts unsecured communication, but always requires clients to establish trust and security methods.
目的探讨老年人患外科病并发糖尿病的围手术期治疗的安全方法。
Objective TO study the safe method for aged urological disease combined with diabetes in urologic.
虽然帐户不是必需的,但为代理指定单独的帐户却是最佳安全方法。
Although the account is not required, it is a security best practice to specify a separate account for the agents.
所有的交易都是通过私人聊天这样做,你可以购买和出售的安全方法。
All deals are done through private chats so you can buy and sell the safe way.
后授权判断是发生在安全方法执行之后,通常还包含该方法返回的域对象。
Post authorization decisions are made after a secure method has been invoked, and typically involve the domain object which is returned by such a method.
Linux不像其他操作系统那样易遭受病毒攻击,而且它提供了一种远程管理的安全方法。
Linux is not subject to the same level of virus attacks as other operating systems, and it provides a secure method of remote administration.
深层防御是将多余的安全方法都妥善保管——不仅包括加密,还包括用户所提供数据的智能处理。
Defense in-depth is all about having redundant security measures in place — not only encryption but also smart handling of user-supplied data.
通过对行为基础安全方法的阐述和分析,概括出了行为基础安全促进安全文化的原因。
The behavior based safety is described and analyzed, and its factors promoting the safety culture are also summarized.
这个列表用于匹配服务器支持的安全方法。 此外,随后在该装载点下发生系统调用时也用到该列表。
The list is used to match the security method supported by the server and employed during subsequent system calls under this mount point.
要使用声明性安全方法,必须在web . xml部署描述符中指定所有可能的安全角色。
To use the declarative security approach, you must specify all possible security roles in the web.xml deployment descriptor.
接受没有加密的通讯,但总是要求客户端建立信任和安全方法。不与不受信任的客户端通讯。
Accepts unsecured communication, but always requires clients to establish trust and security methods. Will NOT communicate with untrusted clients.
在实现中不要使用安全方法(如GET和HEAD)进行不安全的操作(如,写数据),这点非常重要。
It's important that implementations do not use safe methods e.g. GET and HEAD to perform unsafe operations e.g.
与分散片相比,液体制剂的购买价格较为昂贵,以安全方法进行储存、包装和运输的成本也较高。
Liquid formulations are more expensive to purchase compared with dispersible tablets and are also more costly to store, package, and transport safely.
入侵容忍系统(its)是一个新的计算机安全方法,在过去几年中逐渐显现出来,近期引起了许多学者的关注。
Intrusion tolerance system (ITS) is a new approach of computer security which has slowly emerged during the past decade, and obtained more attention in recent years.
一些不同的安全项目,包括Security-EnhancedLinux(SELinux)项目,要求他将他们的安全方法添加到 Linux内核中。
Several different security projects, including the Security-Enhanced Linux (SELinux) project, had asked him to add their security approach to the Linux kernel.
一些不同的安全项目,包括Security-EnhancedLinux(SELinux)项目,要求他将他们的安全方法添加到 Linux内核中。
Several different security projects, including the Security-Enhanced Linux (SELinux) project, had asked him to add their security approach to the Linux kernel.
应用推荐